Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley
Computer Forensics Overview • An overview on Cybercrime
What is Computer Forensics? • Computer Forensics is the discovery, collection, and analysis of evidence found on computers and networks. • Also called: • Digital forensics • Network forensics • Cyber forensics
Broad Examples • Computer Forensics is helpful in the process of solving crimes. • Examples Include but are not limited to: • Theft • Fraud • CyberExtortion • SPAM Investigations • Tracking Virus Predators
Specific Examples • An Employee in question for misusing the provided internet usage for illegal activity • A Hard disk found in a high threat zone such as an assassin's home. • In a security office, an unidentified log-in has been used several times to view unauthorized information.
What To Look For • Emails • Pictures • Internet History • Internet chat logs • Spreadsheets • Financial data • PDF Files • Documents And many more!
How To Obtain The Info • Find trashed materials • Recover passwords • Find hidden files and folders • Locate deleted emails • Re-construct scattered documents • Decode encrypted messages
Qualities of a Computer Forensics Expert • Knowledge of the law • Technical experience with many types of hardware and software products • Good communication skills • Willingness to learn • Good problem solver
Forensic Software • Forensic ToolKit • The Norton Utilities for Windows/DOS • Encryption Linux Boot Disk • SafeBack created by N.T.I. • Encase • Quick View Plus
Uses • Recovering lost e-mails • Locating lost documents and files • To assist law enforcement in investigating crimes • To apply BioMetrics to crime scenes • Within corporations in order to monitor employee activity
PRO’S • Evidence found is not subject to time such as paper documents decaying over a long period of time. • It accomplishes only that which computer technology can assist with. • Use of passwords and logins make it easy to keep the evidence from just anyone’s eyes.
Cons • Computer Evidence can be easily erased if mishandled • It is difficult to conform Computer Forensics to the common law because of the implied power of citizen privacy. • Asset Recovery • Defamation • Must be sure evidence is collected in a legally sound manner.
Cases that used computer forensics • Michael Jackson trial • Law enforcement used computer forensics to track down Jackson’s previous email messages and his internet history. • BTK Killer • Computer forensics helped to locate the location of the BTK killer by tracing a letter he wrote to a particular computer.
Interesting Facts! • In 2005 businesses produced approximately 18 Trillion electronic documents. (This number is over ten trillion higher than the amount of paper documents used in the same year.) • Computer Forensics of the future includes the use of “brain fingerprinting” which records brain activity in response to stimulants such as words or pictures.
Interesting Fact (Cont) • Encryption is used within computer forensics to protect information from unauthorized users. • The Caesar Cipher is one example of an encryption code and this particular code shifts every letter of the alphabet three spaces to the right. • Example: • B pbee tmmtvd tm fbwgbzam Will be translated to: “I will attack at midnight” using this Caesar Cipher code
Fraud From FaceBook • Click here to view video
Works Cited • Computer Forensic Services, LLC • Daniel, Larry. Digital Forensics