tools and techniques

41
Tools and Techniques

Upload: yasirsalfi

Post on 05-May-2017

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tools and Techniques

Tools and Techniques

Page 2: Tools and Techniques

Outline• General Introduction NFI

• Department for Digital Technology

• Working Groups within DT

• Future developments

• Communication

Page 3: Tools and Techniques

National Situation

7 Computer crime units

26 Basic law enforcement

NationalNFI and KLPD

superregional

regional

Page 4: Tools and Techniques

Digital Technology• From 1985 till 1995 part of Hand and

Machine Writing department• 1992 : 2 • 1994 : 5 • 1997 : 23• 1998 : 23 • 2002 : 34

Page 5: Tools and Techniques

3 Core Activities• Forensic Investigations

• Research & Development

• Centre of Expertise

Page 6: Tools and Techniques

Organisation

E m be d de d S yste m s O p e n syste m s D a ta A n a ly s is Im a g e P ro ce ss ing& B io m e trics

N F ID ig ita l T ech n o lo gy

Page 7: Tools and Techniques

Outline• Introduction• Embedded Systems• Open Systems• Data Analysis• Image Processing and Biometrics• future developments

Page 8: Tools and Techniques

Activities of Open Systems group• Media analysis: disks, tapes• Crack passwords and security• Reverse engineering• Find hidden data• Data Interception• Investigation of Hacking

Page 9: Tools and Techniques

Media Analysis• Different kinds of media

disc, tape, hard disc, zip, MO, chipcards,….

• File System Analysis FAT16, FAT32, NTFS, Mac, Unix, Linux, VAX/VMS, ..

• Large hard disks / RAIDS

Page 10: Tools and Techniques

Tape, chip, MO, CD formats

Page 11: Tools and Techniques

“Imaging” and analysis• Do not change the data !!!!• Compute a unique hash value for comparison

• Own development (VAMP) stopped due to other developments e.g.:– Ilook– Encase– Forensic Toolkit

Page 12: Tools and Techniques

Quality assurance• Validation of commercial products is

often not possible, since source code is not available

• Resulted in own version of dd – rdd that handles bad blocks more properly

Page 13: Tools and Techniques

Crack passwords and security• Reverse engineering

Page 14: Tools and Techniques

Applications of Reverse Engineering• Crack passwords and security

• Check working of software for media access

• Reconstruct working of suspect software: virus, fraude, etc.

Page 15: Tools and Techniques

Encryption• Crack passwords from Word datafiles

etc.• Commercial Software cracking

packages - Accessdata• Own developments of cracking

passwords• e.g. DES / https

www.hippiesfromhell.org/ linz.asp

Page 16: Tools and Techniques

Stego • Also in other traffic – audio-files / ip-

traffic / word-files etc.• The number of tools for stego is

growing rapidly : now over 150 on the Internet

• For detection knowledge of statistics is needed

• Often combined with other crypto-products

Page 17: Tools and Techniques

Data Communication• Internet (ADSL, cable etc.)• (Voice) Networks• Wireless Nets (WAP, IEEE-802.11b,

Bluetooth)

Page 18: Tools and Techniques

New Protocols / equipment

Page 19: Tools and Techniques

Hacking Defacing

Steal Data (credit card numbers)

Disrupt services

Page 20: Tools and Techniques

Forensic Evidence needed• Log files• Files that have been transferred• Problem : who was behind the

keyboard, and was someone behind it ?

Page 21: Tools and Techniques

Outline• Introduction• Embedded Systems• Open Systems• Data Analysis• Image Processing and Biometrics• Future developments

Page 22: Tools and Techniques

Data Analysis

• Filtering of relevant data

• History of data, log file analysis

• Patterns in large amounts of data

Page 23: Tools and Techniques

Filter data• Standard files of Operating Systems• Search for relevant data (keywords)• Search for known images (e.g. child

pornography) by hash or image comparison

• Development of own search procedures

Page 24: Tools and Techniques

Data Analysis• Search for patterns in large amounts of

data• Statistical Techniques• Find relations between data which were

not known before

Page 25: Tools and Techniques

Outline• Introduction• Embedded Systems• Open Systems• Data Analysis• Image Processing and Biometrics• Future developments

Page 26: Tools and Techniques

Camera Identification• Has a certain picture been taken by a camera

?• CCD-defects

Page 27: Tools and Techniques

Pattern recognition

Page 28: Tools and Techniques

Biometrics• Biometrics is the automatic identification or

recognition of people based on behavioral or physiological characteristics.

• Definition from International Biometric Group in New York

Page 29: Tools and Techniques

Examples• Irisscan Schiphol• Face recognition in airports

Page 30: Tools and Techniques

Biometric features for identification• DNA• Finger print• Handwriting• Voice recording• Face • ear print• Voice• Iris, retina• Hand scan• The way someone enters a password in the computer

Page 31: Tools and Techniques

Obscure ways of biometrics• Ear channel

Page 32: Tools and Techniques

Life detection• Patent information :

• Hart beat• Blood pressure• 3D-shape• Example influence pupil – light• Resistance

Page 33: Tools and Techniques

Gait

Page 34: Tools and Techniques

Forging biometrics• Finger Print - silicon cast• Hand Palm - latex model• Voice - digital or analog recording• Face - photograph or mask on face• Keyboard strokes - recording• Iris – image of an iris

Page 35: Tools and Techniques

FearID: earprints as evidence ?

Page 36: Tools and Techniques

Future case ?• Who was behind a computer with finger-scan

access control at a given time ?– Low False Acceptance Rate ?– Keyboard bug ?

Page 37: Tools and Techniques

Future developments• More open source developments for

software that can be used in court• Crypto and stego-detection tools• New protocols for interception• Data-analysis techniques• Proper preselection techniques• Wireless communication – who was

sitting behind the computer ?

Page 38: Tools and Techniques

Security 2010• Software and hardware devices smaller

and faster - more complex• Detection of security problems is based

on a number of statistical techniques• People live with the feeling that it it is

possible to have security troubles, like they once where used to regular burglaries

Page 39: Tools and Techniques

Mobile Devices• Smaller, integrated in watch, keys, ring

or hands in glove• Access devices (keys) hidden• Electronic paper• More tracking options• Small sensors for blood pressure,

temperature and health condition• Electronic tags

Page 40: Tools and Techniques

Communication with our customers• Newsletter• Meetings with the computer crime teams• requests for information and advice• 200 cases each year handled

Page 41: Tools and Techniques

International Co-operation• International Organisation on Computer

Evidence (IOCE )• Interpol (European Working Party on

Information technology and crime )• Lathe Gambit (NATO)• ENFSI - European Network of Forensic

Science Institutes• Contacts with many labs• We also accept cases from foreign

Forensic institutes (law enforcement)