Menu
  • Home
  • Brett's Blog
  • My Books
  • Courses
  • About Me
  • Contact
  • Home
  • Brett's Blog
  • My Books
  • Courses
  • About Me
  • Contact

Brett Shavers | Ramblings

Brett's Ramblings

Subscribe to blog
Unsubscribe from blog
Settings
Sign In
If you are new here, Register
  • Forget Username
  • Reset Password

By accepting you will be accessing a service provided by a third-party external to https://www.brettshavers.com/

direct link
JUL
29
0

Low-Hanging Fruit Report

Posted by Brett Shavers
in  Digital Forensics

Low Hanging Fruit: Evidence Based Solutions to the Digital Evidence Challenge

When I first saw the title, I thought this was going to be something different (as in “low hanging fruit in digital forensics investigations”), but instead realized that it’s a think-tank report asking to approve a new yet-another-digital-forensics-federal-agency tasked to develop a list of ISPs.

Here is my understanding of their proposal

Problem and Objective:

-Cops don’t know which ISP to ask for data

-Teach cops how to ask for data from service providers by creating a “New national digital evidence policy” that is also “going to require a dedicated office”.

Staffing needed for the new federal agency:

--10 to 15 technical experts

--10 to 15 additional support staff

--Director

--Deputy Director

--Administration assistant

--Part time administration assistant

--“Additional staff”

--“Additional expenditures” could include more staff and attorneys

--“Honorariums” to advisory board members

The cost? Hold on to your seat.

--$10 million for staff

--$100 million OR MORE for support

The part of $100 million that rubs me a little raw is that the amount was downplayed because it is so small compared to other government spending. That simply sounds to me like, ‘hey government, you spend so much money, how about I create a new agency and you give me a little off the top, like a cool 100 million?’  Even the staffing requirements are limitless with “additional staff”.

I’m not going into what I really feel about another federal government agency for $110+ million that is created to research the development of a spreadsheet of ISPs just so that law enforcement knows where to send a legal demand…

But I’ll get a little bit into the training that was referenced in the presentation. From their research/survey, they found that law enforcement only receives between 10-15 hours a year of digital evidence training. This was conflated with training related to legal requests (search warrants, etc…) and training in forensics. On top of that, I found no separation between “law enforcement officer” and “digital forensics examiner” in what training they referred. I would say that 10-15 hours a year in digital evidence training to first responders is more than sufficient, but for a forensic examiner, a wee bit on the low side of annual training in analysis, but certainly not insufficient.

Some points of digital forensics training in law enforcement, and the obstacles I have seen go beyond what ISP to send a legal request.  In my experience, practically any detective or patrol officer can type up a legal demand and find out where to send it without having a bit of digital forensics training, yet it was the number one issue in this report.

It’s the individual

There are two types of forensic analysts in government service. One who does the minimum. The other who goes well beyond the minimum.

I have seen some who are assigned to the cyber unit (cyber as in whatever the name of the digital forensics unit is called by each agency), take not a minute more training than being paid to take by their employer. For some, learning a skill for the job is directly tied to being on-the-clock and not a second more. This also applies to law enforcement lifesaving skill training…

The expectation is that the agency must provide everything they need to do their job. I’m not agreeing or disagreeing, nor getting into guild contract issues.  But I will say that some do go beyond that which is given them. I have certainly enjoyed the benefits of government provided training, spending months at FLETC and other out-of-state trips for training. I have also used vacation leave and spent my own money on training, books, and software when I was a government employee because I knew  I needed more than what was going to be provided to me. Hearing statements like, “I haven’t read that book because my department won’t buy it” continues to amaze me.

The difference that I have seen in the skill level between both groups is that of night and day. One detective told me that he refused to go to a forensic conference that his agency agreed to pay because lunch wasn’t covered. He wasn’t going foot the bill for his lunch and turned down the conference. The same detective also simply exports lists of CP filenames in his cases without any analysis, and sends the reports for charging, specifically blaming his lack of analysis skills on a lack of department provided training. A different forensic detective in a different agency spent three months trying to image a hard drive that I had already imaged for him but couldn’t figure it out (errors of some sort, I have no idea), but lives by the same rule as the first example. You no pay me, me no learn.

I’ve seen other law enforcement forensic folks who are forensic gods. Their departments will be at a great loss when they retire or move into the private sector. This is not due to having higher IQs or the agency having a bigger budget but instead, they are putting forth the effort with a willingness to do better regardless of who pays.

Back to the $110+ million dollar agency

The main issue of this research was that cops don’t know which ISP to send legal demands. Their entire premise boiled down to one statement:

“Law enforcement needs to understand where to go to in order to ask for data.”  - Low Hanging Fruit presentation

My solution: We just need to create a list to do that.  

Another issue in the research was that current forensic programs don’t include legal demands in their training. Please, do not start doing this! Forensic training is forensic training.  Legal demands (like search warrants), don’t need forensic training and many times, it is not even the analyst writing the warrants if there is a case detective/agent working the case. Don’t waste an examiner’s time on how to write a warrant when they need to know how to extract the evidence and interpret it.

On the training and skill side of things, I don’t see a federal agency fixing anything as detailed in the report. We already have tons of grants, more training from more vendors than ever before, more folks trying to get into forensics, and more work than can ever be done. I can see $110+ million being spent on more effective measures for law enforcement forensics than what is proposed in this report.

Internal agency specific problems

My suggestions to increasing competence in law enforcement digital forensics is that each agency needs to make changes in how they do business when electronic evidence analysis is concerned.

--Select those who can do the job to do the job (seniority does not equal potential competence)

--Pay for their training (to speed up the learning process)

--Stop rotating them out of the job (or competence in the unit will never be obtained)

--Create promotions within the unit rather than promote them out of forensics

--Remove those who can’t do the job and find someone who can

I make these suggestions only because I have seen it done opposite of what I am suggesting. This is not a federal agency’s responsibility to fix the state and local digital forensics issues, especially at $110+ million.

I’ve been on a few boards and committees at the local and state level at attempts to do something about the lack of LE forensic analysis, but mostly they resulted in lots of talk, lots of notes, and the creation of another committee or board to start over. It is good to see interest in trying to make it better, but sometimes someone just has to put their foot down, stop talking, stop researching, and plainly get things moving.

Check out the research video here:

  4127 Hits
Tweet
Share on Pinterest
4127 Hits
JUL
27
0

Leaking information isn’t the same as sharing information.

Posted by Brett Shavers
in  Digital Forensics

On a couple of private (mostly LEO) email lists that I am on, it seems that emails on the lists are being provided to media outlets, specifically those that relate to breaking into the iPhone. There is not any suspicion as if this is being done, because as I read the articles, I see the actual emails that I have seen in the email lists.  Someone is leaking the emails from the lists. This is different from another email list that I am on where the emails were actually hacked and posted online a few years back.

In this current instance, someone on the list is sending copies of emails to the media, in nearly real-time.

https://www.forbes.com/sites/thomasbrewster/2018/07/26/apple-ios-security-boost-not-stopping-cops-hacking-iphones/#d43899171294

Side note: I’m not getting into how to hack iPhones.

My Opinion of the content of these leaks:
--Who cares?
--There are no “juicy” emails.
--Any information that a government employee creates is already a public record anyway.
--You can divulge every secret known to law enforcement and the intelligence communities, and the methods will still work.
 

However, in this instance of leaking emails to the media, I also don’t think it is a cool thing to do. There isn’t any whistleblower type of information that the public must know; it is just vendor stuff, and the vendors are private companies. If nothing else, the vendors are just gaining more marketing since media is reporting on the companies (see above leaked email as an example).

Plus, it is not cool to leak emails from a list that is intended to share information with those needing the information to work important cases. As someone who worked in military intel, and then investigating violent offenders and terrorists, I know that these cases are important and information needs to be shared in order to be effective.  When a murder needs to be solved, a child must be recovered, or violence prevented, it is the sharing of investigative methods that will solve these cases. Leaks for no good reason only result in less sharing, resulting in fewer cases being resolved, and potentially, more victims being harmed. The fear that answering a question via email will end up on Motherboard means that few will be answering questions. The fear is not that the answer is top secret, but that public scrutiny for the sake of gaining readership is not worth sharing information to most people.

I’m all for public records requests and transparency in government, but for those who make it unnecessarily more difficult to do these jobs…that is not cool at all.  But these email lists do not fall under public records anyway.

As for me, I'll keep sharing because I know as a fact, that one small piece of advice, one small bit of how-to, or a few words of encourgement to keep looking will make a world of difference to a victim by having their case solved. Solving a case doesn't just mean arresting someone. It means the difference of whether or not a family is reunited, whether or not a domestic violence victim can feel safe, and make the difference as to if a victim can finally sleep at night without waking to nightmares of being victimized again.

Shame on anyone who makes it this work harder than it already is.

  3590 Hits
Tweet
Share on Pinterest
3590 Hits
JUL
19
2

A skill you need in DFIR, but won’t find DFIR courses in it

Posted by Brett Shavers
in  Digital Forensics

Working in DFIR requires that you convey information to someone else. There is no way around this requirement. You simply must do it. Whether talking to a client, a supervisor, or a class, you convey information all the time.  I am not talking about communication or interpersonal skills, but rather the act of presenting information as an instructor. I'm surprised that DFIR courses don't address this aspect of the job.

Instructing is telling someone how to do something or how something should be done. (Brett’s definition).

There are drill instructors, adjunct instructors, primary instructors, driving instructors, flying instructors, and instructors for any type of skill, including DFIR instructors. The job of each is to convey the “how-to” in a manner that the recipient understands. Being able to convey information concisely, accurately, and in an entertaining manner will propel your DFIR skills farther than you may realize because you need this skill everytime you have to tell someone about something you did or how someone can do what you do.

I won’t get into the benefits of speaking in front of audiences (there are many), but I will say that if you never work toward becoming a great presenter or instructor, you will not grow as much as you would otherwise. Whether you like to speak in front of audiences or not, does not have an effect on whether you can or not.  I’m nervous every time. I over-prepare way in advance. I worry about things like if my fly is down, or I misspoke, or I am speaking too loud or too soft. Remember: practically everyone else is worried about the same thing when they speak.  It is normal. Anyone you see speak as if they were born to do it, simply worked and practiced.

Here is my DFIR career suggestion. Take an adult learning course, presenter course, instructor course, any course where the goal of the course is to put you on stage to convey information on “how to do” something. You will be amazed at how much speaking to any size audience will enhance your skills and knowledge. It really does. You will also be surprised at the minute details involved in 'teaching'. It is way more than you think but well worth the effort to learn. Don't wait until you become an 'expert' in your job before you consider learning how to present that what you know. Start now.

As for me, I was fortunate to get an early start. At 19, I was an instructor in the Marines and through the next 20 or so years, I went through at least 15 instructor/train-the-trainer courses in both military and law enforcement. Had I known at the time how important those courses would be for me today, I would have put even more effort into the courses than I did. As for you, know now that this is such an important skill, that you need to start today and hone it because you can use this skill tomorrow.  Don't wait for a course that teaches you how to teach DFIR topics. ANY instructor/adult learning course works as the concepts and principles in the courses are what matters, not the topic. You'll learn little things like, 'don't walk in front of a visual aid', and major things like, 'how to be entertaining to keep interest'. 

If you think you already know everything you need to know about effectively presenting a topic, or conveying information to a client/boss, you may want to rethink what you know, if you haven't had any coursework in it. I’ve not taken an instructor course or adult learning course where I did not learn something that completely changed the way I present in some form or another. 

Consider that in Jessica Hyde’s DFIR Hierarchy of Needs, there are two levels of sharing information and giving back to the community. Both of these usually require conveying that-what-you-know to someone who may-not know anything about what-you-know.  Yes, if you can write, that helps. But if you can instruct in addition to writing, I promise that you will grow so so much more.

Going back to Jessica Hyde and her blog about the DFIR Hierarchy of Needs, I look at the hierarchy as being dynamic in nature. We continually train, continue work cases, continually share, and continually give back. When I look at the triangle, I see that any person can jump around from level to level or be in more than one level at the same time. Keep in mind that you don’t need to start at the bottom and work through to the top before you can give back.  That means you can be presenting at any level.  So why not get started now?

To put a little more emphasis into how important this is, if you cannot write and cannot speak, then no matter how good you are at your job, not only will few people know about your work efforts, but you will not be sharing your knowledge with anyone. To not share or teach is to have stunted growth. For those who wish to neither write nor speak, that is a personal decision because nothing requires anyone to do anything to better the field or themselves.

From personal experience, I remember sitting in my first forensic presentation given by Troy Larson in Seattle way back when. Troy was apparently speaking a language that I did not understand, because I didn't have a clue as to what he was talking about (I was really really green at the time...). But he kept me engaged and entertained.  Enough that I wanted to keep going. Today is different (and I can understand what the DFIR pros are talking about...) and I credit most of what I have learned simply because I choose to research it, write about it, and teach others about it.  I certainly don't know everything, but everything that I know, I can teach someone else to do what I can do.

 

 

  4766 Hits
Tweet
Share on Pinterest
Recent Comments
Guest — Jessica Hyde
Agreed! Being able to present information is a necessary skill. Also agree that traversing the pyramid is continual and that you c... Read More
Friday, 20 July 2018 02:41
Brett Shavers
i'm constantly on the fundamentals level....things keep changing and you tend to keep coming back to the basics to be able to move... Read More
Friday, 20 July 2018 09:54
4766 Hits
JUL
14
0

The Internet is all fun and games until someone gets killed

Posted by Brett Shavers
in  Digital Forensics

Let me preface this post:

When I worked undercover, I was one of the most paranoid extremists in trying to be as unrecognizable as possible. I worked cases involving dangerous individuals, career criminals, street gangs, and organized crime groups that operated not only locally, but internationally. While undercover, I was searched, followed, interrogated, and threatened by those I was investigating both inside and outside the US. One night, I had a gun stuck in my belly and quickly learned that the brain is the most important security feature that we have.

Let’s get to the point of where the ethics and morals fit in

So, while on twitter the other day, I saw a “live event” that a plane passenger was tweeting. The passenger and her boyfriend were taking photos and videos of two unidentified passengers and creating a ‘love story’ between them, even to the point of following them to the baggage claim. The two unidentified passengers were unaware of the online event they were the focus of. Even their private comments were being tweeted. The spectator comments only encouraged more of the same, even with T-Mobile CEO John Legere stepping into the tweet stream to offer free WiFi to keep the story going .Voyeurism at its finest, security at its worst. The female victim (I say victim as she had no choice in being the target of online voyeurism) has since been doxed, stalked, insulted, and harassed, leaving her to delete her social media accounts and hire an attorney to speak for her.

The point is that we in the cyber/information security community should take stories like this as ethical and moral reminders. Although personal privacy has been eroded due to haphazard use of the Internet, let’s not be part of that problem. Just as important, educate others to not do this sort of thing either. Any person who touches the electronic data about any other person surely assumes the awesome responsibility of securing that data against inadvertent and intentional release into the public space. Also, creating data where other persons can be negatively affected should be treated no differently.

Some of this is easy. We sign NDAs with clients that legally bind us to protections of client data. We see things in the data that is sometimes embarrassing for clients, yet it never crosses our mind to publicly out the information. We are professionals, both at work and private lives.

Some of this may not be as easy. If you are hunting for, or inadvertently find, publicly accessible data (which should not be publicly accessible) on the Internet, and you have no legal obligation to safeguard the data you find, fall back on ethics and morals. For those who don’t care (ie; no morals or ethics, or just plain evil people) finding and publicly outing embarrassing data causes no dilemma to them; in effect, the hell if someone gets harmed (or even killed) because of it.

For those who do find this data and care about security, do what you ethically are obligated to do, based on what you found, how you found it, and what should legally be done about it. Different situations are different, and if you are ‘ethical’, then you know what you should do.

We live in an amazing technological age that is nothing related to the pre-Internet days as if we live on a completely different planet.  Take bullying as an example. The difference between traditional bullying and cyber-bullying is so far apart, we should have a different word for bullying because of the dramatically more harmful effects ‘cyberbullying’ has compared to bullying of days before the Internet.  Today, bullying lasts forever, because the Internet is forever. 

When we can tweet a thought faster than we can actually think about what we are doing, we risk harming ourselves and others out of sheer carelessness.  Consider Twitter like an arrow flown. Any person tweeting about another person, can directly impact that person's life either positively or negatively. The range of effect can also be a small embarrassment to suicide. Wielding the Internet is an awesome power that we treat as serious as putting on our socks. 

Even taking photos in public, where bystanders are unknowingly included the photos (legal, as they are in public, right?), photos posted online can have harmful ramifications. Imagine a photo of someone in witness protection, or the victim of a domestic violence, or even an undercover officer who is off duty with family. They may not want images of them on the Internet for good reason. Be judicious in your photos in public places as the last thing you'd want is to hear about a murder victim who was identified by the suspect through your Facebook photo at Disneyland.

So, I propose that in addition to our moral, ethical, and legal obligations of personal security and client data security, we take into consideration the security of others who are doing nothing more than going about their business in public. You might never comprehend the damage done to another person with a photo, a tweet, or social media post that you made. But now that you know, you should be make others aware as well.  Be the security pro that can also talk about security outside the CPU.  And certainly don't be that person who harms someone else just because you can or because you have no idea that you are doing it in the first place.

 

**side note**
I'm not referring to being snarky, sarcastic, self-deprecating, or legitimately humorous online. I’m talking about being intentionally mean or ignorant as to the harm done to others through comments and memes. I know that 2019 is already approaching, but the Golden Rule still applies regardless of what year it is.

  2683 Hits
Tweet
Share on Pinterest
2683 Hits
JUL
07
0

Interconnected Devices Investigations

Posted by Brett Shavers
in  Digital Forensics

Reading through the paper“Forensic framework to identify local vs synced artefacts” from DFRWS 2018 Europe, I came across a paragraph with several statements that I had to read twice, actually several times. The paper cited a book that I wrote in 2013 (Placing the Suspect Behind the Keyboard). The paper states:

“…he fails to make any reference to the challenge that will result from attributing data to a specific device.."

Actually, back in 2013, in that cited book, that was exactly what I wrote about: the challenges of not only attributing activity of a user to a device, but the activity and data of interconnected devices. Then I read...

“Shavers does not raise the challenge of trying to determine on which device the data was created is consistent with what we have seen in the computer forensic community.”  

I respectfully disagree with the premise that the forensic community has not been trying to determine which device data has been created.  Even going back way before 2013, metadata has been paramount to every case, from all evidence devices, connected to each other or not. As soon as mobile devices became connected to other devices, correlating the data between devices became something done as manner of practice. To state that “It is something that computer forensic examiners are not even considering in many cases” is foreign to me. One of the major points of my first book was to instill the concept that electronic evidence needs to be integrated with the physical world to make a complete case (or more eloquently, paint a beautiful picture). 

 Oh well. They must have missed those pages about inteconnected devices...and the pictures of interconnected devices too...

Today’s lesson, “Interconnected Devices and Your Investigations”

There are two things to consider with interconnected devices in your investigations:

1)      Do the forensics independently on each device

2)      Correlate the evidence you find from all the devices

That’s it. There isn’t much more to the secret other than forensics in/on the cloud. Interconnected devices may likely have data contained in the cloud (it’s how the data propagates between devices…). But even then, correlating the data between devices is no more difficult than the forensic work you do on each device.

Here is a visual figure from Placing the Suspect Behind the Keyboard, where I show a visual of a circle of interconnected devices. Every case you do, you should be thinking about this circle that revolves around your suspect (or custodian). It is constant and ever-changing with new and newly replaced devices. Keep this in mind as we continue.

The “I didn’t sync that file to my phone” defense

Let’s take a scenario of finding evidence on a mobile device that is synced to other devices (and the cloud) through a service like Dropbox. Finding the evidence on the mobile device, which was seized from the suspect, in which only the suspect ever had control, generally ties that evidence to the suspect. The defense that mobile device evidence was unknowingly synced to the suspect's mobile device depends on who else had access to the synched accounts.  Meaning, if the suspect is in sole control of the Dropbox account, then the synced files are his. If not, maybe they are and maybe they are not. You need to dig a little more to be sure.

The “Someone else searched that on my home computer” defense

Internet browsing synching is cool. You can bookmark something on your home PC, it gets synched to your tablet, and also gets synched to your smartphone. Cool. However, if browsing history is the evidence found on the tablet, it might be important to know if the evidence was synced from another device if other persons had access to the other devices. Conversely, if the suspect has sole control of all devices, then the defense claim is moot as only the suspect had physical access to all devices (or is the only person with the creds to log into the devices).  There is a trend here: he who controls the devices is generally going to be the possessor of the evidence found on those devices.

Ease your mind by doing a little extra work

With every case I have ever done, I have always wished that I had more time to work it. No matter if I worked 10 hours on a case or 10 thousand hours, I can work a case forever because I want to make sure I got it right. With that, you can probably tell that I love interconnected devices in a case because it gives me corroboration of what I found on other devices in a case. Even evidence files that are not synched between devices are great finds to corroborate findings and suspect’s intentions.

A lack of activity can be an indication of activity

Smartphones are great for historical activity. If Google is turned on (as in, logging everything you do), you can recover a great deal of geolocation data, which can be accessed through Google without even having the device in hand. This is a great tool for investigators. Just as cool is that for criminals who leave their phones at home when they are criming* in town, even a log of missed calls can give an indication that perhaps the suspects weren’t actually home with their phone since no one answered any of the incoming calls…or logged into email…or surfed the net…all while a bank robbery or drug deal was happening downtown…  Historical activity is great to place suspects at a scene, and a complete lack of activity can give indications they were not where they said they were.

Circles of non-interconnected devices can be connected to each other

One suspect with multiple devices is easy enough to put together. Examine all the devices in the suspect’s circle of interconnected devices and put together a timeline of the important data points.  But here comes the really fun part: In some cases, you have several suspects and each suspect has his own circle of interconnected devices. This type of case gives you a world of opportunities to reconstruct history by combining each suspect’s circle of interconnecting devices into one glorious timeline.

I’ve done this type of case on few occasions and assisted others. Without doubt, it is an immense amount of effort that exponentially increases with every device. In one particular case, we had a big box of smartphones was seized. The case revolved mostly around geolocation and text messages. The end result was that each phone geolocations were matched to a person, and the text messages matched between phones. Those with multiple phones had the identical geolocation on their phones, indicating they were carried together. The timeline of criminal activity was superimposed over the geolocation of each device along with text messages sent/received by geolocation. I can tell you that there are a group of criminals who will forever hate mobile devices because of this work.

We simply connected a circle of interconnected devices to other circles of interconnected devices and let the data paint the picture of what happened. Very cool. And you can do it too.

**updated with a tidbit more information**

Check out Magnet Forensics on how its software connects artifacts together in an automated process.

https://www.magnetforensics.com/blog/axiom-connections-qa-part-1/  

*the act of committing crimes, “criming”

 

  3803 Hits
Tweet
Share on Pinterest
3803 Hits
JUN
27
0

Old hat investigative work will always work

Posted by Brett Shavers
in  Digital Forensics

The Reality Winner case is good example where a basic investigative method still works regardless of how much publicity that the same method has received for years prior. In the Winner case, printed documents were tied to Winner based on “microdots”. This article below does a decent job of explaining what micro dots are if you haven’t heard of this before, or if you associate microdots with LSD...


https://www.grahamcluley.com/reality-winner-pleads-guilty-after-being-unmasked-by-microdots/ 

Basic (and non-secret) investigative methods suceed more often than not, and actually happens all the time. It doesn’t really matter that criminals know police investigative methods, because the methods still work. A personal example that I had when I was doing drug investigations, was ‘knock-and-talks’, where my partner and I would knock on the door of a suspected drug dealer and ask consent to search for drugs.  On one knock-and-talk, we were given permission to search a home that had hundreds of marijuana plants. Not that unusual. But what was unusual was finding a book written by a prominent Seattle defense attorney, opened to a page on “Police Knock and Talks”, with a highlighted sentenced that stated something to the effect of ‘Say no to the police when asked for consent to search’.  Even the attorney’s business card was used as a bookmark that had the same advice printed on the back of the card. Yet he willingly let us in.

This concept applies to all aspects of investigations, including technology related investigations like the Reality Winner case.

Part of the reason why the tried and true, traditional methods continue to work is that no matter how secure a criminal will try to be in all that he or she does, there are times where complacency creeps in. Add a bit of arrogance (“They’ll never catch me!”), and BAM. It’s over.

I’ve had cases where a dozen hard drives were wiped clean, but another dozen had plenty of evidence (illicit images). In these instances, the suspects were fanatical about wiping evidence until they weren’t. This applies to everything that anyone does with their electronic devices and online behavior. Complacency allows traditional methods to work and the complacency monster always wins because eventually everyone slacks off in something they do eventually.

Search warrants are not difficult to get

In a recent court decision, law enforcement is now required to obtain a search warrant for cell phone records. If you didn’t know how it worked before this decision came out…

http://www.governing.com/topics/public-justice-safety/tns-supreme-court-privacy.html

Depending on how you think this affects you personally, your perspective may be different. But in all practical reality, nothing really changed. Your cell phone records are not protected from reasonable search and seizure. The records are still there, and if probable causes exists, law enforcement can get it with a warrant. I do not believe any criminals are jumping for joy over this court decision, because they are still ripe to have their records pulled with search warrants.

As far as how difficult is it to get a search warrant…it’s not difficult at all if you have probable cause. I have found that the longest time to apply for a warrant is the time it takes to type up the affidavit. The faster you can type, the faster you can get a warrant. The rest of the process only takes minutes (not counting any traffic while driving to the judge’s home…). But you don’t even have to type up a warrant if you don’t have time. Simply call a judge, get sworn in over the phone, and ask the judge for a telephonic warrant with a verbal affidavit. I’ve done both ways and typically had a signed warrant in under an hour…nearly every single time. I've had warrants in less than 30 minutes on a few occasions. If a warrant is needed faster than 30 minutes, then you might be dipping into exigent circumstances, which is a different topic.

Your cell phone records probably weren’t going to be pulled anyway, and won’t be unless there is probable cause to do. As for criminals knowing that cops need a warrant now, that won’t make a bit of difference as to how they use cell phones to commit or facilitate crimes and it won’t make a difference in that law enforcement will still get 100% access to everything. 

The point

No matter how sophisticated your suspect in (or custodian in a civil case), never forego looking for the low hanging fruit first. Don't assume that files were wiped, browsing was only done with Tor, or that the suspect didn't use his home Internet to hack into a victim's system. Because they do and always will. Old hat stuff works.

 

  3003 Hits
Tweet
Share on Pinterest
3003 Hits
JUN
19
1

In the #DFIR world, it seems like everyone is an expert….

Posted by Brett Shavers
in  Digital Forensics

…because everyone can be an expert.

One thing about the DFIR field and all of its ever-encompassing related fields, is that it is physically impossible for any one person to be an expert in the entirety of the field. To even try to be ‘that DFIR expert’ is to set yourself up for failure.

I base my opinion on what I’ve seen over the years, especially after the first time being court qualified as an expert. Once, I was even qualified as a “computer forensic expert”. It makes me cringe every time I think about that, because as far as I am concerned, no one can be realistically be an all-encompassing DFIR expert.

The reason I distance myself from being looked at as an expert is that the perception of what a court qualified expert means to many people is most time incorrect.  Being an expert implies that you know everything, that you are smarter than anyone else in that area, and that your opinion is practically fact. 

Reality is a bit different.

Without getting into the nitty gritty of expert witness testimony or how to become court qualified, let me talk about the one aspect of specialization. If you are in the field of DFIR, working to get into the field of DFIR, or preparing yourself to eventually get into the field of DFIR, you have a 100% chance of becoming an expert in a shorter period of time than you can imagine.

You can do this because you can focus on something in this field, something as little as a few bytes or as massive as some function of an operating system and learn everything about it. You can learn so much, that eventually you start discovering things about it that no one knows. You can be the expert of that thing that you researched. Do not take this lightly. If you are looking for something to propel you into DFIR, find something that no one is doing, cares about, or knows about. Research that thing and find the DFIR relationship of that thing. Master it. Publish it with any means possible, including a blog post.

I can see the future…

Here is what will happen if, I mean when, you do this. You will be recognized in the community as an expert. Court? You will shine as an expert. Confidence? Oh yeah, you will get some. Take that one thing you did and do it again with something else.

That’s all you need to do.

A warning…

Once you become noticed for something in DFIR, you are going to be known as an expert in DFIR, which means some will will think that you know everything.  For example, I was having I was having a conversation with an awesome malware researcher, who has done amazing things in her career. She can tear apart malware as if it were packaged in a wet, paper bag. As for me, I can reverse malware too! However, I can’t do it as well, or as fast, or as complete as she can. Nowhere near it.  It is not the best thing I that I can do. I actually have a 90-second conversation limit when talking about reversing malware, because after 90 seconds, all I hear is a foreign language that I do not know. (I have been increasing my 90 seconds of knowledge on a slow, but steady rate...).

The point in this story is that in this awesome conversation, after that 90 second mark, I am sure that my face turned blank and she realized that she was the expert in malware, not me. There is nothing wrong in not knowing something, and part of the expertise field is recognizing your limits, that others will know more than you do in one area of DFIR, and you will know more than they do in other areas.  This is also makes a good team, when team members cover a broad range of expertise, spread out among the team. 

So don’t be shy to say, “I have no idea what you are talking about” when you have no idea of what someone is talking about, because in this field, we each do different things, enjoy different aspects, focus on different specifics, and excel in different facets. That is how you can be an expert too. Focus on that one thing, and one thing at a time.

  2691 Hits
Tweet
Share on Pinterest
Recent comment in this post
Guest — Christina
You're perfectly right!! IT Security and DFIR are so broad topics that nobody can cover everything and being an 'expert' is always... Read More
Friday, 22 June 2018 01:43
2691 Hits
MAY
27
0

Why does Google think this is a good idea?

Posted by Brett Shavers
in  Digital Forensics

An incredible new Gmail feature, “Confidential E-mail Mode” by Google looks to be one of those wonderful surprises that will be catching people off guard in a bad way.

TL:DR version.

Send an email using Gmail in which Google puts a link in the body (and removes your e-mail content from the e-mail). The link, in which only the recipient can open, opens an external webpage where the e-mail content can be read. The e-mail can be read, but not forwarded, downloaded, copied, or printed. This is probably a bad idea.

Google needs to first define what “confidential” means as it applies to their Confidential Mode e-mail. In plain understanding, it should mean that only the intended recipients should be able to read the contents as it is private. In practice, the email is still on Google’s hard drives, most likely still indexed by Google, and ‘deleted’ only from the sender and receiver’s view, but not from Google.

As a point of privacy, Google Confidential E-mail is not private and average users could mistakenly believe the Google confidential E-mail is encrypted e-mail that no one can read.  The good news is that if Google is not deleting the messages from its servers, they would be available with court orders in criminal investigations.

Only one of my Gmail accounts has the Confidential Mode option, and you can send a Google Confidential e-mail to any e-mail service besides Google and it will work the same: User clicks a link in the e-mail and prays that the e-mail is legitimate. 


 

 

Perhaps the biggest issue will be the ease at which phishing campaigns will take on using a Confidential Gmail, where the user has no idea of the content or can judge maliciousness based on content.  Users will now only have the sender and subject-line to determine if the e-mail is a phishing attempt. If the sender e-mail address is from a known sender that has been compromised or spoofed, then only the subject-line will be available for a clue as to the legitimacy of the e-mail.

Nothing should change related to host forensics, as webmail/Internet forensics is the same (same or more difficult depending on everything, such if the Tor browser was used).

The big change is yet another entry point through a potentially well-crafted phishing attempt using a Gmail feature.  Users can’t see the content until they click the link to open the external webpage, which will be too late. Personally, I don’t see this taking off as a widely used feature since it involves adding a step to read an e-mail.  One extra button will make it useless as it will be more frustrating when it consumes three more seconds to read every e-mail sent via Confidential e-mail. As for the Confidential e-mail not being able to print or forward, taking a photo with a smart phone quickly negates the security feature of deleting the e-mail all together (yes, I know the content may be gone, but the original e-mail metadata is still there with the original e-mail).

For the infosec folks. Maybe it is a good time to make sure users don't click links in e-mails. Hey…don’t we say that already anyway? Sheesh.

Thanks Google.

  3123 Hits
Tags:
gmail email phishing forensics dfir
Tweet
Share on Pinterest
3123 Hits
MAY
20
1

Don't become a hacker by hacking back a hacker that hacked you

Posted by Brett Shavers
in  Digital Forensics

Emotions run deep if you are victimized.  Initially, you want blood at any cost.  You also willingly accept any potential future regret, as long as you get blood today.  And unfortunately, no matter how fast justice may come, it will not be soon enough.  This rationale applies to being a victim of any crime and having your computer system hacked counts.

I’ll give a quick two cents in this post just as I did to a victim-client that was hacked.  "Don’t hack back."  Stop talking about and stop thinking about it.  To be clearer, make sure everyone in your company understands not to hack back. Better to focus on plugging the holes and implement your response plan.

Here are some bullet points I give to clients who are blinded by revenge and want blood:

  • You might spend more money than you have in a vain attempt to ID the attacker
  • You might hack an innocent party
  • You might hack a nation-state
  • You might be hacked back by the “innocent” party you hacked back (eg: a nation-state or a better hacker than you would be)
  • You might become a criminal hacker

There are more reasons, but I believe these pretty much cover it.  Going broke, victimizing an innocent party, and going to jail are strong motivators to counter the emotion to exact revenge on a hack.

 

  3577 Hits
Tweet
Share on Pinterest
Recent comment in this post
Guest — Aaronreid
Hum. That almost sounds as its directed towards me. But one question mr Shavers .would u sit back.let.the.invade your basic right... Read More
Monday, 05 November 2018 20:10
3577 Hits
APR
24
0

Digital Forensics Tenure in Law Enforcement, and other fairy tales

Posted by Brett Shavers
in  Digital Forensics

Occasionally I am asked by police officers working in digital forensics if they should leave their current job to go to the private sector.  Luckily, I can now refer them to read Eric Huber’s blog series “Life After Law Enforcement: Do I Stay Or Do I Go?” to let not your heart be troubled when making this decision.

For the vast majority of everyone working in law enforcement, the effort to eventually be issued a gun and badge can take a year or more.  I’ve only known one person in my career who decided to apply on a whim and be hired in months.  Literally within six months from submitting one application to one department and being on the street in a patrol car.  Everyone else I've ever known in law enforcement (including me…) took more than a year to even be offered an interview after a battery of physical, mental, and written exams after applying to many agencies.  If you haven't experienced the LE hiring process, you may not fully comprehend how difficult this decision can be.  Compared with the private sector where you can practically be hired on the spot and start the next day (and negotiate a higher salary!), getting into LE is a bit more time consuming and more difficult. 

With that, when I am asked about leaving law enforcement before retirement to get into the private digital forensics world, I have never ever said, “Go for it!” or advised “Stay where you are!”.  It is a personal decision.  However, there is usually one point that I have to help make the decision, which Eric touched on. The main point for me is that for many law enforcement agencies, working in digital forensics is a temporary gig.  Few agencies allow for a career working in any specialty, and digital forensics falls into that category of a temporary assignment.  Being promoted is more like a trade of your digital forensic dongles for chevrons or bars.

A police officer who is assigned to work digital forensics, who is also trained to the hilt in forensics on the public dime, and inundated with incredible case experience usually has a date on their calendar when the uniform will be put back on in order to work a beat, driving a patrol car…. never to plug a dongle in again.   I have always found it incredible, as in unbelievable, that police agencies do this to all specialties with only a few exceptions.  Even when someone is Knighted by the Chief to be permanently ‘exempt’ from rotation, that exemption is many times taken away at some point, which basically means you are permanently exempted until we decide the permanence was only temporary.

Given that the majority of police agencies are fairly small (less than 100 officers), it is understandable that the agencies want to spread the wealth among officers by giving everyone a chance to work a specialty position, such as SWAT or narcs or cyber crimes.  And it is understandable that those who want to get into a specialty, like digital forensics, are advocates of rotations back to patrol simply because they want the old guy out so that they can take their spot.  Both perspectives work to placate the officers, at least initially.  It also gives the impression to administrations that a highly trained digital forensics examiner who rotated back to patrol will be good for patrol to bring that experience to the street.  In reality, both perspectives don’t work.

The same officer who demands that rotations happen will also be the same officer fighting against rotation after having learned how much effort and time goes into becoming competent in that specialty.  Agency heads learn (and ignore) the fact that a 10-year detective going back to patrol isn’t going to be able to put that expertise to work on the street simply because it is a different job.  The former detective experts also are not going to be turn a patrol squad into super detectives simply by being there. It doesn’t work that way and is unreasonable to think otherwise.  You want street cops working the streets, not detectives driving police cars.

This brings me to two personal examples.

In one example, a friend of mine left law enforcement because he was told that due to career progression, he would be moved out of digital forensics.  In this case, career progression meant ‘we are taking you out of forensics to give someone else a chance to learn forensics’.  This was an investigator with more than a decade of experience and training.  I would rank him top in the LE field of forensics.  He subsequently quit and went joined the private sector world of digital forensics.  Years later, his skill and knowledge became more awesome.  And he is happy.

Conversely, another friend of mine in digital forensics was rotated back to patrol, and he had the intention of retiring from LE years later to then get into the private sector world of digital forensics.  Unfortunately, by the time his retirement rolled around this year, he was well out of the game.   You may be like me when you gauge someone’s experience in DF with the versions of software they began with.  In this example, my friend rotated out of digital forensics when he was using Encase v4 and hasn’t done forensics since.  That says a lot, at least in my mind.  Leaving so long ago means that getting ‘back’ into digital forensics is more like getting into it from the beginning (not as bad, but close).  And he is not happy.

So, for the questions I get from active police officers asking this question, which many of us have asked ourselves, I simply say, go check Eric Huber’s blog for points to consider.  But also consider that if you really like police work and digital forensics in police work, you may want to figure out a way to keep that specialty for as long as you can, because eventually, the street will drag you back and the odds of doing forensics when you are taking stolen bicycle reports and running radar are slim to none.

  2969 Hits
Tweet
Share on Pinterest
2969 Hits
APR
12
0

Zombie-Cases:  Did you ever have a case that just wouldn’t die?

Posted by Brett Shavers
in  Digital Forensics

I just finished up Case Study #8, with one of those types of cases that just won’t die.  If you ever had a case like that, you know what I mean.  If you don’t know, it simply means that as much as you try to close a case (“kill it”), it keeps coming back to life.  This happens with both civil and criminal cases (and internal corporate matters as well).

A few reasons that a case may live on well past the time you wish it would are; 

  •          You keep finding more evidence, even after the investigation is over
  •          Corners were cut and now the devil is calling
  •          The attorney keeps asking for more work on it
  •          Trial comes and goes, then comes back again, then goes, then…
  •          Evidence you initially found is now found to be inaccurate
  •          Interrogatories and interviews come and go and come and go and keep coming
  •          More jurisdictions join in
  •          Case agents/officers keep changing and rotating and being reassigned
  •          Errors that were made are now coming to light, just in time for court
  •          Reports are missing or don’t contain necessary information
  •          And worse yet, the case hits the news

Case Study #8 takes a case that has a few of these things, but as for how to keep a case from coming back to life, there are things you can do to reduce the risk.   The most important method is to do a thorough job.  Doing a good job will reduce the chances of a zombie case by 90%.  Do good work, double-check your work, triple-check it, and you have less than a 10% chance of it biting you later. 

The remaining 10% chance of your case turning into a zombie is probably out of your control.  If you are given the wrong information, evidence is misinterpreted, or workers in your case don’t do a good job, there is a good chance that the 10% zombie case is coming for you.  And of course, if the suspect wants to fight tough-and-nail, it will drag on.  However, if it is bad enough (ie: news worthy because of investigator ERRORS), and someone leaks it to the news media, you now have a full-blown zombie breakout that will last not only years, but perhaps the better part of your career.

Back to preventing the zombie-case outbreak

Do a good job.  Even on those cases that seem minuscule at the time.  You never know how one seemingly insignificant case can end up reaching the Supreme Court, and not because you did a good job, but just the opposite.  Trust me.  I’ve seen it.  Seriously.  Do a good job, because when it happens, it is so much better to be the person that did a good job in the case and not be the one that screwed something up.

#DFIR Case Studies #8 released today. I picked a case where an innocent person was arrested and talk about the mistakes to avoid.
Get the entire case study series + the WinFE course with 3-day promotion at: https://t.co/aKZhmkijc4 #infosec pic.twitter.com/TQQKSPuOsq

— Brett Shavers ? (@Brett_Shavers) April 12, 2018

  2537 Hits
Tweet
Share on Pinterest
2537 Hits
APR
09
0

"I don’t want to learn.  Just give me the answer."

Posted by Brett Shavers
in  Digital Forensics

Figure it out

It’s been more than a few years since I was in the Marines, even though it still feels like yesterday.  Although it has been decades (has it really been that long?), it seems that I am still learning lessons today that the Marine Corps exposed me to back then.  I mean that in the sense that many times I come across an obstacle in life or work that is solved by falling back on the little things I learned way-back-when.  One of the biggest lessons I ever learned: Figure it out.

I give credit to technology for making our lives easier, which doesn’t always mean for the better.  If you don’t know something, you can ask Google and get the answer.  In fact, as you type your question, Google practically reads your mind and finishes your question for you while at the same time, giving you an answer.  I believe that this part of technology is a disservice, especially those in the DFIR field because being told the answer is not the most important thing compared to personally finding the answer. It is the journey, not the destination.

My first response to being asked “how to do something” is “Did you try everything you know before asking me?”  Whether it is a student or a peer, if I am asked a question, I naturally assume that everything possible was tried before asking me.  If not, I question the question of asking in the first place because asking without trying to figure it out yourself is simply asking for the answer.  You are asking to get to your destination without taking the journey.  You are asking someone to do your homework for you.  This is the easy way, the wrong path to take, and will gradually put a cap on your skills.  Try before asking.  Then try again.  At some point you will run out of different attempts and then when you ask, I know (or will assume) that you tried everything you know how to try.  Hopefully before that comes, you will find the answer before asking for your sake. Giving the answer will not be helpful if you have the ability to figure it out yourself.  By the way, it is way easier for me to answer a question than it is to push and prod for the student to figure it out.  Answering takes me 15 seconds while being patient to watch the process can take a lot longer...

I teach the Figure It Out* method because the Eureka!  moments are those times where you learn something that you will never forget. It is embedded into your cranial cavity as if you were the first person to ever discover that answer.  In reality, everyone could have known the answer before you, but as far as your brain is concerned, you did it first and therefore, will remember it forever because you discovered it.  This doesn’t work if someone tells you that “C” is the correct answer.  You will forget being given “C” as the answer minutes afterward but you will remember the “Ah ha!” discovery for a lifetime.  You will actually be able to figure out more problems because of increased confidence.  It's a good cycle to be in.

But, I have found that some people don’t want to take the journey to discovery.  They truly just want the answer for a varied number of reasons, which are technically defined as excuses.  Procrastination is not a reason.  Laziness is not a reason.  Not caring is not a reason.  Because Google answers it for you is not a reason.  I tend to feel that we need ‘figuring it out by yourself’ as a high school class, where cell phones are not allowed, nor any Internet, in order to teach that using our own brain is what solves problems. 

As far as how the Marines do it….when given the order to “Have your squad at this point by 0300” or "get across that river in the next 45 minutes", there were no answers on how to do it, what to take, what to eat, what to wear, or when to leave.  There were no expectations of failure or answers to what happens if you fail.  No Google either. Simply, you are given a mission and you figure out how to complete it.  That is what we do in DFIR.  We figure it out.  We have to.

 

How to figure it out

I'd be remiss in not giving some guidance on how to figure it out, or at least how to ask a question.  Firstly, depending on what you are doing, figuring it out is going to be different every time.  Basically;

1. Read the instructions, try and fail.

2. Figure out where the problem started and,

3. Try again.  If fail..

4. Go back, read the instructions and guides again, try to find where the error may be solved.

5. Try again.  If fail...

6. Get online and search.  Forums, support/chat rooms, email lists.  Find someone who has documented the same problem.

7. Try the suggestions that you found.  If fail...

8. Put together your question.  Do not ever ask, "Hey, this thing doesn't work.  Can you make it work for me?".  Rather, write up your question like a mini-research project: 

   -"I wanted to do this."

   -"But I got this error."

   -"So I tried this and got this error."

   -"Then I searched for an answer and found these suggestions."

   -"I tried again with the suggestions and got this error."

   -"I don't know what else to try.  Can you point me in the right direction?"

When I get a question like this in class, I am happy.  Maybe a few more tries would have done it, but there is a point where if each try is simply repeating the exact process without changes, it is time to stop and ask.  Part of the learning process in DFIR is self-learning.  That which you cannot teach yourself, take a course in that topic.  Read books.  Engage in conversations about the topic.  Practice and research.  The last thing that should on your mind is thinking that "I'll just ask for the answer" without first making some effort to learn first.  

*I can't claim credit for the "Figure It Out" method, since it was yelled at me by many senior Marines until I Figured It Out.

  3945 Hits
Tweet
Share on Pinterest
3945 Hits
APR
07
0

5 Cool Things You Can Do with the Windows Forensic Environment (WinFE)

Posted by Brett Shavers
in  Digital Forensics

I’m a fan of WinFE.  I’ve used it, written about it, helped develop it, taught it, and assisted others to teach it.   The way that I talk about it, you’d think that WinFE is the best thing that ever came along, does everything you need in forensics, and nothing can out do what it does.    Actually, WinFE doesn’t do much at all.  But that for what it does, it does ingeniously.

The top 5 cool things

#5 Forensically boot a Windows, Mac, Linux machine to a Windows Forensic Environment

#4 Forensically Boot a Surface Pro to a Windows Forensic Environment

#3 Image storage drives (full, sparse, or targeted) with Windows tools

#2 Perform a triage or preview with Windows tools

#1 Do a complete exam with Windows tools on the evidence machine

There are even more things you can do as well that makes WinFE cool, but this is a good start.  Being a free tool makes it cool too.

What’s the big deal?

WinFE forensically boots to Windows. That means you can use Windows-based forensic tools!

The numbers

3,447  *  Years ago, I threw together a quick WinFE online class for free.  Over 3,000 took the course before I eventually took it offline since WinFE has had several updates since the course was developed. 

5,592  * I recently put on a longer Forensic Operating System course (that focused on WinFE more than other live CDs) and as of today, more than 5,500 have taken that course.  

15,000  * That’s the number where I stopped counting the downloads of the WinFE script and various WinFE builders from over the years.  That doesn’t mean 15,000 WinFE users, just that it is a lot of downloads of past and current WinFE build projects.  That also does not include WinFE basic builds where Microsoft downloads are required (and not a WinFE project).

The point is that WinFE is a valid tool used by many, and since there is no marketing department for it, I'm marketing it because I use it and prefer that it remain relevant in the community...so I can keep using it :)

The latest WinFE course

I had been asked for a new course just on WinFE and not any of the other live CDs, so here it is.  I included the multiple types of WinFE builds including Windows To Go in order to cover everything about a Windows-based, forensically sound, bootable operating system.  This course is only for those who did not take the Forensic Operating System course, since the WinFE information is the same in both courses.

Of course there is a promotion 😊

For any course I publish, you probably noticed that for a few days, I have a promotional discount.  This course is no different.  I ask that you share the promotion because invariably I get emails asking to extend the promotion (no extensions….sorry).


The new Windows Forensic Environment online course is open! Use promo code "miniwinfe" for 50% off through April 10 for the first 100 registrations.https://t.co/urGlmsKHLH #dfir #infosec pic.twitter.com/duU3fEYnHU

— WinFE 💽 (@WindowsFE) April 8, 2018
 


The Windows Forensic Environment social group

Since WinFE isn’t a commercial tool, with no developers or support staff, it has been pretty much living on its own, being pushed about by its community of users.  Searching for WinFE gets you about a dozen websites, most of which is outdated information, without any sole collection point.  Therefore, there is now a group for it. 

 

I will be putting everything in the social group as it comes up in terms of updates to WinFE building, usage, powerpoints for training, and curriculum if you want to have a turn-key model to add it in a forensic course that you teach.  Only those who have registered for either this new WinFE or Forensic Operating System course are invited.  The social group is a repository for community support, related downloads, and updates to the WinFE projects; it is not a beginner’s class in what WinFE is.

The time to self-learn WinFE can take days. There is no help desk, tech support, help line, or single point of reference information for WinFE.  If you don’t have patience to self-learn how to build it, you will give up.  Even tho the Internet is full of instructional guidelines, the good is intermingled with the outdated.  This course is the most current and up-to-date WinFE building and the WinFE social group will have all future updates for you to get it right the first time.

ps: Pass the quiz at the end of the course and receive a certificate of course completion (3 hours) in the instruction of building and using WinFE.

  6670 Hits
Tags:
winfe windows forensic environment windows fe
Tweet
Share on Pinterest
6670 Hits
MAR
27
1

Make DFIR easier to learn with visual aids (and teach students to share their work)

Posted by Brett Shavers
in  Digital Forensics

In my most recent course that I was teaching, the question of imaging speed came up during the hands-on imaging practicals (it's always the same question, "How can I make it go faster?").  My go-to illustration of imaging tests has been referring to Eric Zimmerman's imaging tests.  However, I tried something different this time.   I used Eric's tests (both imaging and software testing) and converted the spreadsheet data as visuals.   The visuals made all the difference, especially given mixed language in the course (as the course was not just in English…so it was a bit more difficult to get points across at times).  

With the visuals, it was easier for the class to see that some speed differences in the tests are slight enough to be irrelevant (in that personal preference of a tool may override the speed of another tool without detriment), while other speed differences are glaringly too far apart to rationalize a personal choice over a more logical choice when speed is important.  I ended up adding a separate lesson in doing personal testing, documenting the tests in the fashion of Eric Zimmerman's, and using the results to base decisions upon.  Nearly every slide had the same suggestion: "SHARE YOUR WORK'.   By sharing, I mean giving it away or selling it or teaching it or sharing it in any means you desire for fun or profit.  Just get your work out there.  

Eric set a standard in documenting imaging speed tests, but he also did something else; he showed that documenting and sharing tests results impacts the community globally for years as it is referenced constantly.  His test also shows that this is something any of us can also do.  If you think that your work is but a sliver in what can or should be done in sharing, keep in mind that a sliver to you is most likely an amazing bit of knowledge for someone else.  And by sharing, I mean publish, teach, show, or compare your work with others.  Most of the innovative developments in history have been inspired by a sliver of an idea.

The fear that your public work will be critiqued is real, not just because it will be, but because it must be.  Public peer-reviews require thick skin and a willingness to accept being wrong, and how to improve our work.  It also shows that you have the guts to put yourself out front, which any job in DFIR requires anyway.  Do it and be prepared to learn from your peers when your work is peer reviewed.  That is your goal: peer reviewed research that you personally conducted.  As a side benefit of sharing your work, software developers will certainly look at what you have documented to see where their tool stands.  Regardless of their tool is on the top or bottom, the tests show how developers can improve their tools, which benefits you (and me) directly.

About the critiques of your shared research….in a perfect world, everyone plays nice, is polite to each other, and we support the work of our peers with respectful and productive discussion.  But don’t expect that every time, and accept that some folks just aren’t nice.  Actually, be prepared for someone to be dismissive, impolite, and even downright disrespectful.  It happens because people are people.  My personal opinion is that everyone should be respectful or not say anything at all.  However, “polite” is not a word in the vocabulary of some.   Still, don’t let that stop you moving DFIR forward with your shared work and ideas.  Each of us have a choice to follow the path that others have blazed or we can blaze a trail that others will follow.  Blazing a trail sometimes means going the wrong way or hitting a dead end...you will be wrong on occasion.  

Back to the point of visuals in training: Here one example of turning Eric’s work into visual aids.  The takeaway in these visuals is not that a visual is ‘better’ than a spreadsheet, but that it is (1) different, and maybe (2) more appropriate for specific audience types.  The imaging example is just an example of practically anything in DFIR that can be more easily described in a visual compared to rows and columns, depending upon your goal of showing data.

I will post my slidedeck at some point, but I hope you got the point of taking complex data and painting a picture with it to make it easier to digest.

 

  2799 Hits
Tweet
Share on Pinterest
Recent comment in this post
Guest — Wes
Recently got some training in Tableau software and hoping to use that in some of the engagements we're in to make our data more vi... Read More
Saturday, 31 March 2018 11:50
2799 Hits
MAR
20
0

Dragnet: 2018

Posted by Brett Shavers
in  Digital Forensics Privacy

Definition of dragnet

1a : a net drawn along the bottom of a body of water

   b : a net used on the ground (as to capture small game)

2: a network of measures for apprehension (as of criminals)

 

In Hollywood movies, citizens have virtually no expectation of privacy and no practically no protection from unreasonable searches and seizures.  The movies typically depict cops routinely committing dozens of felonies in search of the criminal.  Given any cop movie, I can (and usually do) count more than a dozen felonies committed before the credits roll.  In some movies, the lead police character actually commit more crimes of more seriousness than the suspect they are chasing...

We must keep the Hollywood movie fantasy separate from reality otherwise we risk moving over the line.

Case in point: Blanket search warrants

http://www.wral.com/Raleigh-police-search-google-location-history/17377435/

 “The demands Raleigh police issued for Google data described a 17-acre area that included both homes and businesses. In the Efobi homicide case, the cordon included dozens of units in the Washington Terrace complex near St. Augustine's University.” http://www.wral.com/Raleigh-police-search-google-location-history/17377435/ 

Where a warrant is supposed to describe a specific person, place, or thing, going beyond that criteria is getting close to the line, if not clearly jumping over it.   Creating an analogy of searching a person/place/thing using high tech methods (non-invasive) and physically searching a person/place/thing (invasive) escapes most.  Few want a stranger, police officer or otherwise, to open their closets and toss items around, but when it comes to digital information, it seems that many people don’t have the same concerns over privacy and their protections against unreasonable searches and seizures.

"…Another review would further cull the list, which police would use to request user names, birth dates and other identifying information of the phones' owners….At the end of the day, this tactic unavoidably risks getting information about totally innocent people," Wessler said. "Location information is really revealing and private about people's habits and activities and what they're doing." http://www.wral.com/Raleigh-police-search-google-location-history/17377435/ 

Our data privacy problem resides partly in the service providers and partly with us, the users.   For example, to have the convenience in finding a specific type of restaurant based on your location, a service provider needs to know (1) your location, and (2) your desires.  The service provider stores each of your location way-points and all of your typed desires. They keep this information well past your immediate use of the service.  Your consent is key to making this data fair game to advertisers, spammers, criminals, and the government today and into your foreseeable lifetime and after death.

The difference between your home being searched by the government and your data being searched by the government is that when it is your data stored by a service provider, you are not generally aware that it is going on.  It doesn’t feel invasive because it happens without you seeing it.  You don’t see an investigator reading details about your life and would not expect it happen anyway.   

For investigators, it is so much easier to search the private data of every citizen in an entire city than it is to physically go house-to-house and physically search the homes.  By the way, if there comes a day where we see blanket warrants to search house-to-house, we probably are not having a good day.  But that is what happens to our personal data.

My hope is that law enforcement doesn’t lose the ability to use high-tech methods because of an over-reaching search warrant, but I know that this is what invariably happens because the easy way is going to be chosen by someone when they should have chosen the more reasonable way.

I’m curious to see where the fine line will be drawn in using dragnets to obtain everything to search for a specific something.

 

 

 

 

  2469 Hits
Tweet
Share on Pinterest
2469 Hits
    Previous     Next
1 2 3 4 5 6 7 8 9 10

DFIR Training

Be sure to check out my DFIR Training website for practically the best resources for all things Digital Forensics/Incident Response related.


Brett's blog

© 2022 Brett Shavers