Summary

This document on digital forensics provides an overview of relevant topics.

Full Transcript

Digital Forensics LEC18 – Friday November 22nd Foundations in Forensic Science LAB05 Computer Forensics Lab Grades Course Update Online Labs SETS on Blackboard Markus Hess – Case Study German hacker 1980s Hacked into military network...

Digital Forensics LEC18 – Friday November 22nd Foundations in Forensic Science LAB05 Computer Forensics Lab Grades Course Update Online Labs SETS on Blackboard Markus Hess – Case Study German hacker 1980s Hacked into military networks USA, Europe, East Asia Gathered information & sold it Hacked: Sensitive semiconductor, satellite, space, and aircraft technologies Discovered in 1986 Clifford Stoll Honeypot Operation BTK Killer – Case Study Active between 1974 and 1991 Communicated with media & police 2004 Sent a package to local news Sent postcard to police Left empty cereal boxes with little dolls Sent document on Floppy disk Metadata found DNA from daughter 2005 Arrested & convicted shortly thereafter Case Studies Christopher Pullman 2008 Convicted of murder of Sylvester Eddings Location identified through cellphone evidence Adnan Syed 1999 Convicted of murder of Hae Ming Lee Location identified through cellphone evidence Digital Forensics Analysis of digital media for legal purposes Information: Time, location, biometrics, etc. Examples Cellphones, tables, computer, cameras, files, etc. Includes: Computer forensics, data analysis, malware analysis, mobile device analysis, video analysis, etc. Brief History 1984 Computer Analysis and Response Team (FBI) 2000 Scientific Working Group on Digital Evidence (SWGDE) 2002 Best practices for Computer Forensics 2001 National Hi-Tech Crime Unit 1977 Personal computers (Commodore PET 2001, Apple II, TRS- 80 Model 1) 1979 First portable cellphone released 1991 2G; 2001 3G; 2009 4G; 5G 2019 Crime Type Fraud Payment diversion fraud Ransomware Financial technology Cyberbullying Sexual predatory chats Public/Private investigations Threat vectors Phishing, password spraying, drive-by-download, unpatched system vulnerabilities, email spoofing, malvertising, brute force, etc. Artificial Intelligence Machine learning Deep learning Speech recognition Natural language processing Bia in AI Prevention of bias and have inclusive language Blockchain 2008 Bitcoin Benefits: Timestamping, Consensus, Security, Ledger, Uses blockchain Multiple centers 1. Transaction request Chain of Custodies Blockchain? 2. P2P dissemination 3. Node verification 4. Network wide broadcasting 5. Transaction written in chain Mobile Devices Movement & Location Apps register information from device Depends on the phone status Time: 30s-40s Greater detection on newer phones Geolocation Using wifi, cell towers, and GPS Damaged devices Water damage, metal corrosion, etc. Apps & Social Media Email Messaging apps E2E encrypted messaging Notes & Journalling Snapchat Conferencing apps Obfuscation Vault apps Limitations Storage of entire data Bias in collection Clouds systems pose a problem Geography plays a role Case average is roughly 1GB HDD vs SSD Complex cases (physically/virtually) Encryption Legal differences between countries Video Analysis Deepfake detection Residual noise Fingerprint examination Video Analysis Deepfake detection Residual noise Fingerprint examination Defending against DF Proofs of authenticity Watermarking Social verification Gait Analysis via CCTV

Use Quizgecko on...
Browser
Browser