digital evidence
Transcription
digital evidence
DIGITAL EVIDENCE A New Generation in Criminal Investigations INTRODUCTION Assistant Attorney General Chris Kelly Managing Attorney Cybercrime Division Massachusetts Office of Attorney General Martha Coakley www.maagocybercrime.org Cyber Crime Changed Definitions, and Law Enforcement Priorities EARLY DIGITAL EVIDENCE/ CYBER CRIME PRIORITIES PRIORITIES - THEN PRIORITY TARGETS Phreaking Hacking Espionage Fraud Email Scams Auction Fraud Child Exploitation Credit Card Theft source: www.wikipedia.com EMERGING DIGITAL EVIDENCE/ CYBER CRIME PRIORITIES THE CYBER-CRIMINAL PRIORITIES – NOW Most haven’t changed What is significant is what is added to the list Gangs/Organized Crime Narcotics Rape Murder Terrorism source: www.wikipedia.com www.myspace.com Enhancing Criminal Cases with Digital Evidence CONVICTED WITH DIGITALEVIDENCE ZACCARIAS MOUSSAOUI – “THE 20TH HIJACKER” • FBI analysis of his laptop and computers and the laptop of his roommate, Mukkarum Ali, and two computer at University of Oklahoma • Email, other documents admitted at trial • Convicted in 2006 of conspiring to kill Americans – sentenced to the Colorado Supermax prison for life source: www.wikipedia.com CONVICTED WITH DIGITALEVIDENCE Exhibit FO05521.11 01-455-A United States v. Moussaoui CONVICTED INTERNET OFFENDER COMMONWEALTH v. AARON JOHNSTON • Convicted Texas sex offender • Traveled 2,500 miles to meet a girl from Boston he met online • Traveled by bus • Extradition to Texas in 2008 INVESTIGATIONS WITH INTERNET EVIDENCE CONVICTED WITH DIGITALEVIDENCE NEIL ENTWISTLE • Killed wife Rachel and baby daughter Lillian • Arrested in London, 2006 after fleeing the United States • Several days of digital evidence testimony at trial • Internet history included Google search “how to kill with a knife” • Convicted and sentenced to life in prison source: www.bostonherald.com INVESTIGATIONS WITH INTERNET EVIDENCE CONVICTED WITH DIGITALEVIDENCE COMMONWEALTH v. MARK ANTHONY • • • • • Convicted sex offender in AZ Entices countless young women Lives underground SJC Opinion Pleads after several days of trial CONVICTED WITH DIGITALEVIDENCE COMMONWEALTH v. MARK ANTHONY Source: www.whdh.com CONVICTED WITH DIGITAL EVIDENCE BARBERSHOP • 14 locations • 50 hi-tech investigators • 33 computers, 44 mobile devices, 400 media • Citrix network Source: www.wbztv.com CONVICTED WITH DIGITAL EVIDENCE COMMONWEALTH v. JAMES BENECHE and JESSICA DEAN • Beneche and Dean murder Beneche’s former girlfriend and his son • Mother’s body dumped near a pond • Son’s dead body thrown out third story window in a trash bag when police approach • Evidence included significant AOL email transmissions • Other email evidence and web search offered by MSP forensic examiner Source: www.boston.com Meeting New Challenges, Now and in the Future STATE AND LOCAL CASE PRIORITIES • Violent crime • Sexual assault • Fraud, larceny and identity theft • Narcotics and organized criminal activity • Harassment, stalking, etc. • Intellectual property theft • Child Exploitation (‘Butner Study’ Published at Journal of Family Violence: Volume 24, Issue 3 (2009), Page 183) OTHER ISSUES OF INTEREST TO LAW ENFORCEMENT • Protection of government networks • Data in the clouds • Balancing privacy concerns • American cultural permissiveness • Licensing of forensic examiners • Lab certification • Resources TECHNICAL CHALLENGES TO LAW ENFORCEMENT *At the end of 2008 there were more than 3.6 billion mobile subscriptions worldwide (www.rcrwireless.com) *Universal functionality of many devices including smart phones, GPS devices, and game stations *Surveillance systems – proprietary digital systems *Encryption *Users becoming more sophisticated *Educating judges and lawyers Closing Issues - Training Model Closing Issues – New First Responder Model ‘The Red Flag Method’ of Digital Evidence Seizure (aka STOP PULLING THE PLUG!) ‘RED FLAG’ MODEL EXAMPLES Observe and document the open applications and files on the desktop for items indicative of active encryption, remote storage, and open files of evidentiary value. ‘RED FLAG’ MODEL EXAMPLES Wireless Antenna (vary in type) Standard Network Cable 8 pin connect ‘RED FLAG’ MODEL EXAMPLES DEVICE RECOGNITION Source: www.pcworld.com Closing Issues – A Changing Dynamic in Court Reverse negative trends and take advantage of the technology…