13.09.2016 Views

BATTLEFIELD DIGITAL FORENSICS

BDF_Battlefield_Digital_Forensics_final

BDF_Battlefield_Digital_Forensics_final

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Devices might be found in different states:<br />

<br />

<br />

device is discovered in power-on state<br />

o unlocked (direct access to device)<br />

o locked/user logged-off/…<br />

o in suspend mode 37<br />

device is discovered in power-off state<br />

If the computer system (desktop, server) is powered on, the SOF operator should try to acquire volatile<br />

content. Volatile evidence may help the investigation or it might be the only evidence there is! If it is not taken,<br />

this will undermine the digital evidence investigation. The importance of acquiring this data is covered in<br />

paragraph 6.3 – ‘Assessing Gatherable Intelligence‘. This part of the exfiltration process makes demands on the<br />

technical architecture supporting the SOF team (See paragraph 6.2.1.3 – ‘Vector Options‘). The technology<br />

used has to follow the order of volatility. The huge variety of possible devices and operating systems means<br />

that it will be a challenge to prepare a convenient exfiltration point capable of gathering not only RAM dump,<br />

but also options like temporary system files, swap files, network configuration and settings if available. [28,<br />

chapter 8.6.18.2]<br />

Devices in this category may also contain a FireWire port. Check if a port is available, to use it for RAM<br />

acquisition.<br />

The next step after the volatile data acquisition (if the system is powered on) is to shut down the device. It is<br />

recommended to do this abruptly by removing the power (the ‘pull the plug approach’). 38 This action must also<br />

be taken if any destructive operation is visibly running on the system. The following step is the physical<br />

extraction of the storage from the device. A spinning hard disk or solid state disk (SSD) may usually be found<br />

inside current desktop computers<br />

Physical extraction consists of extracting media devices that are parts of a physically bigger system (such as a<br />

desktop or server) and that are not easily transportable during the operation. It may result in removing<br />

different types of disk drives that are built into computer systems. Note that if a RAID 0 setup has been used<br />

(as an anti-forensics measure 39 ), this requires discovering and extracting all the disks used in the setup.<br />

a) Remove the hard drive (step-by-step instructions)<br />

Note: This guide applies to a hard drive that is mounted inside the desktop computer case. A cordless electric<br />

screwdriver is usually needed to open the desktop (server) case and handle the drive if it is fixed.<br />

1. Make sure the computer is powered off and the power cable is disconnected.<br />

37 In some devices it may be possible to detect the suspend mode from slowly blinking LED lights. For example, because of security bugs<br />

[35], it is possible to see the OS’s desktop contents on resume from suspend before the lock dialog. For capturing the content from the<br />

screen in such a scenario during a special operation, a (high speed) video camera would be required. If the suspended device is properly<br />

secured into a Faraday bag with battery supply, this can be done after the special operation in the forensics investigation. This means that<br />

resuming should be tried during the secure operation only if it is not possible to capture the suspended device (for example because of the<br />

size of it).<br />

38 If a graceful shutdown is undertaken, then there may be data destruction (for example if the equipment has been booby-trapped) or<br />

other ways that the evidence may be altered during the graceful shutdown process.<br />

39 Read more from paragraph 7.1 – ‘Data and Device Hiding‘. Before removing devices it should also be remembered that hard disks and<br />

SSD drives may be encrypted.<br />

48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!