New Anti-Forensics Tools Thwart Police 528
rabblerouzer writes "Antiforensic tools have slid down the technical food chain, from Unix to Windows, from something only elite users could master to something nontechnical users can operate. 'Five years ago, you could count on one hand the number of people who could do a lot of these things,' says one investigator. 'Now it's hobby level.' Take, for example, TimeStomp. Forensic investigators poring over compromised systems where Timestomp was used often find files that were created 10 years from now, accessed two years ago and never modified."
Time Stamps? (Score:5, Funny)
Re:Time Stamps? (Score:5, Funny)
Karma Whore/Comment Jacking (Score:3, Interesting)
http://www.cio.com/article/print/114550 [cio.com]
Pfft. (Score:5, Funny)
- RG>
Re:Pfft. (Score:5, Funny)
FILE0001.CHK
...
FILE0002.CHK
FILE0003.CHK
FILE0004.CHK
FILE0005.CHK
FILE9999.CHK
Unable to find COMMAND.COM. Please insert system disk and press reset.
Re: (Score:3, Funny)
"Infact, its the fastest running, most secure version of windows ever."
But, like you said, you can't run anything on it either!
Re: (Score:3, Interesting)
Here's a real good one (Score:4, Interesting)
That's for the first layer. Then you use the same (or different) scheme to scramble that already encrypted file again. With the same or different password.
Then you do it a third time.
Granted this would take a hell of a lot of computing power and a single bit of data corruption would screw you royally (which calls for more advanced recovery techniques which leads to some weaknesses...), but the effect is this.
First, you get the hard drive and the whole filesystem is encrypted. It's utterly garbage to you. You don't know which scheme was used to encrypt it. You certainly don't know the password. But you may know it's triple layer encrypted. Or double, or quad.
What is certain is, if you get the correct encryption scheme AND the password for that first layer, the decrypted file is STILL GARBAGE. You don't really know if you got the correct information or not, because you're still looking at a "headerless" pile of garbage data. Good luck guessing that second layer because no matter what, you still get a pile of incoherent garbage.
If you've done this to all your files on your hard drives, DVDs and CDs, this is where you demand your Constitutional right (in the United States) to a SPEEDY trial and then plead the Fifth Amendment in court when asked for your password/encryption schemes. Why? Because if I'm right, the police and their descendants down to the 7th generation will have died of old age before they figure out the 2nd layer, much less the 3rd.
Mind you, the cops may have slapped a keylogger on your system ahead of time. If that's the case, you're screwed.
Lawyers and hackers, please rip my idea to pieces and tell me what you think...
Re:Here's a real good one (Score:5, Insightful)
Cryptography is hard. I know enough to know that I know nothing about it, and that I'd screw the pooch on any crypto system I might implement. If you haven't a very solid maths background, and a lot of experience breaking cyphers (and I'm talking about more than just the simple Julius shift here), odds are extremely high that there's a flaw you've overlooked in your system.
Re: (Score:3, Informative)
That is to say that if you create an encrypt-decrypt-encrypt box and feed it the same key for all the crypto operations, you get plain DES encryption.
(i.e. encrypt m with x = c, decrypt c with x = m, encrypt m with x = c). If you want proper 3 DES you just feed it different keys.
So instead of having to create a box that does
Re:Here's a real good one (Score:4, Insightful)
Re:Here's a real good one (Score:5, Funny)
Re: (Score:3, Interesting)
Re: (Score:3, Funny)
Oh, and IIRC, withholding the password would be obstruction of justice (assuming they obtained a warrant
withholding the password (Score:4, Funny)
Couldn't you choose an incriminating password and plead the 5th?
Re:withholding the password (Score:4, Informative)
The real key here is that the 5th amendment protects you from testifying against yourself. Your "papers" are not considered testimony and not protected.
Not legal advice, not your lawyer.
Re: (Score:3, Funny)
In that case isn't the best way just to not know the password ? Just use whatever comes from /dev/urandom at the time to
Epically bad. (Score:5, Insightful)
Your idea is quite terrible.
First, what do you mean by a file "without signature"? Take a zip archive as an example--even if you strip off the zip header, any forensicist worth his or her salt can figure out it's a zip archive, just because of the way the data is structured. Encrypted filesystems have structure, too. A data forensicist can recognize an encrypted container on the basis of its structure. (Some people have recommended to you TrueCrypt in hidden volume mode. This is bogus. I'll explain that if you want.)
Second, you appear to not understand how crypto works. Two layers are better than one, right? So double ROT13 encryption is stronger than single ROT13, right? You're running smack into a major, well-known area of crypto. A lot of ciphers do not composite themselves well. You are almost always better off just picking one algorithm with a strong keysize than a composition of multiple algorithms.
Third, how do you plan on managing all of your keys? Key management is a thorny enough problem in the best of times. By relying on multiple keys you're multiplying the problem immensely.
You really need to do some basic research in crypto.
Re: (Score:3, Interesting)
That's true, I und
Re:Epically bad. (Score:5, Interesting)
The DA just smiles at you and says... "I'd like to see the hidden container inside that TrueCrypt volume. My forensicist says oftentimes people do that with TrueCrypt."
You say "umm... there isn't a hidden container... there's nothing more there..."
The DA continues to smile. "Prove it to me."
You say "umm... I can't... that's exactly what TrueCrypt means when they say it's hidden... you can't prove it exists and you can't prove it doesn't exist..."
The DA rises from the table. "Say hi to your husband for me when you meet him."
Moral of the story: it is very, very important that you be able to prove the existence or nonexistence of your data. I don't know how to make it any simpler. If compositing encryption functions makes things harder to break, we'd expect two applications of ROT13 to be stronger than one application of ROT13. It doesn't work that way. And in an exactly similar way, two levels of AES may or may not be any better than a single layer of AES. Or one layer of Blowfish and one layer of 3DES. Or...
If you want to get more sophisticated than this, you need to take a collegiate math course focusing on group theory.
Re: (Score:3, Interesting)
You don't have to. It's HIS job to prove it IS there (e.g., you have to be proven GUILTY in a court of law, not NOT guilty. A subtle but important distinction). He can't strongarm you into giving up the hidden volume, if it exists, and if it doesn't exist, he especially can't.
I was hoping you'd mention how the structured nature of the hidden volume is a dead giveaway. But you didn't say anything about that, leading me to think you don't believe it to be a pr
Re:Epically bad. (Score:5, Insightful)
So you go to trial. So you're acquitted. But by the time you get acquitted, you're front page news in all the local newspapers. You're getting death threats. Your family is shunned. You get let go from your job because you're bringing too much controversy. Your life, not to put too fine a point on it, is fucked.
You may want to look into Wen Ho Lee [wikipedia.org], Steven Hatfill [wikipedia.org], Richard Jewell [wikipedia.org] and John De Lorean [wikipedia.org], all of whom had this exact thing happen to them.
Hatfill has never been charged. Jewell was totally exonerated, as was De Lorean. Wen Ho Lee pleaded guilty to a minor count just to make the madness stop, and received a profuse apology from the bench for how he was mistreated.
Also, have you been following what happened in Durham, North Carolina recently with respect to prosecutorial misconduct in a rape case [blogspot.com]?
You really, really need to acquaint your beliefs on how the law works with the reality of how the law works.
It all depends on the political winds (Score:4, Insightful)
Our justice system is run by elected officials (with media support). If you want fair treatment (justice) you had better hope that:
- it's not an election year
- the case has not generated a lot of media attention
- the case is not worthy of media attention when the DA holds a press conference
- the DA (and many others in the justice system) are not career building, and looking at your case as an opportunity to advance
The last one is the kicker. For every case there are dozens of people in the justice system that will get beneficial career advancement material from a successful conviction. That's my observation.
Re:Epically bad. (Score:5, Insightful)
Re: (Score:3, Informative)
And what does this have to do with hidden containers? Your life is fucked at the point that you are initially questioned or arrested. If the cops are going to be so underhanded as to pursue a convi
Indeed. (Score:4, Insightful)
I mean, if you're dealing with a corrupt court where you're guilty until proven innocent, you don't even have to be using encryption to get screwed this way. The DA might just as well accuse you of using steganography to hide illegal photos in random files spread all across your hard drive, which is equally impossible to disprove.
I'm not sure what you mean by the "structured nature of the hidden volume", though. TrueCrypt hidden volumes have no plaintext header, just like main volumes, and as long as the crypto methods in use are good ones, the encrypted data will be indistinguishable from random bytes, no matter how well-structured the plaintext is.
There are attacks against hidden volumes, but they basically involve taking snapshots of the whole volume at separate points in time, then obtaining the main volume's key and checking whether any changes have been made to "unused" areas of the filesystem.
That is, I could sneak into your house and copy the disk today (version A), then come back next month, seize the disk (version B), and force you to give up the main volume key. I can then mount both versions of the partition and look for differences between them. If there are any areas that contained random data in version A, and different-but-still-random data in version B, I can be pretty sure it means you were writing to a hidden partition located there.
I think the best defense against that attack would be for TrueCrypt to randomly write chunks of new random data to the free space of mounted volumes, which would disguise the writes made to hidden volumes. (Of course you'd need to use both keys when mounting the main volume so it knew not to clobber your hidden data.)
Re: (Score:3, Informative)
If by Kangaroo court, you mean the DA already thinks he has enough on you between circumstantial evidence and a snitch.
The DA might just as well accuse you of using steganography to hide illegal photos in random files spread all across your hard drive, which is equally impossible to disprove.
You'd have a fairly strong defense against that accusation if
Re: (Score:3, Insightful)
You'd have a fairly strong defense against that accusation if your hard drive contains no steganography tools. That's sort of the the issue with truecrypt - it doesn't prove you have child porn, or even a hidden volume, but its not unreasonable to suppose you might, if you have truecrypt, there is other circumstantial evidence, and a 'snitch' whose just reliable enough of a witness to sway a jury.
Luckily, in a criminal case, the standard is "guilty beyond a reasonable doubt", not "one could reasonably suppose you might be guilty".
Re: (Score:3, Insightful)
Unless you've been accused of a crime against Our Nations Most Precious Resource - The Children. Then you're guilty even after you prove you're not guilty.
Guess for all you know about crypto (Score:3, Interesting)
Re:Guess for all you know about crypto (Score:4, Insightful)
This is true for sufficiently high values of w, where w is your net worth. If you can't afford tens of thousands of dollars to fight a bogus charge, then you're effectively screwed, particularly if the charge is one of the very emotionally charged ones (child porn, rape, terrorism, etc.).
You'd quickly end up in a situation where you'd be facing a team of prosecutors, working with virtually unlimited taxpayer funds (gotta protect the children, right?), against your fresh-out-of-lawschool public defender, whom if you're unlucky, you might have to share with half a dozen other defendants. And chances are, they're going to believe you're guilty and (consciously or not) treat you like it.
There have been a lot of sociological studies and research done on the U.S. legal system. People who can't afford lawyers plead guilty at an astoundingly high rate, and the entire system is set up to "process" them as quickly as possible, from arrest through to prison.
The system works like you describe in the best case scenario, but even then, it'll probably leave you bankrupt.
Re: (Score:3, Informative)
Re:Epically bad. (Score:5, Interesting)
It is a cryptanalysis problem. Encryption scheme are designed so that your clear text will become close-to-random garbage when encrypted. Why? Because if it is not random, forensics can do statistical analysis on the crypted data 1/ to identify the encryption algorithm, 2/ to try to guess the encryption key (http://en.wikipedia.org/wiki/Cryptanalysis/ [wikipedia.org] for more details).
If you crypt your text twice (or more) you modify the entropy of the encryption scheme, and the encrypted data will be not optimally close to random data. As a conclusion, encrypting twice made your data less robust to forensics.
Re: (Score:3, Informative)
Here is the wiki for Fourier Transformations [wikipedia.org]. The rough gist for our purpose is that when you composit elements (multiple encryption schema) you get a new schema with identifiable characteristics that can be reversed back to the original elements. IE F
Re: (Score:3, Interesting)
The whole point of encryption is to minimise those statistical artifacts. By encrypting a ciphertext again, you are only applying more entropy to data that already appears quite random. If you don't already have any idea of the underlying plaintext, comparing one ciphertext with a re-encry
No..... No, Just No. (Score:3, Funny)
You say "umm... there isn't a hidden container... there's nothing more there..."
The DA continues to smile. "Prove it to me."
You say "Actually, you have to prove to me that there's anything there to hide. You should know that I'm innocent until proven guilty."
Then you walk away scott free. The DA continues to smile for some reason,
Re:Epically bad. (Score:5, Informative)
Essentially your idea is not a bad one, it's just a bit naive -- there are non-obvious subtleties which must be considered in order to make the idea work as well as you hope.
One issue is that some encryption algorithms (called "groups") have the characteristic that when applied two consecutive times with different keys, the result is the same as if the algorithm was applied only once with some other third key. If this is the case for your favorite algorithm, then your plan adds no extra security compared to just encrypting once. And apparently it's not always easy to know whether this is the case for a complex algorithm, so you should assume the worst.
Another issue is that if your adversary can guess some plaintext (e.g. by assuming it contains
One way to overcome these weaknesses is by applying your encryption in "EDE" (encrypt-decrypt-encrypt) mode, where you encrypt with one password, then "decrypt" with a second password (which is obviously not really decrypting but just making the scrambling that much more horrendous), and then encrypting again with a third password. Even this is not as secure as you might expect, but it's still pretty good.
The well-known security and crypto expert Bruce Schneier has a great book called "Applied Cryptography" (Wiley, 2nd edition 1996, ISBN 0-471-11709-9) which is accessible to average smart, interested, non-NSA-funded Slashdot readers without advanced math degrees. It even has a brief chapter (15) on this exact topic. (Schneier has other great books too.)
Despite his attitude, "rjh" is right in implying that our common sense is not trustworthy in the area of cryptography -- some of the world's smartest people devote their lives to this stuff and have come up with astonishing and often counterintuitive results. Smarter people than us have already studied this idea, which is basically a good one even though it has pitfalls. Don't let anyone make you make you feel stupid for having an idea or asking a good question.
Um, it's called TrueCrypt. (Score:3, Informative)
Your welcome.
Re:Here's a real good one (Score:5, Insightful)
Re: (Score:3, Funny)
Well, it usually does. Unless, of cousre, you're using ROT-13 for your original encryption.
It's nonsense (Score:5, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
The problem here is if you do not store the passwords in RAM, you'll be asked for the password every time you, say, access a jpg file or delve into the webcache. That potentially means retyping in 3 passwords a million bajillion times. If you do store it in volatile RAM, you could leave open a narrow window of opportunity for the cops which becomes a
Re:Pfft. (Score:5, Informative)
The only "sure" way is to melt down the platters and make pretty jewelry with them.
Re:Pfft. (Score:5, Interesting)
Re:Working drive at 700+F? (Score:4, Interesting)
Re:Pfft. (Score:5, Insightful)
For my personal drives at home, I just use a three pound hammer. A scraped, smashed and warped platter hitting the trash bin is effectively unreadable, and all I'm really concerned about is a bad guy finding bank account information. If someone official really wanted a working drive of mine, pajama-clad ninjas would probably come for it in the middle of the day while I was at work anyway.
Re:Pfft. (Score:5, Funny)
It's the only way to be sure.
Re:Pfft. (Score:5, Interesting)
Re:Pfft. (Score:4, Informative)
Re: (Score:3, Insightful)
Re:Pfft. (Score:5, Interesting)
Most current drives are glass platters. I found this out when I had a batch of DeathStars go bad. IBM wanted the drives back for RMA, but we had company restricted secrete data on the disks... I informed IBM of the dilemma and that I would be drilling a pair of holes in the platters. When I did I heard a crunch sound, followed by broken shards of glass coming out the holes.
Got replacement drives in no problem.
-nB
Re:Pfft. (Score:5, Interesting)
At the point where the disk has been entirely overwritten *once* with data. In theory, someone with very specialised equipment could pick out the residual flux transitions from the new ones. However, modern (or rather, disks larger than tens of gigabytes) use a different modulation scheme similar to QAM, and once that is overwritten the old data is irretrievably gone.
Ah, the police... (Score:5, Funny)
I prefer hardware solutions, rather than software ones.
Re:Ah, the police... (Score:4, Interesting)
Re: (Score:3, Funny)
sing to an obvious tune (Score:2)
Never trust the computer! (Score:5, Insightful)
Any hacker/script-kiddie with a working knowledge of touch and a 'find' command could wreak equal havoc. Combined with a quick filter and another perl script to generate random timestamps, all launched regularly from cron? Forget it. Forensics folks would be better off scouring logs for a non-tainted timestamp and counting directory inode entries for approximate age.
Of course, this says nothing of rootkits, which can be downright subversive, embedding themselves into kernel space where not even the OS knows they exist, where they can wreak untold havoc with historical system data or encryption. I bet there's even a script-kiddie version of anti-forensics tools out there, where it just cron-obfuscates anything trackable. Logs, timestamps, frequent automated sweeps of shred over unallocated disk blocks, inode reordering, and so on.
Now that I think about it, that might be a good idea. I got some work to do.
Re:Never trust the computer! (even a Linux box?) (Score:3, Interesting)
Linux servers have become a favorite home for memory- resident rootkits because they're so reliable. Rebooting a computer resets its memory. When you don't have to reboot, you don't clear the memory out, so whatever is there stays there, undetected.
I don't mean to sound like a moron or naive but are Linux rootkits really that prevalent? After doing a quick google search for "rootkits for linux", I found a few for the old 2.0 and 2.2 Linux kernels... Have updates that have
Re:Never trust the computer! (even a Linux box?) (Score:4, Insightful)
Considering that rootkits originated in Unix (hence "root"), I imagine that they are as prevalent in Linux as they are in any operating system (the argument of uptime notwithstanding).
Besides, a rootkit does not have to reside in kernel space to be very effective. Simply replacing many of the key binaries (init, bash, getty, ls, top, ps, etc depending on *nix flavor) will do wonders for probably 98% of systems out there. That said, I'm sure there are some which do reside in kernel space (a kernel module perhaps?) or maybe even some that are simply modified kernels (the source is available after all). How do you know that the kernel your system is running has not been compromised?
After doing a quick google search for "rootkits for linux", I found a few for the old 2.0 and 2.2 Linux kernels...
I tend to doubt you'll find the latest and greatest rootkit via Google. If you know the right people, I'm sure you can get whatever you need.
Re:Never trust the computer! (Score:5, Insightful)
And that seems to be the point - how many of these types actually know how to use touch or find... much less put together a perl script? By "hobbiest" they're not talking about our level of knowledge... they're talking average punk who thinks double-clicking a rootkit is advanced hacking. Criminals aren't always the sharpest crayons in the box.
I met one of the FBI agents involved in the investigation of Zimmerman over PGP. After that case, she moved on to child pornography cases. I asked her how many times they ran in to PGP being used by people trading in kiddie porn. Not a single one. She noted that the folks they were busting just weren't smart enough to understand that kind of thing.
That basic precautions are showing up enough to give investigators a problem says something both about the attackers and the investigations.
Re:Never trust the computer! (Score:5, Insightful)
<advocate client="Devil">
So that means one of two things:
1. Smart people aren't trading in child pornography or
2. Smart people weren't caught to begin with, and still aren't
And it probably shows just how stillborn general encryption of mail is. If average people don't learn that under threats of years in prison, what could possibly make regular people do it?
</advocate>
Re: (Score:3, Interesting)
Well - you've got to keep in mind the context of our discussion. We were going out to lunch and I'm not exactly sure how it started... but I was mentioning Zimmerman's woes over PGP and she said "oh yeah - I was one of the investigators on that one." We then talked a bit about the good and bad uses of PGP (she had always seen PGP as nefarious until coming to
Re:Never trust the computer! (Score:5, Funny)
Re: (Score:3, Funny)
So... (Score:5, Insightful)
Personally, I'm all for it! The timestomp tool they mentioned seemes more for oh-shit scramble-the-evidence rather than general usage... that kind of timestamp manipulation can really frig up a system.
Personally I'm a fan of disk encryption using algorythms and key-lengths that make it extremely impractical to get in once the system is powered down. If up however... you have three strikes at getting in and all future packets from your IP are silently dropped for several days. Local access isn't a problem either... open the case and power goes out... and after 10 minutes of idle-time the system locks (only way in is password or reboot... obviously reboot isn't helpful)
Call me paranoid. I am. I also like my privacy. Yes, I DO have something to hide: MY LIFE! I don't want you in my stuff at all!!! It doesn't matter that there is nothing illegitimate or illegal on the damn things, I still don't care.
Re: (Score:3, Interesting)
I was thinking more in direction of "non-destructive fuckup of compromised machine", like say a machine you've trojaned. Make it hell to figure out how and what you've done. If you want to prevent forensic investigation on your own machine, encryption is much better than obfuscation.
Re: (Score:3, Interesting)
I was thinking more in direction of "non-destructive fuckup of compromised machine", like say a machine you've trojaned. Make it hell to figure out how and what you've done. If you want to prevent forensic investigation on your own machine, encryption is much better than obfuscation.
Well lets see, Mr. Anderson has a huge encrypted file and his computer asks for his private key when it boots up vs. Mr. Anderson with a bunch of files with messed up timestamps. The formers says "I'm guilty" whereas the latter says "Poor me I got hacked.. and they put lots of bad stuff on my computer too!". Just because it's a jury of your peers doesn't mean they aren't incompetent boobs that will convict just because they feel like you probably did "something".
Sure the fact that there is no actual evid
Re:So... (Score:4, Insightful)
Re:So... (Score:5, Interesting)
Yes, I don't care If I get flagged for that. I care for my liberty.
Re:So... (Score:4, Informative)
Parts of the machine stay on for a very long time without power, and the whole machine itself can take up to 30 seconds to power down with no power connected. The System Management board has it's own internal power (though minimal), and most every hardware or power related issue gets logged into the hardware's system log - even with no power to the machine (ie: pulling all plugs or hitting the circuit breaker will make the machine log a "No AC Power" with Time & Date stamp; and send out a notification - even though it has no AC power - before the machine drains what is stored internally).
Pretty neat piece of machinery - and at 130lbs and a ridiculously high "guaranteed uptime" I guess such functions arent much to expect. Even so, many far lower end Netfinity's and their Intellistation brethren have (had) at least a few of the same features/capabilities).
I am presuming the replacement i Series e-Servers do as well - though that is just a presumption, and reality may be far different.
-Robert
PS: Making a home brew solution is very easy [though I think some boards natively support this through their "Case Tamper" pins which just need to be wired to a case intrusion switch (standard roller arm switch)]
Print version (Score:4, Informative)
Anonymous coward so no Karma whoring today.
Macs... (Score:5, Interesting)
Macs?
Only in the most serious of cases are macs in the UK sent for hacking if File-Vault's on. They go to Canada and take upwards of a year to crack. If ever.
Unless you've done something pretty fucking serious, and the police know the evidence is on the machine, just can't prove it, they usually won't go to the expense.
Of course, only the most stupid and inept of morons would be doing illegal shit and storing it on their computer without using the most powerful encryption possible, and only storing that which absolutely must be stored. Mind you, criminals are not usually noted for their cunning and intelligence....
It goes without saying that the above does not translate to across the pond, nor does it apply on Security operations with terrorists and the like. How MI5 & MI6 do things is completely different and tends to involve some 'specialist' people from the likes of the I-corps and in-house solutions....
I could elaborate, but I'm not THAT dumb.....
Re:Macs... (Score:4, Insightful)
Well, you only hear about the ones that get caught.
Re: (Score:3, Informative)
You are incorrect. I work as a software developer for a US company that specializes in computer forensic software and I work with investigators all over the world as well as the US. Encase definitely is the most widely used tool but it is most definitely not the only one, other tools similar to it are FTK (also widely popular) and something called iLook.
Nearly all
oh geez... the "police" (Score:5, Interesting)
Re:oh geez... the "police" (Score:5, Informative)
1) Point them to "interesting" catalogs on most operating systems
2) Read pretty much any filesystem, including the odd Linux/BSD variants
3) Scan for files (keywords, against a hash db etc.) without booting your OS
Encryption is the only thing that'll stand any serious investigation. Though I suppose it'll get you past the "should be bother to check his computer just in case" checks, there is plenty support for not "IE/Windows" machines.
Examples:
Operating system Support: Windows 95/98/NT/2000/XP/2003 Server, Linux Kernel 2.4 and
above, Solaris 8/9 both 32 & 64 bit, AIX, OSX.
File systems supported by EnCase software: FAT12/16/32, NTFS, EXT2/3 (Linux), Reiser
(Linux), UFS (Sun Solaris), AIX Journaling File System (JFS and jfs) LVM8, FFS (OpenBSD,
NetBSD and FreeBSD), Palm, HFS, HFS+ (Macintosh), CDFS, ISO 9660, UDF, DVD, and
TiVo® 1 and TiVo 2 file systems.
EnCase software uniquely supports the imaging and analysis of RAID arrays, including hardware
and software RAIDs. Forensic analysis of RAID sets is nearly impossible outside of the EnCase
environment.
Dynamic Disk Support for Windows 2000/XP/2003 Server.
Ability to preview and acquire select Palm devices.
Ability to interpret and analyze VMware, Microsoft Virtual PC, DD and SafeBack v2 image
formats.
Compound Document and File Analysis: Many files such as Microsoft Office documents, Outlook
PSTs, TAR, GZ, thumbs.db and ZIP files store internal files and metadata that contain valuable
information once exposed. EnCase automatically displays these internal files, file structures, data and
metadata. Once these files have been virtually mounted within EnCase, they can be searched, documented
and extracted in a number of different ways.
File Finder: This feature automatically searches through the page file, unallocated clusters, selected files
or an entire case, looking for predefined or custom file types. This feature differs from the standard
search, because it looks through the defined areas for the file header information and sometimes the
footer.
Analysis: EnCase software has the ability to find, parse, analyze, display and document various
types of email formats, including Outlook PSTs/OSTs ('97-'03), Outlook® Express DBXs, Lotus
Notes NFS, webmail such as Hotmail, Netscape and Yahoo; UNIX mbox files like those used by
Mac OS X; Netscape; Firefox; UNIX email applications; and AOL 6, 7, 8, 9. In some cases,
EnCase can recover deleted files and depending on the email format, the status of the machine.
Browser History Analysis: EnCase has powerful and selective search capabilities for Internet
artifacts that can be done by device, browser type or user. EnCase can automatically parse,
analyze and display various types of Internet and Windows history artifacts logged when websites
or file directories are accessed through supported browsers, including Internet Explorer, Mozilla,
Opera and Safari.
Re: (Score:3, Informative)
Another good reason to use XFS then.
In addition to it zeroing out any previously write-opened files when replaying the journal (which is why you get a bunch of files filled with NULL if you pull the plug on an XFS system -
A year ago... (Score:3, Interesting)
You just can't beat the numbers. If there is a 256 bit keyspace and a secure algorithm, you are not going to be able to crack the machine. I suppose that perhaps American and European law enforcement could take a page out of Israel's book and start using "strong persuasion" to get keys from suspects, but I don't imagine that happening any time soon.
LK
Persuasion (Score:5, Insightful)
In 'Merica, we call it gitmo. Encrypshun don't fool us nohow, nosir.
'fter all, if yah ain't guilty, watcha hidin' stuff fer? Dontcha know there's a war goin' on?
Re:Persuasion (Score:5, Insightful)
Re:A year ago... (Score:5, Funny)
Re:A year ago... (Score:4, Interesting)
If you typed a passphrase into a Windows machine, would you bet your freedom that the passphrase wouldn't show up in "strings
Hiding things on a general purpose computer is still hard, despite the availability of little-known but powerful techniques like the ATA commands to create an unreadable Host Protected Area, or simply to misreport available disk space (I'm waiting for the hack that takes advantage of the fact that a disk drive has tens of megs reserved for its own use, several megs of RAM, and a 32-bit processor: a 1990s desktop worth of machinery that nobody thinks of as a computer).
Fearless prediction: technology will lose on both offense and defense. Successful police will flip accomplices, successful criminals will move to jurisdictions where they can form an under$tanding with the police, and anyone who tries to win a technological arms race will lose in the end.
Touch (Score:4, Interesting)
Yes, yes.
Five years ago (2002) there were five people (or less) that knew touch.
Lol. The guy is a moron.
I remember walking through a parking lot in college in 1996 and listening to a couple guys talk about how they would touch their files to make late homeworks appear as if they were done on time.
About a year after that, UCSD switched to a turnin-based system. =)
Re: (Score:3, Funny)
>
>Yes, yes.
>
>Five years ago (2002) there were five people (or less) that knew touch.
Er, assuming they're using 5 fingers (inc. thumb) then that should be *31* people or less...
>
>Lol. The guy is a moron.
*He's* a moron?
What's that strange gesture you're giving me with your hand? You trying to tell me '4' for some reason?? Hrm...odd.
Key quote (Score:3, Insightful)
They're using stego? Maybe we drop some stego on them.
Yeah, cause my stego *ROCKS* yo!
I'm thinking even the most avante-garde anti-forensics tool could fool this guy. Yeah, anti-forensics might be a problem for him, but last time I checked, having a future date on your warez or kiddie porn won't save you from prosecution. In fact, using something like Timestomp is more or less likely to convince the jury that you are indeed a criminal.
And likewise, it takes a very *good* steganography tool to really hide things. Sure, you could fool your friends, but you aren't likely to fool a forensic investigator with a basic knowledge of statistics. Could I tell the difference between a good and mediocre steganography tool? Probably. Could the average criminal? Probably not. A mistake as simple as hiding your data in images gleaned from the web would be enough to trip someone up: Here's a hint - if the image looks the same as the one on the web, but the checksums don't match, something's up. I'm guessing a shell script could go through the hard drive and do most of the work for the investigator. 17 hours isn't so short anymore...
If you don't want the cops to find it, use encryption. If you want deniability, use the double-xor technique mentioned in Bruce Shneier's Applied Cryptography. But don't bother thinking that bogus timestamps are going to foil any serious forensic investigator. The relative location of a file's blocks on the hard drive is going to give at least an approximate date of file creation, even if you do obliterate the timestamp, and every forensic investigator worth his salt knows this.
Re:Key quote (Score:4, Interesting)
Ever since (Score:4, Insightful)
I read Ken Thompson's Reflections on Trusting Trust [acm.org], it has always occurred to me that any computer crime is completely untraceable. It is only laziness on the part of the criminal which allows him to get caught. It is possible for someone to completely cover their tracks and leave no evidence of their actions.
But it is also possible to log every action a hacker does. Erasing the logs doesn't do much when the compromised system is virtually hosted and every action recorded for later playback - on a system which isn't even visible to the hacker. And consider the possibility of tracing at the network level. It is possible to physically connect an ethernet chip to a network and capture all traffic on the network without ever joining the network. That is, the card can sniff the wire in a read-only mode without ever publishing its MAC address or responding to ARP queries. Even if the hacker does use encryption, can he really be sure that his machine hasn't been rooted and keylogged? Can today's hackers verify even the microcode inside their processors and BIOS? If he can cover his tracks, so can the FBI.
How does a hacker know his rootkit isn't spying on him? Even if you have the source, a compromised compiler or assembler can still produce a compromised executable. Should you verify the executable by hand, you still have the possibility of a vulnerability in the processor's microcode. Something as simple as making any area of memory available to the NIC when a certain opcode sequence is executed could be hidden very well and provide a veritable back door to law enforcement.
Unless you are willing to build your own computer from scratch and never connect it to a public network, you can never prove that you aren't compromised. Sure, we can talk statistics and likelihood and incentives and human factors and whatnot, but it doesn't change two fundamental aspects of the computer:
Your averge user - heck, even most programmers and hackers - don't have the time to trace through every possible instruction path in the software they use. They aren't going to burn their own BIOS EEPROMs to be sure the BIOS isn't bugging them. They aren't going to surgically remove the processor's cover and verify the die pattern to be sure the microcode isn't compromised.
Instead, they're going to trust the responses their computer shows them. Just like the rest of us - it's a gamble. Maybe the hacker compromised a bank - or maybe, the bank is in cahoots with the FBI, and he's just knocked over the honeypot. He won't know until he goes to the bank - and withdraws his cash, or gets arrested.
Still a pretty big risk, imho.
Re: (Score:3, Insightful)
Even if the hacker does use encryption, can he really be sure that his machine hasn't been rooted and keylogged? Can today's hackers verify even the microcode inside their processors and BIOS? If he can cover his tracks, so can the FBI.
Yeah, if you assume Orwellian powers on the part of the FBI. No, the FBI doesn't have secret backdoors in all the hardware and software because it would take a VERY short period of time before those backdoors became public knowledge, making them near-useless AND compromising everyone's security. This is exactly what has happened in the past and I don't see them repeating these mistakes. I can't think of a worse idea than the FBI distributing troyjan rootkits into the wild.
Maybe the hacker compromised a bank - or maybe, the bank is in cahoots with the FBI, and he's just knocked over the honeypot. He won't know until he goes to the bank - and withdraws his cash, or gets arrested.
I don't think you understand how
Tools (Score:4, Insightful)
In other words, forensics tools can assemble the history of file use on a disk. If it's known that the disk was in use before a certain date, but no timestamps can be found before that date (on current or deleted files), one may suspect the disk was wiped at that point. Likewise, physical disk usage for a given file system type has known and studied statistical characteristics over time. If the statistics are off, if you don't find deleted file images where you expect them, you may suspect that the freespace was wiped, or that certain unused disk space that would normally contain deleted file images contained files that are now wiped.
What happens when you have a tool that modifies timestamps on current and deleted files such that a normal distribution of them extend back before the date of disk wipe? Even worse, what happens if the tool can create "ghost" images of deleted files, in order to fool tools that look for normal statistical disk usage?
Once you have such a tool, wiping a disk and starting over can literally be done undetectably. So much for worry about having to maintain disk drive evidence after being hit with a subpoena.
Willunwhen the file istobe created... (Score:3, Funny)
Uhh - got to work on my future imperfect past continuous tense.
Re: (Score:3, Interesting)
In fact, this just exposes how ludicrous courts' treatment of digital "evidence" is. The information they accept as evidence can be trivially faked. Think it sounds far-fetched to be framed for a crime? That's not so difficult when someone can just flip a few bits on your hard drive, maybe via a memory-resident-only exploit, then call in an anonymous tip to the poli
Re:interesting (Score:5, Interesting)
Re:interesting (Score:5, Informative)
Re:interesting (Score:4, Interesting)
As far as I know, there has not been one scrap of evidence showing that past disk writes can be examined through microscopy, or any other kind of direct physical examination.
The most powerful technique I know of would be Magnetic Force Microscopy (MFM), which is essentially a variant of AFM (Atomic Force Microscopy [veeco.com]) that uses a magnetized tip. When I was an undergraduate, I used AFM to image surface features as small as 50 nm, which a quick calculation shows to be comparable to the square root of the physical area used to store a bit on a modern hard drive. Presumably, somebody with more experience or better equipment could do better; it's not a difficult technique if you just want to learn the basics. To actually scan a hard drive in a reasonable amount of time would require a very specialized MFM machine, but I see no reason why such things wouldn't be available to various three-letter agencies.
Now, I don't know whether there is any residual information to get from an overwritten bit, but it would surprise me if there wasn't, and if there is, it can probably be gotten with MFM, if not an easier technique.
Re:But does it withstand rubberhose cryptoanalysis (Score:3, Insightful)
"Deniable" Encryption Useless (Score:3, Insightful)
Re: (Score:3, Interesting)
Just filling the blanks with zeros, it's quite trivial to recover the data underneath. Filling it with random static makes it harder. Filling it 3 times makes it even harder. Filling it 30 times adds another layer of hardship.
Generally, though, you can assume this to be a lim 1/x function. It gets harder and harder to recover anything, to the point where you would really have to warrant the ex
Re: (Score:3, Informative)
Once upon a time, heads didn't track so precisely as they do today, and there were sometimes minute traces of data either side of the track; and once upon a time, magnetic media had a wide hysteresis l