Showing posts with label digital forensics. Show all posts
Showing posts with label digital forensics. Show all posts

Wednesday, September 30, 2015

Packed agenda at TX forensic commission Friday

What a packed agenda at the Texas Forensic Science Commission on Friday in Austin! Take a look, there's a lot happening. Here's a non-comprehensive taste of the issues they'll cover:
  • Two new lab disclosures and five new complaints
  • Discuss crime-lab accreditation program (shifted from DPS to FSC this session)
  • Discuss status of forensic licensure requirement (must be implemented by 2019)
  • Updates from two investigative panels on toolmark cases
  • Update from investigative panel on digital forensics
  • Update from bite-mark panel
  • Update from hair microscopy panel
  • Update from DNA mixture panel
  • Update on arson case review and implementation of recommendations
  • Update on status of Morton/Brady training for forensic scientists
And more ... It's going to be a long day.

Meanwhile, on Thursday (tomorrow), an FSC committee on DNA mixtures will reprise the agenda for which they could not obtain a quorum in Dallas two weeks ago.

FSC General Counsel Lynn Garcia may be the busiest mother of a two-year old I know.

Grits has complained for years that a lot of important stuff happens at the FSC and almost nobody in the media covers it. At the last FSC meeting there were two reporters there (Michael Hall from Texas Monthly and Brandi Grissom from the Dallas News), which is a lot for these events. And a third, the Texas Tribune's Terri Langford, showed up at the DNA-mixture meeting in Dallas. So given the extensive agenda and the unusual level of recent press interest in forensics, Grits will put the over-under on how many reporters will be there Friday at 2.5. Which is good, usually it's zero. There's a lot going on at this small agency for their activities to be as routinely ignored as they have been these last few years.

Thursday, November 06, 2014

Is DA's office right place for digital forensics?

Grits can't decide whether or not I approve of the Dallas DA creating a digital forensics division. Certainly, big-city law enforcement needs such capabilities. But I generally believe forensic analysis should be divorced from law enforcement, which to my mind includes the DA's office just as much as the police department.

Perhaps one could argue that digital forensics are different - that the requirements for objectivity when searching someone's phone or computer for evidence differ from the hard sciences. OTOH, the day accusations arise of evidence tampering, the fact that the forensic analyst is situated in the prosecutor's office may become a problem. Also, a DA's office isn't set up to manage an evidence room - which would be required to maintain a legitimate chain of custody for seized electronic items - the way police departments and crime labs routinely do. There are a lot of ways this could get screwed up.

I can't think of any other forensics activities based out of the DA's office, maybe that's for a reason! I'm not certain at first blush this is the right location for such a division and wonder about how the decision was made. In any event, I'd like to hear that debate. Offer your own opinions in the comments on the pros and cons of putting digital forensics under prosecutors' direct control.

MORE: Sky Chadde at the Dallas Observer's Unfair Park blog followed up with a post riffing on these themes.

Sunday, January 05, 2014

NSA jams San Antonio garage openers; forensic cookie capers

A couple of stories related to digital forensics caught my eye this morning that may interest Grits readers.

NSA jams San Antonio garage openers
First, a Texas-specific item. It's a shame we have to read this from a German magazine instead of the Texas media, but there's a must-read story from Der Spiegel (Dec. 30) about the NSA facility in San Antonio that opens:
In January 2010, numerous homeowners in San Antonio, Texas, stood baffled in front of their closed garage doors. They wanted to drive to work or head off to do their grocery shopping, but their garage door openers had gone dead, leaving them stranded. No matter how many times they pressed the buttons, the doors didn't budge. The problem primarily affected residents in the western part of the city, around Military Drive and the interstate highway known as Loop 410.

In the United States, a country of cars and commuters, the mysterious garage door problem quickly became an issue for local politicians. Ultimately, the municipal government solved the riddle. Fault for the error lay with the United States' foreign intelligence service, the National Security Agency, which has offices in San Antonio. Officials at the agency were forced to admit that one of the NSA's radio antennas was broadcasting at the same frequency as the garage door openers. Embarrassed officials at the intelligence agency promised to resolve the issue as quickly as possible, and soon the doors began opening again.

It was thanks to the garage door opener episode that Texans learned just how far the NSA's work had encroached upon their daily lives. For quite some time now, the intelligence agency has maintained a branch with around 2,000 employees at Lackland Air Force Base, also in San Antonio. In 2005, the agency took over a former Sony computer chip plant in the western part of the city. A brisk pace of construction commenced inside this enormous compound. The acquisition of the former chip factory at Sony Place was part of a massive expansion the agency began after the events of Sept. 11, 2001. ...
One of the two main buildings at the former plant has since housed a sophisticated NSA unit, one that has benefited the most from this expansion and has grown the fastest in recent years -- the Office of Tailored Access Operations, or TAO. This is the NSA's top operative unit -- something like a squad of plumbers that can be called in when normal access to a target is blocked.

According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks.

The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
Indeed, the unit maintains a catalog of spy tools, described in another Spiegel article, which "reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell."

Have a cookie, delete a cookie, give a cookie to a cop
Speaking of "getting the ungettable," while poking around various digital forensics blogs this morning I ran across this recent article on how to access incredibly detailed information from Google Analytics cookies, even if the computer user has deleted them. These aren't techniques only available to the NSA but to workaday computer forensic folk at police departments and domestic security agencies.  Wrote computer forensics examiner Mari DeGrazia:
The real power of the Google Analytic artifacts comes into play when deleted artifacts are recovered. By using Scalpel [ed. note: a file carving tool] and then parsing the carved files you can have some new data to play with and analyze.

Based on some initial and limited testing with Internet Explorer 11 and Windows 7, it appears the browser deletes then creates a new cookie when visiting a website rather then overwriting the old cookie. This means there could be a lot of cookies waiting to be recovered.
This technique not only allows forensic examiners to see what websites you visited and when but what keywords were used to get you there. In the faux example in the post, the last keywords listed on the spreadsheet created by the technique were "How to Clear History."

All kind of creepy, huh?

Monday, November 26, 2012

'Standing up for Mr. Nesbitt,' tracking the cell-phone trackers, and other digital forensics stories

Electronic privacy continues to gain more attention in the wake of the Petraeus scandal and other recent revelations about the scope of law enforcement snooping around people's electronic communications. Here are a few more recent tidbits that caught Grits' eye: