Perhaps the title of this article could be the title of the blog page overall… Nevertheless, digital forensics is an adventure in it’s own right. While doing some instruction at the Police Academy recently, a local Sheriff asked, quite poignantly “How do you make money?” Well, for the sake of his question and to elaborate a bit, we’ll dive into an example of how and whywe do what we do.
As we’ve detailed in previous articles, digital forensics is as much a science as it is a very specified manner of analyzing data. The methods by which we preserve and acquire data are tried and true and we adhere to them in the spirit of best practices. However, once the proverbial boxes have been checked, every case can take on a life of it’s own. Indeed, there are questions that come across digital forensic list serves daily asking the group if they’ve ever encountered “X” problem or how to deal with a particular device or issue. It certainly illustrates the point that virtually no two cases are the same.
Now, if your area of investigation is very focused – say, child exploitation – and you are an examiner who deals almost primarily with those cases, you will see less variance in the types of cases you work. Those cases mainly deal with images (pictures and video), but can also deal with things like encryption, time stamps, user accounts and tying all of those things together to help prove or disprove the case. One such case was undertaken by Pro Digital’s Owner, Patrick Siewert, during his time in law enforcement. In the particular case, the suspect stored child exploitation images not only on an external hard drive, but also within a media app on his iPad. The media was, naturally, password protected and the suspect was not willing to give up the password… or at least all of his passwords. However, a very intriguing work-around came about that is a great learning tool for all examiners dealing with a password block of some sort.
It became apparent through the computer forensic examination that the suspect used a program called “Roboform” on his computer and his iPad. Roboform stores user logins and passwords for websites for ease of access. For example, if you routinely go to your bank’s website and are don’t want to always type your login, Roboform can store the login and password information for you and perform these functions automatically upon visiting the website. It’s a first-world solution for a first-world problem. The logins and passwords are all stored in Roboform via a master password, but when performing a traditional “dead box” examination on the computer hard drive, all of that data is encrypted. Furthermore, the child exploitation images the suspect indicated were on the iPad were unrecoverable through forensic examination because a full physical (complete) extraction of the data on the iPad was and is not possible by using any of the industry-standard tools available. So in order to help prove what the suspect told us, that he copied illicit images onto his iPad (thus reproducing those images – a separate charge), we needed to come up with a work-around for the password protection on the media app.
After much discussion and advice-seeking, we decided to clone the suspect’s hard drive, insert the cloned drive into the computer that was seized and access Roboform in it’s native environment. Why did we clone the drive? Because we wanted to preserve the original drive in the state in which it was seized, if at all possible. When we did this, we had access to the desktop and associated programs, including Roboform, in their native format. The suspect did provide us with one password at the time of the search warrant and we discovered several others on the iPad in the Note app. Lo and behold, one of these passwords gave us full access to all of the login and password information stored in Roboform. Once we had this master list, we were able to try all of the passwords we found to access the media on the iPad and BOOM! One of them worked. Case solved and concluded successfully, if only a little unorthodox.
This example of how digital forensic cases evolve shows how in-depth and time-consuming some of these cases can be. And while it uses an illustration of an illicit image case, the challenges and potential obstacles are no different for other types of investigations (embezzlement, fraud, etc.) It further illustrates that, as every accomplished investigator knows, there’s more than one way to skin a cat. Tenacity and critical thinking factor greatly into an effective digital forensic examination and are qualities that all competent examiners should possess. After all, when someone’s freedom and the existence of potential additional victims may be on the line, don’t we owe it to our client(s) to give it everything we’ve got (apologies for the bad grammar)? You’re damn right we do.Author:
Patrick J. Siewert
Owner, Lead Forensic Examiner
Professional Digital Forensic Consulting, LLC
Based in Richmond, Virginia