Computer
Forensic Cyber sleuths
Computer forensic analysts -
the consulting detectives of the digital world - are in big demand as
computer-related evidence proves increasingly critical in solving crimes.
In the days of Raymond
Chandler's wise-cracking sleuth
Philip Marlowe, the proverbial "smoking gun" was a trail of physical
evidence. Now, due to the proliferation of computers, mobile phones, PDAs and
lately iPods, that trail often includes a good deal of digital evidence.
Sometimes a deleted e-mail or Internet bookmark, retrieved by experts from the
hard drive, is the key to getting a conviction. In South Dakota in 1999, for
example, a woman was found drowned in her bath. An autopsy showed a high level
of the sleeping pill Temazepan in her bloodstream. It looked like a typical
suicide - until investigators took a
close look at her husband's computer. It turned out he had been researching
painless killing methods on the Internet and taking notes on sleeping pills and
household cleaners. Armed with that evidence prosecutors were eventually able
to put him behind bars.
Law enforcement
agencies across the world are realizing
that computer-related evidence can prove crucial in catching all kinds of
criminals, not just hackers. That's why they are scrambling to hire officers skilled
in computer forensics, the discipline of collecting electronic evidence. Here
in Britain, the Metropolitan Police is currently advertising for new recruits
in the field. "Successful candidates will be involved in the analysis of
computer-based media, advising officers on their findings, and giving evidence
in court," the recruitment team says. The qualifications required for
entry level are degrees in computer science and/or information security. In
America, the FBI manages and funds a growing number of computer forensic labs
and is also looking to recruit more personnel. In 1984 the bureau's "Magnetic Media Program" handled a
total of three cases; last year, its labs handled more than 1,500 cases and
trained more than 2,000 personnel.
Growing
marketplace
There
is also a good deal of scope for both skilled and
budding computer analysts (here and in the US) outside of police forces and
government agencies, as now a large percentage of computer forensics work is
outsourced due to increasing demand. "The whole marketplace is growing
exponentially," says Andy Frowen, forensics director at CCL-Forensics (www.ccl-forensics.com), a Warwickshire-based firm
supplying computer forensics services to ten police agencies across the UK.
"There are two reasons for this growth - one, more and more people own PCs
and are connected to the Internet, and two, the police are becoming
increasingly aware that these devices can be used either to commit or
facilitate crime."
In the past, police
would typically seize computer systems
in connection with suspected pedophile or hacking offences - crimes committed
on a computer. "Today," says Frowen, "they seize computer
systems in murder, rape and fraud cases where you wouldn't normally equate the
computer with the crime. Since computers are now such a part of everyday life,
almost every crime at some point touches a computer."
Imaging
Regardless
of the nature of a crime, it is crucial to
ensure the evidence stays intact - just like at a physical crime scene. This is
why digital forensic examiners never work directly on suspects' computers.
"Every time you look at a file on a computer, it changes - the date stamp,
for instance, would register the day and time you opened the file, thus
contaminating the evidence," explains Neil Barrett, professor of
criminology at the Royal Military College of Science, Cranfield University, and
author of "Traces of Guild" (Corgi 2005). "We preserve digital
evidence with a method known as imaging or freezing. A suspect's hard drive is
removed and put in a computer that is 'write blocked' and can't write to the
disk. A forensic image is then taken of that hard drive - an exact clone which
can be examined to see whether it contains any incriminating evidence."
The most widely
used forensic software for viewing the
contents of a cloned hard drive is EnCase (www.guidancesoftware.com),
a proprietary Windows program that has been described as "the most
court-validated software on earth."
The key mantra for
those in the computer forensics field
is: delete doesn't mean gone. Deleting a file, emptying the recycle bin
("trash can" on Macs), or even re-formatting your hard drive, will
not necessarily get rid of information - or evidence. This is because computers
continue to retain data even after it has been emptied from the recycle bin.
This data, stored as hidden files, will only leave the system when the space it
occupies gets overwritten by a new file - considering the average hard drive is
now at least 40 gigabytes or more, overwriting a file could take years.
Not surprisingly,
software is available commercially that
both deletes and overwrites data in one swoop. One such program is the Privacy
Suite from CyberScrub (www.cyberscrub.com),
which claims to "remove all evidence of our online activity, erase previously
'deleted' files, and securely destroy e-mail." Programs like this do have
legitimate uses. Sensitive data, such as passwords, bank details, tax and
health records, even if deleted, would be at risk if you sold your computer or
if others gained access to it. In one highly publicised example, the hard disk
of a computer discarded from a high street bank was found to have the banking
details of Sir Paul McCartney, including account number, sort code and balance.
Fragments
left
Criminals
can use this type of software to cover their
tracks too. The only problem is it is time consuming. "Erasing all tracks
and traces using file wiping software can take around four or five hours, which
makes it less attractive to criminals because they are put out of action for
that time," says Chris Vaughan, senior forensic analyst at
Manchester-based computer forensics firm CY4OR (www.cy4or.co.uk).
"And to remove everything the file wiping software has to know exactly
where to wipe. If it doesn't get this right, traces and fragments will be left,
which can be pieced together like a jigsaw to provide an idea of the whole
picture."
So are criminals
fighting a losing battle or are they
getting one step ahead of the law? "It's rather bizarre," says Neil
Barrett, whose digital evidence gathering has led to numerous criminals being
brought to book, including Paul Gadd (aka pop star Gary Glitter) who was
convicted for child pornography activities, "the criminals should be one
step ahead of us because all they need do is encrypt their files and we
wouldn't be able to get at them. Yet the people we catch rarely do this, even
though encryption software is easily available. Maybe we're only catching the
idiots."
Counseling
While
computer forensics is used to gather evidence in a whole
range of criminal activities, it is most commonly used in cases of child
pornography. Which means forensic analysts have to look at images which could
send even the most together person over the edge. Emma Webb-Hobson, another
forensic analyst on the team at CY4OR (and one of the few women computer
forensic analysts), says she copes by cutting her mind off from the subject
matter: "You put yourself in the zone, so you aren't concentrating on it.
You just get it done. The comforting factor is you are helping to stop this
kind of crime." Unsurprisingly, seeing a counselor twice a year is
mandatory at CY4OR. "Even if members of staff are feeling fine and dandy,
they still have to go as part of our health and safety rules," says Joel
Tobias, managing director of CY4OR.
Because computer-related
evidence is becoming a key part
of evidence gathering, all those involved in the legal process need some level
of technical knowledge. Neil Barrett, however, says that in his experience
judges and juries are unprepared for digital evidence. In the Harold Shipman
case, for example, the doctor had modified evidence on his computer, but was
caught out by the date stamp on the records. "That obviously requires a
jury to understand what a date stamp is and how it can and can't be modified.
That requires someone who is an expert in computer technology to provide an
interpretation in plain, non-technical English."
Protect your innocence
And
according to Jeff Fischbach, a Los Angeles-based
computer forensic analyst who has worked closely with the LA computer crimes
division of the FBI, a major downside in the current growth in digital evidence
gathering is more people are being falsely charged than before. He points to
one client who was charged with possessing child pornography on his computer.
By analysing his hard drive, Fischbach was able to determine the images came
from spam and pop-ups and not through any intentional effort on the part of the
defendant. "The shame of it all was that it never needed to happen. The man
was in the last three years of his career and he spent his entire life savings
defending himself, and nobody's going to give it back to him. His wife and kids
left him. But that's what he had to pay to defend himself against a
mistake."
With the prevalence
of spam and pop-ups, what can the
innocent person do to protect themselves in the event that their computer is
seized and analysed by police? "Law enforcement agencies ask us to look
for signs of intent - did somebody run multiple searches on Google for 'child
pornography' or did they open and view an illegal image hundreds of
times," says CY4OR's senior forensic analyst Chris Vaughan. "So the
advice to anybody who accidentally gets a pop-up is to close it instantly and
if possible delete the Internet cache. The same goes for spam that gets through
spam filters - delete it. This will show that you didn't want the material on
your computer and that you didn't look at it for longer than you needed
to."
The field of computer
forensics is constantly evolving to keep
pace with the new devices coming on to the market. Any device that can store
data - be it a smartphone (mobile phone and PDA combined), iPod or even an Xbox
- can be used to harbour indecent images, illegal software or fraudulent
documents. Criminals keen to take advantage of these new technologies, however,
should take into account the words of US computer forensics expert John
Mallery: "The only secure computer [or digital device] is one you never
turn on, and you bury in the ground, six feet deep and cover with dirt."
About Jimmy Lee Shreeve
Jimmy Lee Shreeve is a writer and journalist
living in
Britain, but writing for newspapers and magazines around the world. He is
author of a cult bestseller set around hoodoo, blues and rock and roll,
published by St Martin's Press. And is currently writing a true crime title
called "Blood Rites", which investigates the growing numbers of
ritualistic murders, carried out by shamans and religious extremists, that have
occurred in recent years in Africa, South America, and even in England, Ireland
and the USA. Discover more at
www.jimmyleeshreeve.com.