00:03
>> Some volatile data considerations though.
00:03
The decision to shut down a system
00:03
should be made on a case-by-case basis.
00:03
Obviously gotten destructive activity occurring on
00:03
a system and it is rapidly changing,
00:03
and the environment essentially
00:03
untenable and you're not going to
00:03
be able to shut down or stop that process,
00:03
shutting down the system may be your only option.
00:03
Therefore, the decision to
00:03
forego the collection of volatile data
00:03
depends on if it is reasonably
00:03
expected to support the investigation.
00:03
We talked about that earlier,
00:03
that if a long time has maybe progressed from
00:03
the time you became aware of the incident till now,
00:03
it may not be good practice to collect volatile data
00:03
because it's essentially useless or you've
00:03
lost control of that system.
00:03
Two or three or four users who have logged on.
00:03
hinted that some of the processes that we are
00:03
going to demonstrate do
00:03
require some changes to the system.
00:03
Collecting volatile data does
00:03
require more extensive changes to
00:03
the system and that can
00:03
overwrite other more valuable data.
00:03
All of those types of
00:03
considerations have to be thought of
00:03
before collecting the data and or
00:03
shutting off the system and
00:03
foregoing the collection of that data.
00:03
Another problem that you may encounter when
00:03
trying to preserve evidence is inactivity.
00:03
Inactivity functions can limit
00:03
access that you have to a particular computer system.
00:03
You may have different sources of inactivity,
00:03
such as the power scheme that will essentially activate
00:03
itself to reduce power consumption
00:03
to a device or an entire system.
00:03
You also have your screensaver which will essentially
00:03
lock the computer after a certain period of time,
00:03
if they have that screensaver that
00:03
locks when the computer essentially is left alone.
00:03
Some screensavers won't work but some might
00:03
require a password upon waking up.
00:03
Then Hibernation will simply
00:03
cause RAM to be written to the hard drive and
00:03
then content can be restored on
00:03
power up but it may require a password.
00:03
One of the first things to consider
00:03
when you come to a scene and you
00:03
find a computer with a blank screen is
00:03
to ensure the monitor is powered on.
00:03
If nothing appears on
00:03
the screen depress the left Shift key.
00:03
Now depressing that left shift key
00:03
is important because that is
00:03
the only key that can't really be
00:03
hotkey to create some other process.
00:03
If you have a very technically
00:03
savvy computer user and they've set
00:03
up something on their system when you
00:03
push any other key but that left shift key,
00:03
the CCleaner or BleachBit is going to
00:03
run starting to wiping everything on that system.
00:03
To wake that system up simply press
00:03
that left shift key and the system
00:03
>> should wake itself up.
00:03
>> The other thing that we can
00:03
do to prevent inactivity functions
00:03
is to insert a Mouse jiggler into the system.
00:03
What a Mouse jiggler
00:03
it looks almost like a very small thumb drive.
00:03
It mimics a human interface device,
00:03
such as a mouse and it makes
00:03
very slight mouse movements very occasionally,
00:03
very sporadically that keep the system from
00:03
being inactive and creating these inactivity functions,
00:03
but still allows the investigator
00:03
to perform his functions.
00:03
This is an example of the Wiebe Tech mouse jiggler.
00:03
They're relatively inexpensive, I
00:03
think they are about 17 to 20 bucks.
00:03
You can buy those and then
00:03
insert those into the operating system
00:03
and it will prevent the system from becoming inactive.
00:03
The next consideration that we have when
00:03
preserving data are the active connections.
00:03
Connectivity is a data connection between two systems.
00:03
They are most prevalent in modem or
00:03
networked connections to the Internet
00:03
so almost any system
00:03
that turned on to encounter more than
00:03
likely in 2016 is willing to have
00:03
some type of network or other type of
00:03
connection to it unless you're dealing with
00:03
some type of crude sneakernet system.
00:03
Active connections an investigator
00:03
does not have complete control of the system.
00:03
It's very important to
00:03
understand what the computer is connected to,
00:03
who may or may not have control over that system.
00:03
The network state may provide
00:03
vital information to the investigation,
00:03
such as remote storage.
00:03
If we were to immediately disconnect all
00:03
of the network connections
00:03
to the computer as soon as we got there,
00:03
we might lose some of that vital information.
00:03
That being said, data can be
00:03
sent or received over active connections and
00:03
may permit someone to begin
00:03
active destruction measures on the system.
00:03
Until we're certain that we have
00:03
complete control over that system,
00:03
we can't necessarily let our guard down and assume that
00:03
we are the only ones who may be working on that system.
00:03
Investigators need to conduct an assessment of
00:03
the situation and determine if
00:03
terminating the connection is warranted,
00:03
but volatile information should be collected
00:03
apparent the connection must be terminated immediately.
00:03
Again it's going to depend on the situation
00:03
but the investigator must be
00:03
cognizant of some of these considerations
00:03
and do that continual assessment
00:03
as they're going through out
00:03
>> your investigation process.
00:03
>> Terminating connections,
00:03
a wired connection can be terminated
00:03
as easily as removing
00:03
a data cable from the back of the computer.
00:03
That being said, some computers,
00:03
as soon as they're disconnected,
00:03
they may revert back to
00:03
a wireless connection or a Bluetooth connection.
00:03
Wireless connections, it could be as simple
00:03
as a disconnecting the cable to
00:03
the wireless access point.
00:03
That entails being able to locate
00:03
the wireless access point and
00:03
generally in a home or a business,
00:03
they're going to be near cable modems or near the TV.
00:03
Then any type of cabling can help
00:03
identify those access points
00:03
if they're not readily apparent.
00:03
Access points are probably generally close to
00:03
the computer due to the radio wave limitations.
00:03
However, keep in mind though that waves
00:03
can propagate to other levels within the home,
00:03
so if you're in a home setting you could have
00:03
a WiFi network that is
00:03
essentially hidden or obfuscated out of sight.
00:03
That being said, if you disconnect one WiFi setting it
00:03
is quite possible that someone has
00:03
another WiFi setting very close by,
00:03
that when you disconnect one
00:03
it will auto connect to another one.
00:03
You may also have to just completely disable
00:03
the WiFi connections on that system as well.