Vista For Forensic Investigators 125
Ant writes "SecurityFocus has a two-part article offering a high-level look at changes in Windows Vista that a computer forensic investigator needs to know about. Part 1 covers the different versions of Vista available and Vista's built-in encryption, backup, and system protection features. Part 2 continues with a look at typical user activities such as Web browser and email usage."
Oh n0es (Score:5, Interesting)
This may make it easier for the not so completely stupid criminals to protect themselves, but I doubt it will have any real effect.
People are stupid. Thats why they get caught.
Re: (Score:3, Informative)
Bitlocker (which encrypts the whole windows volume ala Truecrypt but bootable) requires a TPM 1.2 chip in it, which you'd be hard pressed to find in ANY computer.
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
At the risk of sounding like an overly-eager Apple fanboi (bleck!), recent Macs have an Infineon TPM 1.2 chip in them.
Re: (Score:2)
Re: (Score:2)
Re:Oh n0es (Score:5, Informative)
And just about any computer manufactured after January 2006 will have TPM 1.2.
Re: (Score:2)
Of course the smart ones may never come to my attention.
Also I haven't been looking at criminal cases, so the motivation level might be lower -- but don't overestimate the level of computer knowledge in the general population.
Damn Straight (Score:2)
People are stupid. Thats why they get caught.
Damn Straight. This is what you should remember whenever there is news coverage of a notorious cracker getting arrested, or some huge identity theft ring being broken up.
It is not the crimes you KNOW about, it's the ones you DON'T KNOW ABOUT that are the real issue.
Smart criminals not only do not get caught, they aren't even being looked for because their crimes go undetected.
Re:Oh n0es (Score:5, Insightful)
The defendant has no obligation to provide the prosecution with incriminating information.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
A court order doesn't override the defendant's constitutional rights. If the prosecutor really wants the information badly enough, the defendant can be granted immunity or "use immunity". Then the defendant could be held in contempt of court if he refused to testify, the grant of immunity having negated the possibility of self-incrimination.
Even then I believe you can refuse. Imagine a child-obscene picture case, held before a grand jury. If I know there are pictures there that will compromise my image, I don't want to reveal them, even for immunity. The public outrage and the possibility of loosing my reputations is too big. Now, substitute that for your petty (pretty major for some) crime and then talk to me about honestly.
Besides, what is the point of the pictures if I am granted immunity? To incriminate others... so either persuade me or
Re: (Score:2)
It would be similar to them naming the contents
Re:Oh n0es (Score:5, Interesting)
Re: (Score:2, Informative)
Indeed, it is obvious. IANAL either and while there is some truth to your argument it is mostly false. The fifth amendment applies at any time. If the police go to your house and ask if you killed your wife, your refusal to answer can not be used as evidence of your guilt. If they ask for the combination to your safe, you can claim the fifth amendment and decline to answer.
You can even invoke the fifth amendment as a witness. For example, if the
Re: (Score:2)
Haven't you ever seen Law and Order? (Score:2)
Re:Oh n0es (Score:4, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:3, Interesting)
In the past, courts have rules that an encryption key is analogous to a physical key, and like a physical key, can be demanded with a warrant.
Does anyone know why they came to that decision rather than treating encrypted computer documents the same way as paper documents (journals, diaries etc) which are written in code? IANAL but AFAIK the precedent with the latter is that they cannot force you to decode them. In both cases they are in possession of the physical document - that they are unable to understand it is their problem.
Re: (Score:2)
You misunderstand the use of the 5th Amendment. In its broadest form, it applies only to direct admissions by the defendant. A defendant cannot be ordered to confess, or punished for not doing so, or be forced to provide testimony that amounts to a confession.
HOWEVER... Defendants CAN be compelled by the court to provide:
The Law (Score:3, Informative)
1) evidence exists
2) the person has a key for getting/finding the evidence
3) producing the key does not link the evidence to the person (aka authentication)
Fisher v US
Its like you have evidence in your safe but so do other people, so they can force you to open the safe despite the 5th- is my understanding of the
Re: (Score:2)
Repeat: Something you know, Something you have... Something you know, Something you have...
Your biometric alone does not provide security or authentication.
Re: (Score:2)
Re: (Score:2)
Or if there's no encrypted file to begin with. If I, um, had something to hide, I'd make it as non-obvious as possible that file X is actually an encrypted file to begin with. "Officer, I don't know what that file is or what it's for - it's in that 'windows\system' folder, and I don't know what any of those files do". For all they know, WeatherBug could have installed that file whose contents just happen to not be plain text.
Re: (Score:2)
The idea is everything is encrypted. If someone steals my laptop, I don't want them to get into any of my files, see my browsing history, see what drivers I have installed for expensive hardware at my house etc.
Re: (Score:3, Informative)
Re: (Score:2)
One of the clauses states that if you fail to decrypt something at the courts request you get a 5 year statutory term in prison.
Vista is for criminals, it assists encryption (Score:4, Funny)
In Linux, encryption is done with unusual and special commands in conjuction with mounting a "loop" device to a filesystem; requiring administrator privileges to try to encrypt data like that, and adding to the subversion of a system with evidence of a corrupt administrator.
What kind of administrator would allow encryption on a filesystem? Obviously, a criminal.
Information is meant to be free, and open source. Encryption is somthing we would expect Mycrow$oft to use to help criminals be found by the good god-fearing men and women of the DEA/FBI/CIA/GATT/IMF/IRS just to atone for their sins.
Good people use OSX.
Call me,
Eve.
Re: (Score:1)
Are you kidding me?
Re: (Score:2)
yes.
It's Funny! Laugh!
Re: (Score:2)
Wooo...
...ooo...
...ooosh!
Re: (Score:1)
That's not quite the case. Imagine your average information thief. He/she can steal information in one of two ways: online or physically. Now let's say some innocent government or corporate employee left a laptop with sensitive data on it (such as proprietary secrets). Our thief can pick up this laptop, and if it's not encrypted as you suggest because the employee and his/her company are innocent of any criminal activity, the criminal can read the entire contents of the disk.
An encrypted drive makes this h
Quality (Score:1)
Re: (Score:1)
This guide is intended for the following audiences:
-IT planners and analysts who are evaluating the product
-Security architects
nOhtign to ese hree (Score:2)
Gasp! (Score:2)
Now that I think of it... a lot starts to make sense, you know...
Re: (Score:2)
Wow. (Score:4, Funny)
They're ReadyBoosting! (Score:2)
If your OS is *disgustingly, *alarmingly inefficient with resources, you can stick a thumbdrive in it and cross your fingers that the email you just spent half an hour typing on will go through.
In other news if your car gets 1.4 miles per gallon, you can drive around with a few 50-gallon drums of gasoline to get you through out of those tight spots.
Re: (Score:2)
Sorry, I can't resist a dig at that stupid concept.
What stupid concept ? Disk caching ? Because that's all ReadyBoost ultimately is - a disk cache.
No encryption by default (Score:4, Informative)
Re:No encryption by default (Score:4, Insightful)
Re: (Score:2)
Yes, I am aware of the "NSA secret backdoor thing".
Re: (Score:1)
Next question...
Re: (Score:2)
They could be sending credit card numbers, or SSNs, or your personal files, or your porn, or even every single piece of data on your computer!
Re:No encryption by default (Score:4, Funny)
I've never read a more self-redundant sentence.
Re: (Score:1)
It simply is not possible to personally check and verify every piece of code that gets executed on your computer.
So yes, it's
Re: (Score:2)
Long answer: no, but which software *can* you trust? If you install, say, Mandriva, how do you know that it's not going to "phone home" any of your data? Oh, sure, there's no such functionality in the source code, but how do you know that the binaries you're running do correspond to the source code you're getting? And while you might think that simply recompiling everything will help, it's not actually going to - Ken Thompson demonstrated this nicely. If you're using the shipped compiler, y
Re: (Score:1)
Re: (Score:1, Troll)
Re: (Score:1, Funny)
Yes.
Re: (Score:2)
I don't think MS would be able to get away with doing anything like that now, too many eyes on packets comin from Windows.
Re: (Score:2)
Sounds more like an obfuscation system than en encryption system. The point with encryption is that no one except those you give the key to, should be able to decrypt the information.
Re: (Score:2)
You're technically correct. But it hasn't stopped lots of things which claimed to offer "encryption" being sold on the open market.
For instance:
http://it.slashdot.org/article.pl?sid=07/04/13/123 0223 [slashdot.org]
Re: (Score:1)
BDE, a fitting name... (Score:2, Insightful)
now microsoft has made it a feature in their new os, giving us greater spyware value by cutting out the middle man!
If they want to bust you, they will (Score:3, Insightful)
But in the end, encryption offers only limited protection. If some well-resourced hostile authority wants to take you down, there's endless options for framing you up. For instance, they could mess with your ISP's logs to fabricate http hits to k1dd13 pr0n sites, or infect your box with a bot that hits such sites on your behalf, which will cause the hits without messing with the ISP's logs...
Re: (Score:3, Informative)
And by the way, what kind of bozo puts incriminating evidence on a computer period? Unless they deal in child pornography they wouldn't even have that data on the computer. (Unless you're that one idiot that used Microsoft word to print off a fake suicide note)
Like
Re:If they want to bust you, they will (Score:4, Insightful)
Whenever it comes to these things, I find myself in a bit of a quandary. Of course I want various criminals to get busted, but these investigators are essentially relying on poor security to get their information. I generally want computers to have good security. I don't like the idea of people being able to see my personal info or browsing history, but I'm also not really hiding anything.
oh well...
Re: (Score:2, Funny)
*mboverload is sad because he hears these arguments from people but doesn't know how to fight against it. Someone help.*
Re:If they want to bust you, they will (Score:4, Insightful)
"If you have nothing to hide, then you won't mind taking out a newspaper ad with your SSN, your DOB, your credit card numbers, your mother's maiden name, and your driver's license number. Either you have something to hide, or you'll quickly learn that you had something you should have kept hidden."
Re: (Score:3, Informative)
If you don't respect and trust me, than there is something fundamentally wrong with our relationship.
If there is something fundamentally wrong with our relationship then I wish to end it. **OR**
If there is something fundamentally wrong with our relationship then we need to fix that.
As far as society, and police/government initiatives its the same baseic question of trust and respect. Do we want to live in a police state? What fundame
Re: (Score:3, Interesting)
Also, I don't like the thought of government being able to make arbitrary
Re: (Score:3, Insightful)
Also, demand all government officials (including senators and the president) must be bugged and have their movements and conversation monitored 24/7, and the full details made public, with archives and live feed to ensure that they aren't corrupt. Remember, they won't object if they have nothing
encypted backups? (Score:5, Interesting)
Re: (Score:1)
That way, they can't be stolen.
Re: (Score:1)
Re: (Score:2)
http://www.microsoft.com/resources/documentation/w indows/xp/all/proddocs/en-us/if.mspx?mfr=true [microsoft.com] (search page for "nul")
It exists.
Re: (Score:2)
eg:
copy con lpt1 -- send anything you type to printer on lpt1
md newdir > nul -- redirect output to nul
Re: (Score:1)
And to really rub your nose in it, Windows won't allow you to create a file or directory anywhere with any of those names. Just what I need from a filesystem: An historically bound list of arbitrary letter combinations that I can't use as a filename anywhere. Oh well, at least it's saved them the tro
Re: (Score:2)
You cannot name your Word document AUX.DOC or NUL.DOC
The funny thing is that not all applications recognize (like Word) that it is unwise to save your file as NUL.whatever. They just save the file and make you looking for it later.
Re: (Score:1)
Re: (Score:2)
It depends on why you're encrypting and how you're backing up. In this case, copying the files to an unencrypted disk will give you unencrypted files.
In short, the purpose of encrypting your hard drive in this way is to prevent hacking from someone who as physical access to the machine. For example, if you give me a standard XP system, I can use a boot CD to reset your passwords. I can boot to another OS and access your files directly. If your system is up and running, Windows will protect your files w
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
No, I said if you take an image of the volume instead of copying the files, ie, if you access the raw hdd data, before filesystem driver tries to translate it.
Re: (Score:2)
Re: (Score:2)
Original post: "In this case, copying the files to an unencrypted disk will give you unencrypted files"
My post: "Unless you backup the volume (take an image) rather than the files"
IOW: Copying the files gives you unencrypted files, unless you backup the volume (take an image), rather than copy the files"
Make sense now?
Re: (Score:3, Interesting)
Firewire ports and PCMCIA slots have direct memory access, so can be used to copy an image of your computer's RAM even if no one is logged in. This can recover useful forensic material even after a reboot cycle, as modern BIOS's don't clear RAM.
It looks like Vista's disk encryption is useless if you switch on the PC and access files.
I find it funny. (Score:4, Funny)
Encryption use is low anyway... (Score:3, Interesting)
force the bad guy to give up passwords (Score:2)
No problem (Score:2)
Re: (Score:2)
Re: (Score:1, Interesting)
Re: (Score:2)
Re: (Score:1, Insightful)
That's awesome - as long as you have some way to tell who the "bad guys" are before you get their password. Otherwise what you are talking about is making the use of encryption a jailable offence.
Re: (Score:1)
Re: (Score:2)
Wow...
Well, good some encryption tools implement plausible deniability then.
Re: (Score:2)
Your experience of the use of encryption probably stems from the fact that you work with local police on small scale criminals rathern than for the CIA on big inernational operations.
How's the Vista from there? (Score:1, Funny)
Know what's interesting? (Score:3, Insightful)
Peruse them and you might notice something. Well? Right. A handful deals with the problem of having your notebook stolen, while the majority discusses the effects of it on a search. I.e. more people being concerned of the effects to a search than to having your computer stolen.
Makes me wonder... does it tell me something 'bout the people here or about the governments we live in?
Re: (Score:2)
That's pretty obvious. The article is about Vista and computer forensic investigation. That would be why most of the comments are focusing on a search and seizure situation.
how secure is vista, really? (Score:3, Interesting)
From what I have heard, all rumor and third-party, windows' encrypted home folders is worthless from a true security standpoint. I have been told that there is a master key in use similar to the master password in OS X, but that it is not one that the user makes, it comes pre-made from microsoft. No one outside microsoft has the private key to unlock that certificate. So if you lose your password, YOU are screwed, but if microsoft really wanted into your data they could get into it. (or let someone else into it) I don't know if there is a documented way to erase this copy of the image's crypto key encrypted with microsoft's back door password. Also I wonder if an administrator could simply reset the password on the account and then login with the new password to just waltz by the entire security of the system?
How much of this is fact and how much is fiction? We have seen time and time again that security by secrecy and security by "but we would NEVER misuse our master key" is a complete laugh, because (A) the secret ALWAYS gets out, and (B) someone ALWAYS ends up misusing the master key. In this respect I feel sorry for the windows users because the wolves are guarding the sheep.
Sidenote: OS X also has a built-in feature that lets you create a regular encrypted disk image. When you make one of those, the machine's master password is not used to store another encrypted copy of the image key as with filevault, so those disk images have only one actual key. I use this to store a password list on my flash drive because of how easy they are to lose, and I am completely confident that anyone that finds the flash drive will be absolutely unable to access my information. I assume that a 3rd party solution is required for windows users?
Somewhat OT, but I have also been told that it's essentially impossible for even an administrator to just read another user's data on the same hard drive, that they have to "take ownership" of the files to read thm, thus altering the data. Yet viruses apparently can multiply at will, infecting all accounts on the computer. Why is it that the viruses have no problem circumventing windows security while at the same time it's nigh imposible for the administrator to do the same thing? Tha does not make sense.
Wait for DVD Jon to figure out the NSA Key. (Score:2)
I wonder how the Chinese and Russians view this "consultation"?
Re: (Score:1)
Re:BitLocker is no impediment to police... (Score:4, Informative)