Digital Witness Remote Method for Volunteering Digital Evidence on - - PowerPoint PPT Presentation

digital witness
SMART_READER_LITE
LIVE PREVIEW

Digital Witness Remote Method for Volunteering Digital Evidence on - - PowerPoint PPT Presentation

Digital Witness Remote Method for Volunteering Digital Evidence on Mobile Devices Nigel Campbell , Evan Stuart, Trevor Goodyear, Winston Messer, and James Fairbanks $ whoami Research Scientist @ GTRI Software Developer MSCS Student


slide-1
SLIDE 1

Digital Witness

Remote Method for Volunteering Digital Evidence on Mobile Devices

Nigel Campbell, Evan Stuart, Trevor Goodyear, Winston Messer, and James Fairbanks

slide-2
SLIDE 2

$ whoami

  • Research Scientist @ GTRI
  • Software Developer
  • MSCS Student
slide-3
SLIDE 3

https://www.army.mil/article/39356/evidence_collection_course_helps_ips_close_cases

Overview

slide-4
SLIDE 4

Overview

  • Problem and State of the Art
  • Security and Threat Model
  • Mobile App
  • Custody Control
  • Officer Facing Application
  • Conclusions and Future Work
slide-5
SLIDE 5

State of the Art

  • Witness or Victim has digital evidence
  • They report to police officers
  • Officers take an image of entire phone using forensic software such as

Cellebrite or FTK Imager.

  • Officers then take image and analyze it within their forensics suite of

tools (E.g. Autopsy, EnCase)

slide-6
SLIDE 6

Cellebrite Devices give the impression of selective capture

slide-7
SLIDE 7

Introduction

  • Working with the DeKalb County Police

Department we observed a typical forensic capture time of a mobile phone

  • f approximately 2 hours.
  • Plus time traveling to and from the police

station

  • Plus time spent waiting for a device to

clear the evidence backlog.

slide-8
SLIDE 8

Quis custodiet ipsos custodes?

  • Without FOSS forensics tools,

police themselves can’t verify privacy policies

  • FBI vs Apple
  • Cellebrite
  • Greybox
slide-9
SLIDE 9

Current Workflow is Problematic

  • Takes too long to extract information
  • Consumes PD resources
  • Valid privacy concerns
  • Office time spent identifying relevant information
slide-10
SLIDE 10

http://www.iacpcybercenter.org/wp-content/uploads/2015/04/Fotolia_71032379_digital-evidence.jpg

Solution

slide-11
SLIDE 11

Solution Architecture

slide-12
SLIDE 12

Open Source

github.com/DigitalWitness

slide-13
SLIDE 13

Physical Evidence Submission

  • Evidence must be tracked with the

case it belongs to.

  • Pen and Paper evidence locker
  • Evidence is checked in and out, these
  • perations is need to be translated
  • Chain of Custody is a sequence of:

(item, name, date)

slide-14
SLIDE 14

Digital Evidence Submission

  • Lawful Authority: warrant, court
  • rder …
  • No rigorous chain of custody

available for Digital Evidence

  • Our custody component brings

this process up to date

slide-15
SLIDE 15

Threat Model

  • Our threat model is not one of full trust or skepticism
  • Police and courts trust the software
  • Users want to minimize data exposed to police
  • Police want to verify authorship of data revealed to them
  • Courts and interest groups (eg ACLU) want to verify police assertions
  • Human factors of witnesses and victims is important

Information Flow

slide-16
SLIDE 16

Security Model

  • Authorities must prove that they are collecting only the information

that they claim to collect

  • PKI Encryption is used:

○ Mobile devices must generate their own private keys ○ Mobile devices must deliver the public parts to the authorities

slide-17
SLIDE 17

Disclosing Specific Evidence: Mobile App

  • The Disclose app allows Android

and iOS users to upload evidence

  • Permissions are minimally invasive

and time out after submission

  • Witnesses and Victims can

authenticate with existing accounts, convenient and helpful to authorities

slide-18
SLIDE 18

Disclose: Account Creation

  • On signup, device specific ECDSA

public/private keys are generated.

  • Public key is submitted to the custody

server process.

  • Private key is subsequently used to

generate digital signatures for evidence

slide-19
SLIDE 19

Disclose: Evidence Selection and Submission

slide-20
SLIDE 20

Disclose: Digital Signature Creation

  • During submission

○ Signature is created via the ECDSA private key ○ Verified by the custody server (using previously submitted public key).

  • Ensures authenticity and message integrity.
slide-21
SLIDE 21

Officer Facing Application

Officers can view all the evidence submitted including Geolocation and Metadata Integrity of this information is protected by chain of custody.

slide-22
SLIDE 22

Maintaining the “digital” chain of custody

  • Creation of distinct identities (witnesses/victims)
  • Recording signatures (for evidence submissions)
  • The digital ledger
slide-23
SLIDE 23

Custody Ledger

slide-24
SLIDE 24

Custody Control

  • Identities hold the user information
  • Ledge tracks the messages
  • Each entry in the Ledger has a parent and a

signature that can be used to verify the integrity of the message

  • By incorporating the signature of the parent

entry into the message of the next entry, the ledger protects against evidence fabrication

slide-25
SLIDE 25

Why not blockchain

  • We don’t need a distributed ledger
  • There is a central broker anyway, the

federal court system

  • No way to incentivise people to supply

compute power for verification

  • We can get what we need with Merkle

Trees and PKI

The Central Broker (2018)

slide-26
SLIDE 26

Merkle Trees

The custody component contains a merkle tree implementation for validating the chain of custody. Given a piece of evidence (message) and the Top Hash (from the custody service). Watchdogs can verify that the evidence was collected in the order the Officers say it was.

slide-27
SLIDE 27

Future Work

  • Field deployment and evaluation
  • Analytics of media collected
  • Crime forecasting
  • Identification of underserved areas and situational awareness
slide-28
SLIDE 28

Conclusions

  • Evidence submitted through Disclose can be verified and tracked
  • Actions by officers using the web app can be audited for privacy

violations and warrant requirements

  • ECDSA PKI and Merkle Trees are sufficient for providing these

guarantees

slide-29
SLIDE 29

GTPD COP

slide-30
SLIDE 30

Demo