Computer 
                                    Forensic Cyber sleuths
                                    
                                     
                                    
                                    
                                    Computer forensic analysts -
                                    the consulting detectives of the digital world - are in big demand as
                                    computer-related evidence proves increasingly critical in solving crimes.
                                    
                                     
                                    
                                            In the days of Raymond
                                    Chandler's wise-cracking sleuth
                                    Philip Marlowe, the proverbial "smoking gun" was a trail of physical
                                    evidence. Now, due to the proliferation of computers, mobile phones, PDAs and
                                    lately iPods, that trail often includes a good deal of digital evidence.
                                    Sometimes a deleted e-mail or Internet bookmark, retrieved by experts from the
                                    hard drive, is the key to getting a conviction. In South Dakota in 1999, for
                                    example, a woman was found drowned in her bath. An autopsy showed a high level
                                    of the sleeping pill Temazepan in her bloodstream. It looked like a typical
                                    suicide - until investigators  took a
                                    close look at her husband's computer. It turned out he had been researching
                                    painless killing methods on the Internet and taking notes on sleeping pills and
                                    household cleaners. Armed with that evidence prosecutors were eventually able
                                    to put him behind bars.
                                    
                                     
                                    
                                            Law enforcement
                                    agencies across the world are realizing
                                    that computer-related evidence can prove crucial in catching all kinds of
                                    criminals, not just hackers. That's why they are scrambling to hire officers skilled
                                    in computer forensics, the discipline of collecting electronic evidence. Here
                                    in Britain, the Metropolitan Police is currently advertising for new recruits
                                    in the field. "Successful candidates will be involved in the analysis of
                                    computer-based media, advising officers on their findings, and giving evidence
                                    in court," the recruitment team says. The qualifications required for
                                    entry level are degrees in computer science and/or information security. In
                                    America, the FBI manages and funds a growing number of computer forensic labs
                                    and is also looking to recruit more personnel. In 1984 the bureau's  "Magnetic Media Program" handled a
                                    total of three cases; last year, its labs handled more than 1,500 cases and
                                    trained more than 2,000 personnel.
                                    
                                     
                                    
                                     Growing
                                    marketplace
                                    
                                     
                                    
                                             There
                                    is also a good deal of scope for both skilled and
                                    budding computer analysts (here and in the US) outside of police forces and
                                    government agencies, as now a large percentage of computer forensics work is
                                    outsourced due to increasing demand. "The whole marketplace is growing
                                    exponentially," says Andy Frowen, forensics director at CCL-Forensics (www.ccl-forensics.com), a Warwickshire-based firm
                                    supplying computer forensics services to ten police agencies across the UK.
                                    "There are two reasons for this growth - one, more and more people own PCs
                                    and are connected to the Internet, and two, the police are becoming
                                    increasingly aware that these devices can be used either to commit or
                                    facilitate crime."
                                    
                                     
                                    
                                            In the past, police
                                    would typically seize computer systems
                                    in connection with suspected pedophile or hacking offences - crimes committed
                                    on a computer. "Today," says Frowen, "they seize computer
                                    systems in murder, rape and fraud cases where you wouldn't normally equate the
                                    computer with the crime. Since computers are now such a part of everyday life,
                                    almost every crime at some point touches a computer."
                                    
                                     
                                    
                                    Imaging
                                    
                                     
                                    
                                             Regardless
                                    of the nature of a crime, it is crucial to
                                    ensure the evidence stays intact - just like at a physical crime scene. This is
                                    why digital forensic examiners never work directly on suspects' computers.
                                    "Every time you look at a file on a computer, it changes - the date stamp,
                                    for instance, would register the day and time you opened the file, thus
                                    contaminating the evidence," explains Neil Barrett, professor of
                                    criminology at the Royal Military College of Science, Cranfield University, and
                                    author of "Traces of Guild" (Corgi 2005). "We preserve digital
                                    evidence with a method known as imaging or freezing. A suspect's hard drive is
                                    removed and put in a computer that is 'write blocked' and can't write to the
                                    disk. A forensic image is then taken of that hard drive - an exact clone which
                                    can be examined to see whether it contains any incriminating evidence."
                                    
                                     
                                    
                                            The most widely
                                    used forensic software for viewing the
                                    contents of a cloned hard drive is EnCase (www.guidancesoftware.com),
                                    a proprietary Windows program that has been described as "the most
                                    court-validated software on earth."
                                    
                                     
                                    
                                            The key mantra for
                                    those in the computer forensics field
                                    is: delete doesn't mean gone. Deleting a file, emptying the recycle bin
                                    ("trash can" on Macs), or even re-formatting your hard drive, will
                                    not necessarily get rid of information - or evidence. This is because computers
                                    continue to retain data even after it has been emptied from the recycle bin.
                                    This data, stored as hidden files, will only leave the system when the space it
                                    occupies gets overwritten by a new file - considering the average hard drive is
                                    now at least 40 gigabytes or more, overwriting a file could take years.
                                    
                                     
                                    
                                            Not surprisingly,
                                    software is available commercially that
                                    both deletes and overwrites data in one swoop. One such program is the Privacy
                                    Suite from CyberScrub (www.cyberscrub.com),
                                    which claims to "remove all evidence of our online activity, erase previously
                                    'deleted' files, and securely destroy e-mail." Programs like this do have
                                    legitimate uses. Sensitive data, such as passwords, bank details, tax and
                                    health records, even if deleted, would be at risk if you sold your computer or
                                    if others gained access to it. In one highly publicised example, the hard disk
                                    of a computer discarded from a high street bank was found to have the banking
                                    details of Sir Paul McCartney, including account number, sort code and balance.
                                    
                                     
                                    
                                     Fragments
                                    left
                                    
                                     
                                    
                                             Criminals
                                    can use this type of software to cover their
                                    tracks too. The only problem is it is time consuming. "Erasing all tracks
                                    and traces using file wiping software can take around four or five hours, which
                                    makes it less attractive to criminals because they are put out of action for
                                    that time," says Chris Vaughan, senior forensic analyst at
                                    Manchester-based computer forensics firm CY4OR (www.cy4or.co.uk).
                                    "And to remove everything the file wiping software has to know exactly
                                    where to wipe. If it doesn't get this right, traces and fragments will be left,
                                    which can be pieced together like a jigsaw to provide an idea of the whole
                                    picture."
                                    
                                     
                                    
                                            So are criminals
                                    fighting a losing battle or are they
                                    getting one step ahead of the law? "It's rather bizarre," says Neil
                                    Barrett, whose digital evidence gathering has led to numerous criminals being
                                    brought to book, including Paul Gadd (aka pop star Gary Glitter) who was
                                    convicted for child pornography activities, "the criminals should be one
                                    step ahead of us because all they need do is encrypt their files and we
                                    wouldn't be able to get at them. Yet the people we catch rarely do this, even
                                    though encryption software is easily available. Maybe we're only catching the
                                    idiots."
                                    
                                     
                                    
                                    Counseling
                                    
                                     
                                    
                                             While
                                    computer forensics is used to gather evidence in a whole
                                    range of criminal activities, it is most commonly used in cases of child
                                    pornography. Which means forensic analysts have to look at images which could
                                    send even the most together person over the edge. Emma Webb-Hobson, another
                                    forensic analyst on the team at CY4OR (and one of the few women computer
                                    forensic analysts), says she copes by cutting her mind off from the subject
                                    matter: "You put yourself in the zone, so you aren't concentrating on it.
                                    You just get it done. The comforting factor is you are helping to stop this
                                    kind of crime." Unsurprisingly, seeing a counselor twice a year is
                                    mandatory at CY4OR. "Even if members of staff are feeling fine and dandy,
                                    they still have to go as part of our health and safety rules," says Joel
                                    Tobias, managing director of CY4OR.
                                    
                                     
                                    
                                            Because computer-related
                                    evidence is becoming a key part
                                    of evidence gathering, all those involved in the legal process need some level
                                    of technical knowledge. Neil Barrett, however, says that in his experience
                                    judges and juries are unprepared for digital evidence. In the Harold Shipman
                                    case, for example, the doctor had modified evidence on his computer, but was
                                    caught out by the date stamp on the records. "That obviously requires a
                                    jury to understand what a date stamp is and how it can and can't be modified.
                                    That requires someone who is an expert in computer technology to provide an
                                    interpretation in plain, non-technical English."
                                    
                                     
                                    
                                    Protect your innocence
                                    
                                     
                                    
                                             And
                                    according to Jeff Fischbach, a Los Angeles-based
                                    computer forensic analyst who has worked closely with the LA computer crimes
                                    division of the FBI, a major downside in the current growth in digital evidence
                                    gathering is more people are being falsely charged than before. He points to
                                    one client who was charged with possessing child pornography on his computer.
                                    By analysing his hard drive, Fischbach was able to determine the images came
                                    from spam and pop-ups and not through any intentional effort on the part of the
                                    defendant. "The shame of it all was that it never needed to happen. The man
                                    was in the last three years of his career and he spent his entire life savings
                                    defending himself, and nobody's going to give it back to him. His wife and kids
                                    left him. But that's what he had to pay to defend himself against a
                                    mistake."
                                    
                                     
                                    
                                            With the prevalence
                                    of spam and pop-ups, what can the
                                    innocent person do to protect themselves in the event that their computer is
                                    seized and analysed by police? "Law enforcement agencies ask us to look
                                    for signs of intent - did somebody run multiple searches on Google for 'child
                                    pornography' or did they open and view an illegal image hundreds of
                                    times," says CY4OR's senior forensic analyst Chris Vaughan. "So the
                                    advice to anybody who accidentally gets a pop-up is to close it instantly and
                                    if possible delete the Internet cache. The same goes for spam that gets through
                                    spam filters - delete it. This will show that you didn't want the material on
                                    your computer and that you didn't look at it for longer than you needed
                                    to."
                                    
                                     
                                    
                                            The field of computer
                                    forensics is constantly evolving to keep
                                    pace with the new devices coming on to the market. Any device that can store
                                    data - be it a smartphone (mobile phone and PDA combined), iPod or even an Xbox
                                    - can be used to harbour indecent images, illegal software or fraudulent
                                    documents. Criminals keen to take advantage of these new technologies, however,
                                    should take into account the words of US computer forensics expert John
                                    Mallery: "The only secure computer [or digital device] is one you never
                                    turn on, and you bury in the ground, six feet deep and cover with dirt."
                                    
                                     
                                    
                                    About Jimmy Lee Shreeve
                                    
                                     Jimmy Lee Shreeve is a writer and journalist
                                    living in
                                    Britain, but writing for newspapers and magazines around the world. He is
                                    author of a cult bestseller set around hoodoo, blues and rock and roll,
                                    published by St Martin's Press. And is currently writing a true crime title
                                    called "Blood Rites", which investigates the growing numbers of
                                    ritualistic murders, carried out by shamans and religious extremists, that have
                                    occurred in recent years in Africa, South America, and even in England, Ireland
                                    and the USA. Discover more at  
                                    www.jimmyleeshreeve.com.