Pages

Computer Forensics: The New Fingerprinting

After 31 years and 100,000 man-hours of conventional research, the famous case of the BTK killer was cracked with 15 minutes of work by a modern digital detective. The new breed of gumshoe is trained to study bytes the way old-school G-men studied fingerprints. And it's paying off.


by Brad Reagan

http://www.popularmechanics.com/technology




The night Cindy M.* disappeared, she ate dinner with her parents and older brother in the family's two-story suburban Pittsburgh home, then went to her room and promised to come back for apple-walnut pie. The pretty 13-year-old with dark blond hair and blue-green eyes never returned. When her parents checked her room, they found neither a note nor a sign of forced entry. It was New Year's Day, 2002, and their daughter was simply gone.

Pittsburgh police spent almost two days interviewing Cindy's friends and family, while neighbors scoured nearby fields and gullies, but everyone came up empty. When FBI special agent Denise Holtz took over the case, late on Jan. 2, the investigation had barely moved beyond square one.

This is what Holtz knew: Cindy was a shy child who wrote poetry and frequently made the honor roll. She was rarely in trouble. She could have run away, but she left her coat hanging in the closet on one of the coldest nights of the year. Only one tidbit seemed promising: Friends said Cindy frequented Internet chat rooms.

A six-year veteran of the Crimes Against Children Task Force, Holtz suspected the answer to Cindy's disappearance was hidden within the girl's upstairs computer. She also knew that it might already be too late. If Cindy had fallen into the hands of a killer, the statistics were grim: 74 percent of abducted children who are murdered are dead within 3 hours.

* Not her real name

When Andy Spruill, a computer forensics examiner at Guidance Software, looks into a hard drive, he sees everything about its owner. "It's like looking into his mind," he says. Here's how he and other computer sleuths find their clues.
Step 1
Computer drives that may contain evidence are attached to a write-blocking device that allows examiners to read from them without changing the contents.

Step 2
Software, such as Guidance's EnCase, creates a forensic image of the hard drive--which Spruill compares to a "digital evidence bag."

Step 3
The forensics software analyzes the image, uncovering hidden and deleted files as well as partially deleted "file remnants," and displays them in a hierarchical format.
Results
Photos, Microsoft Office documents, e-mails and MP3 files can hide incriminating meta-data, and the Internet cache stores records of a suspect's Web travels that can be recovered even after they are deleted.


"We knew that time was ticking and we couldn't sleep until we found her," Holtz says. She turned to FBI forensic examiner Tony Pallone, one of the bureau's computer specialists, and asked him to drop all other projects until he found something in the machine that could lead them to the missing girl.

Pallone made a forensic image of Cindy's computer hard drive and settled in for a long night. He then ran a program that analyzed the image--yielding thousands upon thousands of numbers and letters scrambled together, amounting to little more than gibberish to the untrained eye.

From Cindy's personal Web page, Pallone knew she called herself "goddessofall" and listed among her interests witchcraft, hypnosis and mythology, so he searched the data for snippets of those words hoping to discover other clues amid the jumble of characters. He found some troubling information: "File residue" logs showing the computer's recent activities revealed that Cindy visited chat rooms dedicated to sadomasochism. Potentially worse, Pallone deduced from the gibberish that she chatted frequently with someone going by the ominous screen name of "dcsadist." Pallone searched the Internet for references to anyone using that name but nothing surfaced.

By the evening of Jan. 3, Cindy's parents began to lose hope that she would be found alive. "You know the statistics," the girl's mother later told Newark, N.J.'s Star-Ledger. "It's a one-in-a-million shot to see your child again."

PALLONE is an examiner in the Pittsburgh FBI office's computer forensics lab. The operation is a small-scale version of the FBI's 10 multiagency Regional Computer Forensics Laboratories (RCFLs); two more are slated to open this year. The FBI provides the RCFL startup costs--about $3 million per lab--and state and local agencies contribute staffers certified in computer forensics. As cases come in, examiners pitch in on those with the highest priority, regardless of which agency owns jurisdiction.

All told, 200-plus examiners at RCFLs and other FBI teams across the country analyzed more than 1400 terabytes of data in 2005--equal to a stack of paper 47,000 miles high. This new breed of gumshoe, trained to study bytes the way old-school G-men studied fingerprints, snares a predictable cast of hackers and insider traders but also a surprising number of violent criminals.

Computer forensics is not only crucial to law enforcement, it is critical to the business world, where digital evidence-gathering tools are used for everything from fraud investigations to employee monitoring. And government computer investigators buy much of their software from the same commercial vendors that supply big business. The dominant player in the field is Pasadena, Calif.-based Guidance Software, makers of EnCase, a widely used suite of programs that can dig deep into the memory of everything from computer hard drives to MP3 players. The next generation should even be able to search cellphones. Through its consulting arm, the company also trains more than 3500 law enforcement officers each year.

"A computer is no different than a tape recorder--it records everything you do," says Andy Spruill, who oversees the consulting division and works as a lead investigator with the Westminster, Calif., police department's computer forensics unit. "Right now [computer forensics] is still a specialty, with few people having the skills and resources to do it," he says. "Think about where DNA was 10 years ago. Most cops didn't even know about it. Now most patrol officers carry DNA swabs. That is where [computer forensics] is going to go, to the patrol level."

"It is unusual today to have a case that doesn't involve computers," explains Mary Beth Buchanan, U.S. attorney for the Western District of Pennsylvania. She adds that computers are not just a source of evidence, but a source of better evidence. "Through the use of computers, people store information they might not otherwise. They might not even know it is being stored," Buchanan says. "The value [of the evidence] is also greater because that information is stored in an organized manner and the computer leaves footprints of an individual's every action."

In 2003 Kansas State University English professor Thomas Murray's computer turned into a witness against him. For more than a year, local police suspected Murray in his ex-wife's stabbing death, but it was not until examiners in the Kansas City, Mo., RCFL searched his office computer that they found damning evidence. In the months before his wife's death, Murray had used such Internet search terms as "how to kill someone quietly and quickly" and "murder for hire." A jury rejected Murray's defense that he was researching script ideas for a television show such as CSI and sentenced him to life in prison.

The new breed of gumshoe is trained to study bytes the way old-school G-men studied fingerprints.


Digital evidence helped the FBI find Dennis Rader, aka the BTK killer (left), and Scott William Tyree (right). (Photographs by AP/World Wide Photo [Rader], Matt Freed [Tyree])

The most famous case cracked using the skills of computer forensics investigators is last year's capture of the serial killer known as BTK, short for "Bind, Torture and Kill."

Responsible for 10 murders around Wichita, Kan., between 1974 and 1991, BTK taunted police with letters that boasted of his deeds but yielded few clues to his identity. He resurfaced in 2004 with a letter to a local newspaper hinting that he might be plotting more murders.

In February 2005, Wichita television station KSAS received a translucent, purple floppy disk accompanied by a 3 x 5 index card with a message from BTK: "Any Communications will have a # assigned from now on, encase [sic] one is lost or not found."

The BTK task force enlisted the expertise of Randy Stone, a 39-year-old Desert Storm vet who started in the Wichita police department's Forensic Computer Crime Unit in 1998. When Stone checked the disk, it contained only one file, named "Test A.rtf." The text of the file instructed investigators to read the index card. No clues there.

Stone checked the disk properties to see the previous user: someone named Dennis. Then he checked to see where the disk was last used: Wichita's Christ Lutheran Church. On the church Web site's list of officers, there was one Dennis, a man named Dennis Rader.

The police used DNA evidence to link Rader to the crime scenes and in August 2005 he was given 10 consecutive life sentences. After more than 31 years and 100,000 man-hours, Stone's digital detective work cracked the BTK case within 15 minutes of receiving the disk.

"On a scale of one to 10, it was about a three in terms of computer forensics," Stone says. "As simple as that was, the sad thing is 95 percent of law enforcement in the U.S. could not have done something like that."

Late on Jan. 3, 2002, as Pallone toiled away in his lab, investigators looking for Cindy finally caught a break. An anonymous Tampa man contacted the FBI and said he might know something about the girl he'd seen in a missing child photo on the Pittsburgh Post-Gazette Web site. The tipster said he met a man in a bondage group online claiming to have captured a teenager. "I think I got one," the man wrote the tipster in a message, showing video of a girl chained to a wall, crying. The tipster thought the man lived in northern Virginia and used the screen name "master for teen slave girls."

Pallone's co-worker, Tim Huff, arrived at the office around 8 am, just as the tipster gave up the screen name. Of his six years as a field agent, Huff has spent five working in computer forensics. "I like putting bad guys in jail, that's why I got into the bureau," Huff says. "I got into computer forensics because I like solving puzzles."

Four others in the lab were pulled onto the case to join Pallone in searching chat groups and elsewhere around the Web for anyone using that screen name. Even with the new information, they were still searching 90 minutes later.

Maybe, Huff thought, the name was not "master for teen slave girls," as the original agent wrote it down, but some derivative using Web shorthand. Team members began to search for variations on the name and, within minutes, one of the examiners found a Yahoo Chat profile for a suspect using the handle "master4teen_slavegirls." In his profile, the man listed other online aliases, including "dcsadist."

It was a huge breakthrough--they quickly matched the information from the girl's computer with the tipster's information, making it a near certainty this was the guy holding Cindy. But the profile didn't say where he lived.

Holtz tried to contact Yahoo to get the Internet protocol (IP) address of the profile, but it was 6:30 am at the Yahoo corporate offices on the West Coast and she couldn't get anyone on the phone. Eventually, an agent in Sacramento, Calif., was reached, who called a contact at Yahoo. Minutes later, Holtz faxed a letter to Yahoo asking for the IP address, citing Section 212 of the Patriot Act.

Prior to the Patriot Act, which was passed in October 2001, many corporations required search warrants or subpoenas before granting government requests for customer information, mainly to shield themselves from lawsuits. But Section 212 releases companies from civil liability in cases where someone is at risk of "immediate danger of death or serious physical injury." This case was one of the first times the provision was used.


Cyber sleuths: FBI computer forensic examiners Tim Huff (left) and Tony Pallone unlock the secrets inside hundreds of computers each year. (Photograph by Brian Berman)

Around 11 am, Yahoo faxed the Pittsburgh lab the IP address. A quick search identified Verizon as the service provider. Thirty minutes later, Verizon told Holtz the name and address of the customer registered to the account, a 38-year-old Herndon, Va., man named Scott William Tyree.

With Tyree's address confirmed, Holtz contacted the Washington, D.C., field office, which dispatched a team of agents to Tyree's home. Cindy had been missing for almost three days; now Holtz, Huff and the rest of the Pittsburgh office could only wait nervously for word of her fate.

At Tyree's suburban townhouse, agents burst through the front door with guns drawn. The house appeared to be empty until they found Cindy in an upstairs bedroom, collared and chained to a bolt in the floor. The chain was just long enough to allow her to go to the bathroom. Tyree, it turned out, had reported to work at a nearby office of Computer Associates, but not before warning Cindy that he would hurt her if she tried to escape.

By 3:30 pm, the investigators at the Pittsburgh RCFL received word: Cindy was safe. Holtz, a six-year veteran of the bureau, didn't try to hold back her tears. Still sniffling, she walked to a nearby conference room to give Cindy's family the good news.

Tyree was picked up less than an hour later at his office. He had no criminal record and exhibited few previous signs of being a sexual predator. He was twice divorced and maintained a good relationship with his only child, a 12-year-old girl who lived with her mother in California. Tyree's daughter had reportedly stayed with him for most of December during school break, returning home on New Year's Day--the same day Cindy disappeared.

In subsequent interviews, investigators determined Cindy was like many teenagers who get involved in dangerous role-playing on the Web and draw the attention of predators like Tyree. On New Year's Day, she sneaked out of the house and met Tyree a few blocks away. By the time Cindy realized the true intentions of her captor, it was too late to escape. She now speaks to student groups about the dangers of the Internet.

Buchanan, the lead prosecutor, says further evidence obtained from Tyree's computer by Huff and his staff was instrumental in building her case and forcing Tyree to plead guilty. In March 2003, he was sentenced to nearly 20 years in federal prison.

More than three years later, Huff says it remains one of his most rewarding cases. "There is very little that I have experienced that makes you feel as good as knowing you made a child safe," he says.

 

No comments:

Post a Comment