I am happy to announce that a new digital corpora has been posted to the scenarios collection of digitalcorpora.org.
SIX YEARS IN THE MAKING!
The scenario is the 2012 National Gallery DC scenario. Working in collaboration with Joseph Greenfield at USC, we have now completed the collection, annotation, and preparation of teacher guides. This has been a massive project and all of the data are now available for public consumption.
The 2012 National Gallery DC scenario spans approximately 10 days and encompasses two distinct yet intertwined story arcs. The scenario is centered around an employee at the National Gallery DC Art Gallery. Criminal plans for both theft and defacement are discussed amongst actors during the scenario, and evidence may remain across the digital devices they used. The scenario is terminated upon suspicious activity being reported to law enforcement at which point certain devices are seized and network traffic logs are requested. (A wiretap had been previously ordered, so there are some full content traces available.)
The scenario includes several believable characters:
Tracy is a recently divorced mother in the middle of a child custody battle. Unfortunately, Tracyâ€™s daughter is in an expensive private school, which Tracy can no longer afford on her salary. Her ex-husband will only pay for the school if Tracy will give over custody of their daughter to him. Worse, Tracyâ€™s daughter, Terry, age 15, has stated that she would rather live with her dad if it comes to staying in school. â€œAfter all, you ran Dad off in the first place.â€
Pat is Tracyâ€™s brother. He is a police officer of the D.C. Enforcers Bureau. He holds the status of detective. He is very devoted to his sister and niece Terry, to this point he isnâ€™t an outright criminal, but walks the line very closely. He busted King with some items that were against his parole, but hasnâ€™t arrested him on the promise of a future â€œfavor.â€
Joe is the father of Terry and is currently going through the divorce with Tracy. Joe is financially well-off, and still bitter about the relationship problems. He previously installed a key logger on the MacBook Air in an attempt to keep track of Terryâ€™s online behavior. Now that Joe and Tracy are going through a divorce, he has motivation to utilize the key logger to spy on both Tracy and Terry. Joe used to have an account on the family MacBook Air however it was deleted. The home folder may have been preserved.
Alex is a Krasnovian supporter who wishes to embarrass the United States. He is a foreigner and lives outside the country presumably in a region called Krasnovia. He knows Carry through extended family connections and contacts her as both having similar family ties and a fellow Krasnovian. He plans to deface foreign works that are on exhibit in the National Gallery DC. Defacing said artwork will embarrass the United States and possibly degrade the reputation between the United States and the foreign country providing the foreign exhibit to America. (In some documentation this is referred to as â€˜Majaviaâ€™, a second pseudo-nation)
Carry is a somewhat criminally involved individual that shares family ties with Alex. She is a Krasnovian supporter. Carry is both technologically savvy and an occasional social media user. She is contacted by Alex in the beginning of the scenario and asked to orchestrate the defacing of the artwork because she is both aligned with Krasnovia and because she has â€˜Connectionsâ€™. She has a slight familiarity as friends/acquaintances with Tracy.
Terry is the daughter of Tracy and Joe. Terry attends an expensive private school. (Prufrock Preparatory School). She wants to stay in school to avoid having to start over and so that she can keep her current friends, despite the fact that her mother can no longer afford to pay the tuition.
The root download directory is here: http://downloads.digitalcorpora.org/corpora/scenarios/2012-ngdc/
The evidence in the scenario includes the following:
- Stored Data
- Carry’s phone on 2012-07-15 [ZIP] [FTK Logical Dump]
- Carry’s tablet on 2012-07-16 [E01] [TAR]
- Email messages generated by the spyware installed on Tracy’s Macbook Air and that were periodically emailed to Joe [ZIP]
- Tracy’s phone on 2012-07-15 (encase) [L01] [ZIP]
- Tracy’s phone on 2012-07-15 (other extraction tools) [EO1] [tar]
- Tracy’s external hard drive [E01]
- Tracy’s home computer [E01] [E02]
- Exterior Network Packet Dumps
- Interior Network Packet Dumps
In addition to these final images, we also have day-by-day images of the two phones, the tablet, and the external hard drive. These day-by-day images are for *digital forensics research* and are not needed for scenario analysis.
Images of the phones and tablets were performed using a variety of techniques, including logging in to the devices and doing a ‘tar’ as well as using commercial digital forensics tools.
It’s true that this dataset is six years old! Please accept our apologies: it took a long time to clear all of this information. The advantage is that there should be good support for all of the file formats on these media, in both commercial and open source tools.
You can download the scenario and the teachers guides from:
The teacher guides are encrypted with the same passphrase that is used to encrypt all of the digitalcorpora.org teacher’s guides. If you do not have it, you can request it using the website’s contact form.
Finally, as a reminder: these are all fictional people and institutions. There is no National Gallery DC, there is no country of Krasnovia, and there is no D.C. Enforcers Bureau. Any similarity to actual people or organizations is entirely coincidental.