Apple Computer Forensics
Apple computers are more widely used today than a few years ago. Special attention needs to be given to the interpretation of their artifacts.
Macs have more dates associated with files than PC’s. One example is that all files have sequential ID’s which are assigned as they come to exist on the computer. This is extremely useful in determining if dates have been altered. Plists and SpotLight files also contain a wealth of potential evidentiary information.
We selected a few artifacts of interest that seem to come up time and time again to establish what might have happened on a device.
** Disclaimer: all explanation below is for informational purposes only. Only careful and thorough examination of the evidence through correlation of all relevant artifacts by a skilled forensic examiner can establish what might have occurred on a device.
DAtes
Often overlooked by examiners, Apple computers have additional dates that PC's don't have and they behave differently from their PC counterparts. Let’s start with the very helpful “Date Added”. When a file is placed on an Apple computer, or when a file is placed into a different folder, the date added for that file will be the date of placement. When transferring files from one Mac computer to another, the “Date Created” will remain the original creation date. “Date Accessed” is changeable by many things (such as quick view or coverflow), so care must be taken when examining this date. “Date Last Opened” is only available on a live machine. There is also an “Attribute Modification Date” available to the examiner.
**As a side note: a TimeMachine restore to a new computer will have its own pattern of dates and times.
Catalogue ID
If all those dates still didn’t shed light when a file of interest got on the computer, the Catalogue ID number is going to be helpful. Each file whether it is generated by the operating system or is a user-created file – no matter how small - is given a sequential number by the operating system as they arrive on the Mac.
Plists
Plist files (preference files) contain a wealth of information for the forensic examiner that can help in establishing computer and user configurations, applications, among others. They reside all over the computer and the examiner can drill down to the exact plist to answer a specific question.
Spotlight
Spotlight was designed with user experience in mind for quick searches whether the user is after an application, email, or a file. It is gold for the forensic examiner, as Spotlight will index everything in its path and leave artifacts behind even after files have been securely deleted. The user can override the default settings and exclude selected folders.
iNode hard links
Without going into a very technical discussion about soft links vs. hard links, the presence of these iNodes on a Mac most likely will be indication of a TimeMachine Backup.
System log files
As the name suggests, these files keep track of system changes. They can be helpful in determining system changes, therefore establish system-wide information, such as installations, time changes, statistics, error messages, and crash reports.
FSEvents
FSEvents are valuable to a forensic examination as it contains historic information about changes on the computer. They are archived from time to time by the operating system, therefore the archived logs will stay unchanged indefinitely.