Gap Analysis Report
Gap Analysis Report
FOR
FOR
i
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Executive Summary
The investigation of cyber attacks requires specialized tools, techniques, and training.
This document provides an analysis of the gaps that exist between the needs of cyber
attack investigators and the tools that are currently available in the marketplace. The
second of three sequential studies, Law Enforcement Tools and Technologies for
Investigating Cyber Attacks: Gap Analysis Report provides an overview of critical areas
where scientific research may be initiated to address the needs outlined in the Institute for
Security Technology Studies report Law Enforcement Tools and Technologies for
Investigating Cyber Attacks: A National Needs Assessment. The final report in this series,
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National
Research and Development Agenda, provides analysis of all three studies and a
prioritized list of law enforcement needs that may be addressed by research and
development. The three reports in this series provide law enforcement, researchers, and
funding agencies with a body of current information regarding the unique challenges
encountered by cyber attack investigators and priority needs requiring research.
The findings of the Law Enforcement Tools and Technologies for Investigating Cyber
Attacks: Gap Analysis Report are as follows:
• All of the needs discovered in the National Needs Assessment (Appendix A)
are important to the investigation of cyber attacks. Participants in the
Prioritization Working Group agreed that providing solutions to any of the
needs detailed in the National Needs Assessment would have a significant
positive effect on the cyber attack investigative community.
• The needs of cyber attack investigators have not been met by the available
technology solutions. Additionally, over the year since the National Needs
Assessment was conducted, the tool development marketplace has not
addressed the impediments facing cyber attack investigators.
• Most tools that we discovered are already employed in investigations in the
community as a whole. Investigators and prosecutors who are using the
technology solutions presented in this research (Appendix B) are using most,
if not all, of the solutions that are commonly available.
• The specific needs of the cyber attack investigative community will continue
to evolve as the types of cyber attacks change over time and new solutions are
developed. This study, the Gap Analysis Report, provides a snapshot in time
of investigators’ needs and the technologies available for their use. The cyber
attack investigative community may benefit from additional studies over time
to capture their evolving needs.
• The members of the Prioritization Working Group reached a consensus that
eighteen distinct needs (Appendix D) were the most critical needs requiring
additional research and development.
ii
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
The Research and Development Agenda, to be published by ISTS in 2004, presents these
critical needs, with background information, analysis and recommendations for further
research and development. The challenge now lies with funding agencies, research
organizations, academia and the private sector to address law enforcement’s problems by
contributing high-value, high-return research in this critical area.
iii
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Contents
INTRODUCTION ................................................................................................................... 1
CONCLUSION .................................................................................................................... 11
APPENDICES ...................................................................................................................... 12
iv
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Introduction
Filling a need for research to identify and prioritize law enforcement needs, the Institute
for Security Technology Studies (ISTS) conducted three national studies concerning
cyber attack investigations.1 This paper, Law Enforcement Tools and Technologies for
Investigating Cyber Attacks: Gap Analysis Report, is the second report in this three-part,
multi-year research effort. The first study, Law Enforcement Tools and Technologies for
Investigating Cyber Attacks: A National Needs Assessment is the result of a
comprehensive examination of the technological impediments law enforcement
encounters during cyber attack investigations.2 The ultimate goal, realized in the third and
final report Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A
National Research and Development Agenda, is a guidebook for developing technologies
for cyber attack investigators.
1
This study uses the term cyber attack to refer to computer attacks that can undermine the confidentiality,
integrity, or availability of a computer or information resident on it. Cyber attacks can be much more
than simply website defacements. They may also be overt or covert attacks on our critical infrastructure
systems. Further, cyber attacks may be perpetrated by organized crime, generally for financial gain, or
possibly by hostile nations, as a form of asymmetric warfare.
2
Available from the ISTS web site <http://www.ists.dartmouth.edu/TAG/lena.htm>.
Page 1
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
What gaps exist, if any, between the needs discovered in the National Needs
Assessment and tools and technologies generally available to law
enforcement?
ISTS researchers developed the Gap Analysis Matrix for this study to better understand
the areas where additional research and development may be required. The Gap Analysis
Matrix is a graphical representation of the needs gleaned from the National Needs
Assessment mapped against the corresponding technology solutions that purport to
address those needs. The Gap Analysis Matrix is the primary deliverable of the Gap
Analysis Report and is included as Appendix B.
A workshop of cyber attack investigators was held near the completion of the research for
the Gap Analysis Report to determine which needs were still research and development
priorities, in light of the collected solutions. Preliminary results of validated and
prioritized needs are presented in Appendix C – Gap Analysis Prioritization Working
Group Data and Analysis.
Page 2
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Finally, this document presents conclusions derived from the Gap Analysis Report.
Page 3
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
The creation of the National Needs Assessment document followed a five stage process:
Stage 1. Literature Review and Survey Development – During the formative stage of the
study, ISTS researchers conducted a literature review to identify relevant studies and
reports and we found no other similar current research. ISTS staff and an independent
statistician designed the survey mechanism in close consultation with experienced current
and former cyber-attack investigators. The RAND Survey Research Group reviewed,
edited and pilot-tested the survey with cyber attack investigators across the country
Stage 2. National Survey – Primary data was collected through a web-based survey of
federal, state and local law enforcement, conducted under ISTS auspices by RAND over
four months. Out of the 311 individuals validated to participate in the survey, 151
investigators completed the survey; a response rate of 48.5%. On average, respondents
investigated 15 cyber-attack cases in the last three years. A majority of the population
had one to four years of cyber-attack investigative experience. An additional 25% had
five or more years of experience, while 23% had less than one year of experience. On
average, 50% of respondents indicated they were in a supervisory role. Almost all survey
participants (93%) received training for cyber-attack investigations.
Stage 3. Law Enforcement Interviews – ISTS researchers visited twelve law enforcement
agencies in seven states and the District of Columbia to conduct in-depth interviews with
cyber-attack investigators. One additional set of interviews was conducted via telephone.
In total, ISTS staff interviewed thirty-nine investigators and prosecutors during this stage
of the study.
Stage 4. Workshop – During a two-day workshop, ISTS and RAND presented the data
collected from the survey to a select group of twenty-three present and former cyber-
attack investigators and prosecutors for validation, and to collect further data for analysis
and prioritization.
Stage 5. Final Report Production – ISTS staff created the final report by synthesizing and
analyzing the data collected in Stages 2 through 4. A draft copy of the report was made
available to a broad array of law enforcement and industry cyber-attack experts for
review and comment. We reviewed and integrated the feedback into the final version of
the study.
Page 4
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
ISTS published the final report in June of 2002, and disseminated it widely through both
hardcopy and downloadable versions. The findings resulting from the National Needs
Assessment showed that the unique needs of law enforcement cyber attack investigators
could be represented through seven categories relating to either the stage of an
investigation or a special requirement:
1. Preliminary Investigation and Data Collection
2. Log Analysis
3. IP Tracing and Real-time Interception
4. Emerging Technologies
5. National Data and Information Sharing
6. Law-enforcement-specific Development Issues
7. Training
The National Needs Assessment showed disparities between the technology solutions
used by law enforcement and their expressed requirements. Law enforcement officials
surveyed clearly indicated that they do not have adequate solutions to the technological
problems encountered during cyber attack cases. ISTS researchers viewed these
conclusions as the perception of the study participants until an objective analysis of
existing tools and technologies was conducted.
3
For the Gap Analysis Report, only the first five Categories from the National Needs Assessment were
used. It was determined that the information relating to Law-Enforcement-Specific Development Issues
and Training was primarily focused on future tool development issues and proper training and that these
focus areas were not appropriate for the Gap Analysis Report’s goal of examining how existing
technology solutions could be used to solve investigators’ existing and future needs. No attempt was
made during the Gap Analysis Report to diverge from or expand on the foundation of the National
Needs Assessment.
Page 5
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
ISTS researchers then convened a working group of leaders in the field of cyber attack
investigations to examine the collective data from the National Needs Assessment and the
Gap Analysis Report. The group was asked to determine which needs from the National
Needs Assessment were not satisfied by existing solutions and still required research and
development. The participants then prioritized the unsatisfied needs to begin framing the
Research and Development Agenda.
Data for the this study was collected from federal, state, and local law enforcement
organizations in the United States, sponsored research entities, academia, and the private
sector. The research and tool collection targeted supervisory and operational law
enforcement practitioners in investigative, forensic, prosecutorial, and training capacities,
and tool developers in the commercial, government, academic and open source
communities.
Page 6
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
ISTS researchers compiled a list of thirty-nine leaders in the field of cyber attack
investigations and made personal contact with twenty of these experts. The list included a
cross section of those involved with cyber attack investigations and tool development
from government, academia and the private sector. Collectively they expressed no
knowledge of ongoing research similar to the ISTS Gap Analysis Report. The experts
also provided suggestions regarding specific tools and technologies, additional contacts,
and other sources of information on computer investigations and forensic analysis. As a
result of the literature review, it was determined that no other ongoing research similar to
the Gap Analysis Report was either completed or in progress.
4
Additional information available online at
<http://www.interpol.int/Public/TechnologyCrime/WorkingParties/Default.asp#europa>.
5
<http://www.ists.dartmouth.edu/TAG/subtool/register.htm>.
Page 7
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
The research effort collected over 200 unique tools. ISTS researchers compiled the
collected solutions into a matrix, the Gap Analysis Matrix (Appendix B), that cross-
references existing tools and their specific features with the forty-four needs discovered
in the National Needs Assessment. We included, where possible, tools and technologies
under development or not yet in widespread use. Many of the tools examined did not
have a role in a cyber attack investigation, and therefore did not address any of the needs
from the National Needs Assessment; these tools were not included on the Gap Analysis
Matrix.
6
Additional information on the ECPI can be found by contacting Cyber Science Laboratory, Fred Demma,
26 Electronic Parkway, Rome, New York 13441; 888.338.0584; <http://www.cybersciencelab.com>.
Page 8
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
For each of the five categories, we posed three questions regarding each of the needs to
the participants to elicit their comments:
1. Are you aware of any additional solutions that meet the needs described in
this category? If yes, enter the name of the solution(s).
2. What needs in this category do you feel are not met by the available
solution(s)? Please add your justification for each need.
After comments were entered for the second question, we asked participants to mark
those needs that should be moved forward for additional consideration. Specifically they
were asked:
3. Which needs in this category require further research and development?
Each participant was allowed to mark as few or as many needs as they saw appropriate.
Following the fifth and final category, all of the needs that had received at least one vote
in the polling for question three were combined for final ranking and prioritization. While
the participants were initially asked to evaluate the needs based on whether each required
additional research and development—considering the existing tools and the quickly
changing field—they now needed to consider which of the presented needs were more
critical than others.
7
GroupSystems software was used during the working group <http://www.groupsystems.com/>
Page 9
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
The complete discussion and analysis of each of the five technology-related categories,
including materials from the National Needs Assessment, Gap Analysis Matrix and the
Prioritization Working Group is presented in Appendix C – Gap Analysis Prioritization
Working Group Data and Analysis. Each section within the appendix reviews the origin
of the category in the National Needs Assessment, explores the mapping of each
category’s needs versus tools in the Gap Analysis Matrix, and discusses the comments
resulting from the Prioritization Working Group.
Page 10
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Conclusion
Throughout the course of the research for the Gap Analysis Report, several important
conclusions became apparent:
• All of the needs discovered in the National Needs Assessment (Appendix A)
are important to the investigation of cyber attacks. Participants in the
Prioritization Working Group agreed that providing solutions to any of the
needs detailed in the National Needs Assessment would have a significant
positive effect on the cyber attack investigative community.
• The needs of cyber attack investigators have not been met by the available
technology solutions. Additionally, over the year since the National Needs
Assessment was conducted, the tool development marketplace has not
addressed the impediments facing cyber attack investigators.
• Most of the tools that we discovered are already employed in investigations in
the community as a whole. Investigators and prosecutors who are using the
technology solutions presented in this research (Appendix B) are using most,
if not all of the solutions that are commonly available.
• The specific needs of the cyber attack investigative community will continue
to evolve as the types of cyber attacks change over time and new solutions are
developed. This study, the Gap Analysis Report, provides a snapshot in time
of investigators’ needs and the technologies available for their use. The cyber
attack investigative community may benefit from additional studies over time
to capture their evolving needs.
• The members of the Prioritization Working Group reached a consensus that
eighteen distinct needs (Appendix D) were the most critical needs requiring
additional research and development.
The Research and Development Agenda presents these critical needs, with background
information, analysis and recommendations for further research and development. The
challenge now lies with funding agencies, research organizations, academia and the
private sector to address law enforcement’s problems by contributing high-value, high-
return research in this critical area. It is imperative that law enforcement at all levels is
empowered by technology in the investigation and prosecution of cyber attacks.
Page 11
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendices
Page 12
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
2. Log Analysis
2.1. Searches a network for logs.
2.2. Recognizes and collects logs regardless of platform.
Appendix A Page 1
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
4. Emerging Technologies
4.1. Increases law enforcement’s ability to circumvent the obstacle of encrypted
data.
4.2. Flags digital files that may contain steganographic messages.
4.3. Provides magnetic microscopy technology for law enforcement applications.
4.4. A solution(s) to securely store very large data sets that addresses data
degradation and financial concerns of the law enforcement community.
Appendix A Page 2
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix A Page 3
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
The Gap Analysis Matrix is spread across seven pages, broken down by the categories
derived from the general stage of an investigation, detailed in the National Needs
Assessment. Appendix B Pages 2 and 3 show the tools that address Category 1 –
Preliminary Investigation and Data Collection. Category 2, Log Analysis, is spread across
Appendix B Pages 4 through 7. Appendix B Pages 6 and 7 also show Categories 3 and 4,
IP Tracing and Real Time Interception and Emerging Technologies Requiring Research
and Development, respectively. Lastly, Appendix B Page 8 contains the tools and needs
for Category 5, National Data and Information Sharing.
The Gap Analysis Matrix is organized with the needs shown across the columns and the
tools that address those needs are shown in rows. If a tool that was examined had no
relevance to any needs on a section of the Gap Analysis Matrix, the tool was not listed.
Each distinct need distilled from the National Needs Assessment is shown in the column
headings with its corresponding need number. The need number is consistent throughout
this document and the integer refers to the category in which the need resides. For each
need in a column, bold “X” marks have been placed in the rows of the tools which
purport to address the particular need. The marks have been placed according to the
claims of the manufacturer, per their product literature, website, or claims made on the
ISTS Submit a Tool website.
To use the Gap Analysis Matrix, find the need that interests you and follow the column
down to view the tools that purport to address the stated need. The Gap Analysis Matrix
is color-coded as a general guide, with red indicating that very few to no tools (six or
less) are mapped against a need and green indicating that there are many tools to address
a need (more than twelve). Yellow is given to those needs that have a several tools
mapped (between six and twelve tools).
Appendix B Page 1
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 2
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 3
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 4
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 5
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 6
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 7
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 8
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Two tools are presented below that were submitted after the Gap Analysis Matrix was
finalized for printing for the Prioritization Working Group session. Please note that
Prioritization Working Group participants were made aware of the existence of these two
tools:
• The first tool, InfiniStream Security Forensics produced by Network
Associates, Inc., has a number of features to address the needs numbered; 1.1,
1.6, 1.7, 1.12, 1.13, 1.15, 2.6, 2.8, 2.10, 2.13, 2.14, 3.1, 3.3, 4.4, 5.4 and 5.7.
• The second is a suite of system utilities from Sysinternal. The suite purports to
address the needs numbered; 1.2, 1.3, 1.4, 1.6 and 2.4.
Appendix B Page 9
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix B Page 10
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
1.14 FTKIV
I
Operating systems commands were not included in the Gap Analysis Matrix because they cover an
increasingly wide and varied functional ability. Although they may be useful in an investigation, they
are not intended to be used as forensic tools.
II
The discovery and/or mapping of a wireless network was not a focus of the tool collection efforts.
III
Many investigators mentioned tools from the hacking/cracking realm. While potentially useful in
discovering network information, the use of un-vetted attack tools for evidentiary forensics is clearly
problematic. In the development of the Gap Analysis Matrix, tools such as Nmap, Nessus, and other
attack-focused tools were intentionally omitted.
IV Denotes tools that were included on the Gap Analysis Matrix, but were not attributed to having features
that addressed the referenced need.
Appendix B Page 11
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
It was possible that additional tools, not represented on the Gap Analysis Matrix, would
be relevant to the participants’ decisions. We provided an opportunity for participants to
suggest additional solutions to ensure that the group had the best available information
upon which to base their conclusions.
Conversely, many needs did not show a product availability gap and had, in fact, multiple
tools marked in the Gap Analysis Matrix that purported to include applicable features. In
this case, we provided Prioritization Working Group participants the opportunity to
explain why they felt the need was not addressed and why it was still a research and
development priority.
The Preliminary Findings section details the results of the polling and examines any
trends or correlations that have come from the ISTS researcher’s analysis of the collected
data.
Appendix C Page 1
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
List of Needs
1.9. Graphically represents network
1.1. Automates the collection of
mapping results to better
data from multiple operating
understand the complex
systems to learn how a
relationships in the victim’s
network was compromised.
network.
1.10. Enables investigators to
1.2. Identifies system
independently discover the
configurations.
topology of the network.
1.11. Enables investigators to
1.3. Reports system
independently verify the
configurations.
topology of the network.
1.12. Alleviates investigator’s
1.4. Identifies file locations. dependence on in-house staff at
victim’s location.
1.13. Captures RAM data without
1.5. Reports file locations.
modification/alteration/addition.
1.6. Discovers a system’s role on a 1.14. Captures Swap file data without
network. modification/alteration/addition.
1.7. Reports a system’s role on a 1.15. Designed to process very large
network. data sets.
1.8. Detects settings and
recognizes hardware on a
network, including
information on the presence
and type of firewall(s),
router(s), and network
addresses.
Appendix C Page 2
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
As represented on the Gap Analysis Matrix (Appendix B) forty-eight tools and/or tool
suites were plotted against the Category 1 needs. Eight of the fifteen needs presented, 1.6
– 1.11 and 1.13 – 1.14, had less then four tools purporting to address the need. This lack
of tools was evident primarily in the network forensics area and included the
investigator’s desire to discover and report a system’s role on a network; detect settings
and recognize hardware on a network, including information on the presence and type of
firewall(s), router(s), and network addresses; graphically represent network mapping
results to better understand the complex relationships in the victim’s network, and the
ability for investigators to independently discover or verify the topology of the network.
Two of those eight needs, 1.13 Captures RAM data without modification/ alteration/
addition and 1.14 Capture swap file data without modification/ alteration/ addition, had in
fact one tool noted between them. Conversely, a majority of the listed tools purported to
address numbers 1.1-1.5, 1.12 and 1.15.
Participants discussed their need for a tool to deal with peer-2-peer networks. Kazaalite
was suggested as a potential solution. One participant noted “The Air Force Computer
Incident Response Team (AFCERT) has a software program that is used for identifying
intrusions into their networks. According to [AFCERT], their backend can import logs
from a variety of logs and vendors, and might be usable—or could be modified—to
analyze logs from a variety of sources.”
The participants did not appear satisfied that the existing tools adequately addressed their
specific needs and concerns. Comments such as “Due to the cost of some of the tools we
tend to develop our own,” and “The data collection tools tend to collect everything
(known file hashes aside, for the moment). This results in huge data storage needs,
lengthy analysis and lots of wasted effort to find the smoking gun. There has to be a
better way!” showed some level of dissatisfaction with the current state of accessible
tools. The lack of tools with the ability to capture volatile information was echoed by a
participant who stated “Most of the tools listed gather historical information (after system
Appendix C Page 3
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
is shut down), not current state information which could disappear once the system is
turned off.”
Appendix C Page 4
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix C Page 5
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix C Page 6
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
The FTK tools indexing actually helps with large case management because searches are
nearly instant after the index is complete instead of a wait[ing] for the string search to be
accomplished using other tools.
FTK takes too long due to all the indexing up front....not efficient for large organizations
with large case loads.
I disagree. A lab set up properly, using FTK in a distributed system, can be quite
efficient. Run your indexing off-peak (overnight, etc.), then when you sit down to work
the case, everything is instantly available.
That is fine and dandy if you have a small case load. In our organization, indexing up
front on large storage devices (with a large case loads) can take too long, no matter how
you have your lab set up.
Obviously, the participants disagreed on the value of up-front indexing on large cases,
however, it should be noted that the ability for the tool to perform as advertised was not
questioned in this particular dialogue.
Preliminary Findings
As noted in the Gap Analysis Prioritization Working Group section on page 8, the
participants were asked to mark the needs that they felt were still a research and
development priority. The results from the poll for Category 1, Preliminary Investigation
and Data Collection, are presented in Table 3 below. All of the fifteen needs presented in
this category received at least three votes from the twenty-two participants. This indicates
that at least a minority of the group felt that all of the needs in this category required
additional research and development.
Two needs received more than 50% of the participants votes: “1.8 Detects settings and
recognizes hardware on a network, including information on the presence and type of
firewall(s), router(s), and network addresses” and “1.10 Enables investigators to
independently discover the topology of the network.” On the Gap Analysis Matrix, need
numbered 1.8 showed four software solutions that purported to have applicable features.
Appendix C Page 7
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
These software packages are White Glove, EagleCheck, Encase V4, and Anasil.
Additionally, Prioritization Working Group participants noted that ILook and Nmap may
also function in this capacity.
Need numbered 1.10 generated several comments during the Prioritization Working
Group, including a number of comments to suggest additional relevant software. The Gap
Analysis Matrix listed Anasil as the only tool to contain features that address this need.
The participants added Nessus, Nmap, Airopeek, Wildpacket, Wellenreiter, Languard and
a suite of tools produced by Foundstone to the list of applicable solutions. The addition of
these tools to the discussion appeared to prove inconsequential as twelve of the
participants felt that enabling investigators to independently discover the topology of the
network was still a research and development priority. No justification was given by the
participants as to why the existing solutions were not sufficient to address the needs
numbered 1.8 and 1.10.
Number of
Need
Votes
1.8 Detects settings and recognizes hardware on a network,
including information on the presence and type of 12
firewall(s), router(s), and network addresses.
1.10 Enables investigators to independently discover the
12
topology of the network.
1.1 Automates the collection of data from multiple operating
10
systems to learn how a network was compromised.
1.6 Discovers a system’s role on a network. 10
1.11 Enables investigators to independently verify the topology
10
of the network.
1.13 Captures RAM data without
10
modification/alteration/addition.
1.7 Reports a system’s role on a network. 9
1.9 Graphically represents network mapping results to better
understand the complex relationships in the victim’s 8
network.
1.12 Alleviates investigator’s dependence on in-house staff at
8
victim’s location.
Appendix C Page 8
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
List of Needs
2.8. Organizes data into a
2.1. Searches a network for logs.
graphical timeline.
2.2. Recognizes and collects logs 2.9. Provides consistent timeline
regardless of platform. and reports / graphs
discrepancies in time
correlations.
2.3. Recognizes and collects logs 2.10. Creates data sets optimized
regardless of format. for analysis, portability, and
interoperability.
2.4. Prepares logs for export to
2.11. Contains easy-to-use search
different operating system or
functions.
analysis environment.
2.5. Searches for fragmentary 2.12. Contains analytic tools that
Appendix C Page 9
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Silent Runner was noted on the Gap Analysis Matrix, and one participant provided
clarification on its features in this area; “Silent Runner recognizes different logs,
however, it needs tweaking for certain types of logs before it can be used.”
Appendix C Page 10
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
2.6 Automatically captures the individual time and date settings from
compromised network computers.
Clarification and validation of this need was provided by one participant who wrote:
“Synchronizing time in logs is a real pain. What is really needed here is a tool for getting
independent verification of time.” Embedding time-stamps into HTML on webpages was
discussed; however, the ease in which time-stamps may be spoofed was brought up as a
possible flaw in the proposed idea. No new tools were discussed for this need.
2.7 Translates log files from multiple time zones to a common time
frame.
The participants saw this need as being integrally linked to, and equally important as,
capturing a time and date settings discussed in above in need numbered 2.6; “Time zone
is very important....especially on an e-mail case and proving a network intrusion.” If the
time stamps are valid, but no corrections are made for the time zone difference, then the
logs will not correlate correctly. As one participant noted, “This is critical functionality
since defense attorneys will definitely use non-matching times as a major attack on the
examiners’ conclusions.” No additional tools to address this need were suggested.
Appendix C Page 11
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
was not marked for this need on the Gap Analysis Matrix. Also discussed was the need
for analyzing the timeline of events that occur on IRC and other peer-2-peer networks.
Appendix C Page 12
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Preliminary Findings
The results from the polling of participants regarding which needs they felt were still a
research and development priority is found in Table 5. Three of the needs received more
than 50% of the participants votes: “2.13 Presents detailed technical information in a
graphical format,” “2.14 Serves as a tool for prosecutors to present complex cyber attack
data in the courtroom,” and “2.2 Recognizes and collects logs regardless of platform.”
The top two needs both address representing the complex data recovered during an
investigation either to the investigator or to non-technical persons, such as those that
would be present in a courtroom. The third, fourth and fifth needs are related to
recovering logs from a network. All of the needs received votes from at least seven
participants, or approximately 32% of the group.
The needs that received more than 50% of participants’ votes were fairly represented by solutions in
the Gap Analysis Matrix. Needs numbered 2.13, 2.14, and 2.15 all had more than eleven tools that
claimed to address their particular need.
Appendix C Page 13
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix C Page 14
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
List of Needs
3.1. Facilitates and coordinates cross-jurisdictional communications.
3.2. Provides added capability to trace and/or counter IP spoofing.
3.3. Provides added capability to detect IP spoofing.
3.4. Parses, isolates relevant material, and analyzes data captured in the
course of legally authorized data interception.
There were only a small number of solutions that claimed to address these needs. The
need numbered “3.4 Parses, isolates relevant material, and analyzes data captured in the
course of legally authorized data interception” had eleven solutions purporting to address
this need; the most in this category. Needs numbered 3.1 and 3.2 each had five solutions
mapped, while need 3.3 had only two solutions that claimed to address the need.
Technology solutions to contact associates such as telephones, pagers, and email are
often used by investigators. Listserves such as CFID, HTCIA, IACIS, and Digital-DA
were reported to “do amazing things now” and are “very useful for communicating with
folks in other jurisdictions who can help you.” Secure law enforcement-only web portals,
Appendix C Page 15
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
such as CyberCop and the newly revamped Cyberscience Lab website were also
suggested as great solutions for reaching across jurisdictional lines.
3.4 Parses, isolates relevant material, and analyzes data captured in the
course of legally authorized data interception.
Law enforcement investigators are often faced with copious amounts of data as a result of
a legally authorized electronic surveillance. The parsing, isolation of relevant material,
and analysis of this data can be a very time consuming task. Several tools to assist in
capturing data were suggested, including tcpdump, Silent Runner, windump and Ethereal.
One participant commented on working with the business sector in this type of
surveillance: “All major telecommunications switch vendors provide law enforcement
monitoring features which can identify, isolate, copy, and record transmissions from
target addresses in real-time.” However, this was noted by several participants as being
cost prohibitive in some cases.
Capturing and viewing only the data that is relevant to the search warrant is a definite
concern to law enforcement as discussed in the National Needs Assessment and further
validated by one participant who wrote “There is definitely a need for easy-to-use tools
that will capture and parse huge amounts of information and are proven to be able to
capture ONLY the data authorized to capture.”
Appendix C Page 16
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Preliminary Findings
All of these needs in this category were believed to require additional research and
development by more than 50% of the participants. In fact, two-thirds of the participants
felt that the needs numbered 3.3 and 3.4 required additional research and development as
seen in Table 7. As noted above in Discussion of Needs and Tools, this category was
under-represented by solutions, with at most eleven solutions purporting to have features
to address these particular needs and at the least, two solutions.
Appendix C Page 17
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
List of Needs
4.1. Increases law enforcement’s ability to circumvent the obstacle of
encrypted data.
4.2. Flags digital files that may contain steganographic messages.
4.3. Provides magnetic microscopy technology for law enforcement
applications.
4.4. A solution(s) to securely store very large data sets that addresses data
degradation and financial concerns of the law enforcement community.
All of the needs in this category had less than seven tools purporting to address their
requirements. One particular need, “4.3. Provides magnetic microscopy technology for
law enforcement applications,” had no tools mapped against it.
Another participant suggested that there may be a “legislative solution, at least with
domestic products. For example, a requirement that any encryption program provided in
Appendix C Page 18
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
the U.S. must have a registered back-door key, held in escrow and available to LE with
the right paper?” Other participants noted that this concept was discussed in the past and
it was not a viable option for a number of reasons, including imposing unfair restrictions
on products made in the US.
4.4 A solution(s) to securely store very large data sets that addresses
data degradation and financial concerns of the law enforcement
community.
Investigators are commonly faced with storing a growing library of case-related digital
data. Storing this data securely and in a way in which media and/or data degradation is
minimized adds to the cost. One of the participants commented on the situation facing
law enforcement investigators, “This is more a [funding] problem, than a technology
problem. Chasing the technology, for LE, is just expensive.” This type of problem is not
uncommon in this field, where the criminals have a monetary or personal incentive to
invest in technology; while investigators usually do not have an unlimited budget to
dedicate to keeping pace with the offenders.
Preliminary Findings
The participants were asked which of the needs were still research and development
priorities in light of the solutions presented on the Gap Analysis Matrix and in the
workshop discussions. An overwhelming 77% of the participants included a vote for need
“4.1 Increases law enforcement’s ability to circumvent the obstacle of encrypted data”
(Table 9). Although need 4.1 received the most participant votes, it had the most tools
Appendix C Page 19
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
noted on the matrix among the other needs in this category. This need appears to be a
continuing need of the investigative community and appears to be as controversial as it is
critical, based on the participant’s comments. A second need, “4.2 Flags digital files that
may contain steganographic messages,” received 50% of the participants’ votes and had a
corresponding four tools mapped on the Gap Analysis Matrix. Steganalysis software will
continue to grow and evolve in response to new steganographic algorithms and it does
not appear as if the greater problem will be solved in the immediate future.
Appendix C Page 20
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Five of the needs numbered 5.2 and 5.4-5.7, had less than four technology solutions
mapped on the Gap Analysis Matrix. One of these needs, “5.5 Applies pattern recognition
software to determine the origin and author of a virus or worm,” did not have a single
available technology solution mapped on the Gap Analysis Matrix. Needs numbered 5.1
and 5.3 were both addressed by seven listed tools on the Gap Analysis Matrix
List of Needs
5.1. Serves as a database for collecting attack profiles in concert with a
solution for performing technical exploit matching to enable law
enforcement to identify attack patterns.
5.2. Serves as a database for cyber attacks that allows law enforcement
agencies to quickly assess if their case is a component of larger criminal
activity.
5.3. Automates analysis of logs for the presence of a virus or worm signature,
specifically designed for cyber attack cases.
5.4. A resource to store and compare new virus code to existing examples.
5.5. Applies pattern recognition software to determine the origin and author
of a virus or worm.
5.6. Serves as a database of Trojans, root kits, and other attack tools that is
continually updated that provide investigators with relevant and timely
analysis capability.
5.7. Serves as a data warehouse of legacy software and hardware for agencies
responsible for cyber attack and cyber crime.
Appendix C Page 21
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
We need to identify one specific agency, location, etc. and give them the responsibility
for this. There is too much competition among the federal agencies who lobby for
jurisdiction, budgets, etc., and spend more time and effort on arguing with other agencies,
watching what other agencies are doing and telling on them for doing it than completing
the actual mission for which they are charged. In a nutshell, someone needs to make a
decision. There is too much redundancy.
It was noted by participants that the newly organized Department of Homeland Security
Information Analysis Infrastructure Protection Directorate has this need noted in their
mission; however, it is not expected for this particular area to be functional in the
immediate future.
5.2 Serves as a database for cyber attacks that allows law enforcement
agencies to quickly assess if their case is a component of larger criminal
activity.
Participants suggested a number of organizations that may serve in a capacity to address
this need. These agencies include IACIS, DHS IAIP, CFID, HTCIA, and IFCC. None of
these agencies are equipped to handle real-time, secure information sharing regarding
active cyber attack cases. No technology-specific solutions were suggested.
Appendix C Page 22
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
the Truesecure Corporation (ICSA Labs), to collect and provide them with relevant data
and analyses.
5.6 Serves as a database of Trojans, root kits, and other attack tools that
is continually updated that provides investigators with relevant and
timely analysis capability.
Participants suggested integrating more closely with the anti-virus vendors to use the data
they collect in the course of investigations. CVE and Packetstorm were also noted as sites
on the Internet that should be consulted when looking for information on attack tools.
Preliminary Findings
All of the needs received at least six participant votes for the need for additional research
and development. Four of the seven needs received 50% or better support from the
participants that additional work is needed (Table 11). Three of these needs are closely
related and fall under the need for additional databases and informational resources
related to the investigation of cyber attacks. The Gap Analysis Matrix showed that there
are at least seven tools that purport to address at least parts of the top-voted need; “5.1
Serves as a database for collecting attack profiles in concert with a solution for
performing technical exploit matching to enable law enforcement to identify attack
patterns.” The needs that fell into the second and fourth spots had very few solutions
marked in the Gap Analysis Matrix; four mapped solutions for need numbered 5.2 and
two for need numbered 5.6. The third highest ranked need had seven tools marked for it
on the Gap Analysis Matrix, similar to the top ranked need.
Appendix C Page 23
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix C Page 24
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
A series of resource allocation and rank order exercises were conducted to determine
which needs were most critical and, just as importantly, least critical to the investigators
at the Prioritization Working Group. After a number of these exercises were conducted,
the group reached a consensus that eighteen of the forty-four needs under consideration
were the most critical needs requiring research and development.
Table 12 below lists the eighteen most critical needs in their approximate final order of
criticality as determined by the Prioritization Working Group participants.
Appendix D Page 1
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Appendix D Page 2
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
List of Tables
Table 1 – Addendum to the Gap Analysis Matrix – Tools Discussed
at the Prioritization Working Group But Not Referenced
on the Gap Analysis Matrix .............................................. Appendix B Page 9
Table 10 – Category 5 – National Data and Information Sharing ....... Appendix C Page 21
Appendix E Page 1
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Acknowledgments
The Institute for Security Technology Studies extends it sincere appreciation to the many
individuals and organizations from government, industry, and academia that participated
in the Law Enforcement Tools and Technologies for Investigating Cyber Attacks: Gap
Analysis Report.
Appendix E Page 2
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Contact Information
Martin Wybourne
Bill Brosius
Kathleen Cassedy
Robert Hillery
Stacy Kollias
Andrew Macpherson
Kevin O’Shea
The following outside organization directly contributed to the creation of this study:
Appendix E Page 3
INSTITUTE FOR SECURITY TECHNOLOGY STUDIES
Publication Notice
FOR
First Printing:
(c) Copyright 2004, Trustees of Dartmouth College. All rights reserved. This project was
supported under Award No. 2000-DT-CX-K001 from the Office for Domestic
Preparedness, U.S. Department of Homeland Security. Points of view in this document
are those of the author(s) and do not necessarily represent the official position of the U.S.
Department of Homeland Security.
Appendix E Page 4