Cyber Forensics
Cyber Forensics
ANNAMALAI UNIVERSITY
FACULTY OF ENGINEERING AND TECHNOLOGY
CYBER FORENSICS
TEXT BOOKS
1) John R. Vacca, “Computer Forensics: Computer Crime Scene
Investigation”, Cengage Learning, 2nd Edition, 2005. (CHAPTERS 1 – 18).
(UNIT I – IV)
2) Marjie T Britz, “Computer Forensics and Cyber Crime: An Introduction”,
Pearson Education, 2nd Edition, 2008. (CHAPTERS 3 – 13). (UNIT IV – V)
REFERENCE BOOKS
1) MariE-Helen Maras, “Computer Forensics: Cybercriminals, Laws, and
Evidence”, Jones & Bartlett Learning; 2nd Edition, 2014.
2) Chad Steel, “Windows Forensics”, Wiley, 1st Edition, 2006.
3) Majid Yar, “Cybercrime and Society”, SAGE Publications Ltd, Hardcover,
2nd Edition, 2013.
4) Robert M Slade, “Software Forensics: Collecting Evidence from the Scene
of a Digital Crime”, Tata McGraw Hill, Paperback, 1st Edition, 2004.
UNIT–I
Syllabus:- Introduction: Computer Forensics Fundamentals – Types of
Computer Forensics Technology – Types of Computer Forensics Systems –
Vendor and Computer Forensics Services.
INTRODUCTION:
COMPUTER FORENSICS FUNDAMENTALS:
What is Computer Forensics?
Computer forensics, also referred to as computer forensic analysis,
electronic discovery, electronic evidence discovery, digital discovery, data
recovery, data discovery, computer analysis, and computer examination, is
the process of methodically examining computer media (hard disks,
diskettes, tapes, etc.) for evidence. A thorough analysis by a skilled
examiner can result in the reconstruction of the activities of a computer
user.
(or)
In other words, computer forensics is the collection, preservation,
analysis, and presentation of computer-related evidence. Computer evidence
can be useful in criminal cases, civil disputes, and human
resources/employment proceedings.
Use of Computer Forensics in law Enforcement:- If there is a computer
on the premises of a crime scene, the chances are very good that there is
valuable evidence on that computer. If the computer and its contents are
examined by anyone other than a trained and experienced computer
forensics specialist, the usefulness and credibility of that evidence will be
tainted.
Choosing a Computer Forensics Specialist for a Criminal Case:- When
you require the services of a computer forensics specialist, don’t be afraid to
shop around. There are an increasing number of people who claim to be
experts in the field. Look very carefully at the level of experience of the
storage that has also been called virtualization. Together with these
potential enhancements, SANs should be able to generate greater
functionality than has been possible previously. Thus, most system vendors
have ambitious strategies to change the way enterprise operations store and
manage data with new capabilities based on SANs.
and managing their disaster recovery plans, and relatively few companies
involve line-of-business staff and partners in designing and testing such
plans at all. Not surprisingly, the person most frequently cited as being
responsible for the management of an NDR plan is the company’s chief
information officer (CIO) or another IT manager.
Public Key Infrastructure Systems:- The PKI assumes the use of public key
cryptography, which is the most common method on the Internet for
authentication of a message sender or encryption of a message. Traditional
cryptography involves the creation and sharing of a secret key for the
encryption and decryption of messages. This secret key system has the
significant flaw that if the key is discovered or intercepted by someone else,
messages can easily be decrypted. For this reason, public key cryptography
and the PKI is the preferred approach on the Internet. A PKI consists of
✓ A certificate authority that issues and verifies digital certificates
✓ A registration authority that acts as the verifier for the certificate
authority before a digital certificate is issued to a requestor
✓ One or more directories where the certificates (with their public keys)
are held
✓ A certificate management system
Wireless Network Security Systems:- The only reason the wireless viruses
of today have not been more damaging is that there’s a lack of
functionality and a lack of mature infrastructure globally. That’s about to
change. Industry analysts predict dramatic increases in wireless handheld
use and the proliferation of new mobile capabilities.
The wireless world, with its often-incompatible alphabet soup of standards,
may be new territory for many IT managers. Many enterprises have felt that
protecting their wireless processes against viruses is one piece of the
complicated puzzle they can afford to omit. They’ll soon need to think
again or face threats that could wreak havoc.
The good news is wireless network security vendors (even giants like IBM)
are busy developing products to fight the viruses and security breaches of
the future. Among them are those that head off problems on a wireless
network level, within applications and on devices.
Satellite Encryption Security Systems:-
There are the obvious holes that IM opens up on the corporate network.
Each of the IM networks uses a well-known port that must either be left
open on the corporate firewall to allow traffic in or closed, which, at least in
theory, bans that service to end users.
VENDOR AND COMPUTER FORENSICS SERVICES:-
Computer forensic services:-
✓ Forensic incident response
✓ Evidence collection
✓ Forensic analysis
✓ Expert witness
✓ Forensic litigation and insurance claims support
✓ Training
✓ Forensic process improvement
Occurrence of Cyber Crime:-
✓ Financial fraud
✓ Sabotage of data or networks
✓ Theft of proprietary information
✓ System penetration from the outside and denial of service
✓ Unauthorized access by insiders and employee misuse of Internet
access privileges
✓ Viruses, which are the leading cause of unauthorized users gaining
access to systems and networks through the Internet
Cyber Detectives:- Computer forensics, therefore, is a leading defense in
the corporate world’s armory against cyber crime. Forensic investigators
detect the extent of a security breach, recover lost data, determine how an
intruder got past security mechanisms, and, possibly, identify the culprit.
Forensic experts need to be qualified in both investigative and technical
fields and trained in countering cyber crime. They should also be
knowledgeable in the law, particularly legal jurisdictions, court
requirements, and the laws on admissible evidence and production. In many
cases, forensic investigations lead to calling in law enforcement agencies and
building a case for potential prosecution, which could lead to a criminal
Ex:- the Yankee Group reports that managed-security services (of which
intrusion detection is the latest phenomenon) more than tripled, from $450
million in 2000 to $1.5 billion in 2003. By 2009, the market is expected to
reach $7.4 billion, fueled by the trend toward outsourcing internal local area
network (LAN) security to professional security firms as virtual employees.
Digital Evidence Collection:- The following are some helpful tips that you
can follow to help preserve the data for future computer forensic
examination: Do not turn on or attempt to examine the suspect computer.
This could result in destruction of evidence.
Identify all devices that may contain evidence:
1. Workstation computers
2. Off-site computers
3. Removable storage devices (zips, Jaz, Orb, floppy diskettes, CDs, Sony
Memory Sticks, Smart Media, Compact Flash, LS-120, optical disks,
SyQuest, Bernouli, microdrives, pocketdrives, USB disks, firewire disks,
PCMICA)
4. Network storage devices (redundant array of independent disks [RAIDs],
servers, storage area networks [SANs], network attached storage [NAS],
spanned, remote network hard drives, back-up tapes, etc.)
Quarantine all in-house computers:
• Do not permit anyone to use the computers.
• Secure all removable media.
• Turn off the computers.
• Disconnect the computers from the network.
Forensically image all suspect media.
Forensic Process Improvement:- The risk any system connected to the Net
faces is a product of vulnerability and threat. The techniques covered in this
section will help you determine possible actions and possible motivations of
the attacker. If you can understand your attacker, than you can better
defend against and respond to attacks against your network. Of course, it is
important to understand that hackers will loop through several systems
during the attack phase.
✓ Dig –x /nslookup
✓ Whois
✓ Ping
✓ Traceroute
✓ Finger
✓ Anonymous Surfing
✓ USENET
✓ File Slack
The occurrence of random memory dumps in hidden storage areas [9]
should be discussed and covered in detail during workshops. Techniques
and automated tools used to capture and evaluate file slack should be
demonstrated in the course. Such data is the source of potential security
leaks regarding passwords, network logons, email, database entries, and
word processing documents. These security and evidence issues should be
discussed and demonstrated during the course. The participants should be
able to demonstrate their ability to deal with slack from both an
investigations and security risk standpoint. They should also be able
demonstrate their proficiency in searching file slack, documenting their
findings, and eliminating security risks associated with file slack.
Data-Hiding Techniques:- Trade secret information and other sensitive
data can easily be secreted using any number of techniques. It is possible to
hide diskettes within diskettes and to hide entire computer hard disk drive
partitions. These issues should be discussed from a detection standpoint as
well as from a security risk standpoint. Tools that help in the identification
of such anomalies should demonstrated and discussed (AnaDisk).
Participants should be required to demonstrate their understanding of such
issues. This aspect of the training becomes especially important during the
last day of the course when the participants are called on to identify and
extract their Certificate of Completion from a special floppy diskette. Data-
hiding issues should be covered in much more depth in a data-hiding course.
Internet-Related Investigations:- Issues and techniques related to the
investigation of Internet-related matters should be covered in the course.
UNIT - II
Syllabus:- Computer forensics evidence and capture: Data Recovery –
Evidence Collection and Data SeizurE-Duplication and Preservation of
Digital EvidencE-Computer Image Verification and Authentication.
3. The available throughput of the tape device(s) onto which the data is
Moved.
The Future of Data Backup:-
The Backup Server:- The backup server is responsible for managing the
policies, schedules, media catalogs, and indexes associated with the systems
it is configured to back up. The systems being backed up are called clients.
Traditionally, all managed data that was being backed up had to be
processed through the backup server. Conversely, all data that needed to be
restored had to be accessed through the backup server as well. This meant
that the overall performance of a backup or recovery was directly related to
the ability of the backup server to handle the I/O load created by the
backup process. In the past, the only way to overcome a backup server
bottleneck was to invest in larger, more powerful backup servers or data
backup and recovery and divide the backup network into smaller,
independent groups. Fortunately, backup-software developers have created
methods to work around these bottlenecks.
and user error. The role of backup now includes the responsibility for
recovering user errors and ensuring that good data has been saved and can
quickly be restored.
Conventional Tape Backup in Today’s Market:- Current solutions offered
by storage vendors and by backup vendors focus on network backup
solutions. To effectively accomplish backup in today’s environment, tape
management software is generally bundled with several other components to
provide a total backup solution. A typical tape management system consists
of a dedicated workstation with the front-end interfaced to the network and
the backend controlling a repository of tape devices. The media server runs
tape management software. It can administer backup devices throughout an
enterprise and can run continuous parallel backups and restores.
The Data-Recovery Solution:-
Shrinking Expertise, Growing Complexity:- Increased availability is good,
except for one fact: many systems programmers, database administrators
(DBAs), and other mainframe experts are maturing. It takes a lot of care and
feeding to keep applications ready for work, and the people who have
maintained these environments for so long have other things they want to
do. Many are starting to shift their sights toward that retirement community
in Florida that they’ve heard so much about. Most of the bright youngsters
who are graduating from college this term haven’t had much exposure to
mainframe concepts in their course work, much less any meaningful grasp
of the day-to-day requirements for keeping mainframe systems running.
Failures:- Certainly, hardware failures were once more common than they
are today. Disk storage is more reliable than ever, but failures are still
possible. More likely to occur, though, is a simple mistake made by an
application programmer, system programmer, or operations person. Logic
errors in programs or application of the wrong update at the wrong time can
result in a system crash or, worse, an undetected error in the database—
undetected, that is, until minutes, hours, or days later when a customer
calls, a reconciliation fails, or some other checking mechanism points out
the integrity exposure.
Cyber Forensics Page 32
Annamalai University Department of IT
Budgets and Downtime:- Does anyone need a reminder that budgets are
tight? You have fewer resources (people, processing power, time, and money)
to do more work than ever before, and you must keep your expenses under
control. Shrinking expertise and growing complexity cry out for tools to
make systems management more manageable, but the tools that can save
resources (by making the most of the ones you have) also cost you resources
to obtain, implement, and operate.
Recovery: Think Before You Back Up:- One of the most critical data-
management tasks involves recovering data in the event of a problem. For
this reason, installations around the world spend many hours each week
preparing their environments for the possibility of having to recover. These
preparations include backing up data, accumulating changes, and keeping
track of all the needed resources.
Automated Recovery:- Having people with the required expertise to
perform recoveries is a major consideration, particularly in disaster
situations. For example, if the only person who understands your IBM
Information Management System (IMS) systems (hierarchical database
system) and can recover them moved far away, you’re in trouble. However, if
your recovery processes are planned and automated so that less-
experienced personnel can aid in or manage the recovery process, then
you’re able to maximize all your resources and reduce the risk to your
business.
EVIDENCE COLLECTION AND DATA SEIZURE:-
Why Collect Evidence?
Electronic evidence can be very expensive to collect. The processes are strict
and exhaustive, the systems affected may be unavailable for regular use for
a long period of time, and analysis of the data collected must be performed.
So, why bother collecting the evidence in the first place? There are two
simple reasons: future prevention and responsibility.
Future Prevention:- Without knowing what happened, you have no hope of
ever being able to stop someone else (or even the original attacker) from
doing it again. It would be analogous to not fixing the lock on your door after
someone broke in. Even though the cost of collection can be high, the cost of
repeatedly recovering from compromises is much higher, both in monetary
and corporate image terms.
Responsibility:- There are two responsible parties after an attack: the
attacker and the victim. The attacker is responsible for the damage done,
and the only way to bring him to justice (and to seek recompense) is with
adequate evidence to prove his actions.
Types of Evidence:- Before you start collecting evidence, it is important to know
the different types of evidence categories. Without taking these into
consideration, you may find that the evidence you’ve spent several weeks
and quite a bit of money collecting is useless. Real evidence is any evidence
that speaks for itself without relying on anything else.
Testimonial Evidence:- Testimonial evidence is any evidence supplied by a
witness. This type of evidence is subject to the perceived reliability of the
witness, but as long as the witness can be considered reliable, testimonial
evidence can be almost as powerful as real evidence. Word processor
documents written by a witness may be considered testimonial— as long as
the author is willing to state that he wrote it.
Hearsay:- Hearsay is any evidence presented by a person who was not a
direct witness. Word processor documents written by someone without
direct knowledge of the incident are hearsay. Hearsay is generally
inadmissible in court and should be avoided.
The Rules of Evidence:- There are five rules of collecting electronic
evidence. These relate to five properties that evidence must have to be
useful.
1. Admissible
2. Authentic
3. Complete
4. Reliable
5. Believable
Admissible:- Admissible is the most basic rule. The evidence must be able
to be used in court or otherwise. Failure to comply with this rule is
equivalent to not collecting the evidence in the first place, except the cost is
higher.
Authentic:- If you can’t tie the evidence positively to the incident, you can’t
use it to prove anything. You must be able to show that the evidence relates
to the incident in a relevant way.
Complete:- It’s not enough to collect evidence that just shows one
perspective of the incident. You collect not only evidence that can prove the
attacker’s actions, but also evidence that could prove their innocence. For
instance, if you can show the attacker was logged in at the time of the
incident, you also need to show who else was logged in and why you think
they didn’t do it. This is called exculpatory evidence and is an important part
of proving a case.
Reliable:- The evidence you collect must be reliable. Your evidence
collection and analysis procedures must not cast doubt on the evidence’s
authenticity and veracity.
Believable:- The evidence you present should be clearly understandable and
believable to a jury. There’s no point presenting a binary dump of process
memory if the jury has no idea what it all means. Similarly, if you present
them with a formatted, human understandable version, you must be able to
show the relationship to the original binary, otherwise there’s no way for the
jury to know whether you’ve faked it. Using the preceding five rules, you can
derive some basic do’s and don’ts:
✓ Minimize handling and corruption of original data.
✓ Account for any changes and keep detailed logs of your actions.
✓ Comply with the five rules of evidence.
✓ Do not exceed your knowledge.
✓ Follow your local security policy.
✓ Capture as accurate an image of the system as possible.
✓ Be prepared to testify.
✓ Work fast.
✓ Proceed from volatile to persistent evidence.
✓ Don’t shutdown before collecting evidence.
system is a good guide and ensures that you minimize loss of uncorrupted
evidence.
Remove External Avenues of Change:- It is essential that you avoid
alterations to the original data, and prevention is always better than a cure.
Preventing anyone from tampering with the evidence helps you create as
exact an image as possible. However, you have to be careful. The attacker
may have been smart and left a dead-man switch. In the end, you should try
to do as much as possible to prevent changes.
Collect the Evidence:- You can now start to collect the evidence using the
appropriate tools for the job. As you go, reevaluate the evidence you’ve
already collected. You may find that you missed something important. Now
is the time to make sure you get it.
Document Everything:- Your collection procedures may be questioned
later, so it is important that you document everything you do. Timestamps,
digital signatures, and signed statements are all important. Don’t leave
anything out.
Controlling Contamination: The Chain of Custody
A good way of ensuring that data remains uncorrupted is to keep a chain of
custody. This is a detailed list of what was done with the original copies
once they were collected. Remember that this will be questioned later on, so
document everything (who found the data, when and where it was
transported [and how], who had access to it, and what they did with it). You
may find that your documentation ends up greater than the data you
collected, but it is necessary to prove your case.
Analysis:- Once the data has been successfully collected, it must be
analyzed to extract the evidence you wish to present and to rebuild what
actually happened. As always, you must make sure that you fully document
everything you do. Your work will be questioned and you must be able to
show that your results are consistently obtainable from the procedures you
performed.
Time:- To reconstruct the events that led to your system being corrupted,
you must be able to create a timeline. This can be particularly difficult when
documentation area arise when you try to take shortcuts or make do with
less than adequate time, equipment, and resources.
If your preservation is poor, it becomes fairly evident that your collection
and transportation of evidence gives rise to numerous possibilities for error
in the form of destruction, mishandling, and contamination. Problems in the
preservation area have implications for the integrity of law enforcement and
crime labs. The basic chain of custody, for example, involves at least three
initial sources of error.
Computer Evidence Processing Steps:- Computer evidence is fragile by its
very nature, and the problem is compounded by the potential of destructive
programs and hidden data. Even the normal operation of the computer can
destroy computer evidence that might be lurking in unallocated space, file
slack, or in the Windows swap file.
They are general guidelines provided as food for thought:
1. Shut down the computer.
2. Document the hardware configuration of the system.
3. Transport the computer system to a secure location.
4. Make bit stream backups of hard disks and floppy disks.
5. Mathematically authenticate data on all storage devices.
6. Document the system date and time.
7. Make a list of key search words.
8. Evaluate the Windows swap file.
9. Evaluate file slack.
10. Evaluate unallocated space (erased files).
11. Search files, file slack, and unallocated space for keywords.
12. Document files names, dates, and times.
13. Identify file, program, and storage anomalies.
14. Evaluate program functionality.
15. Document your findings.
16. Retain copies of software used
✓ Network diagrams.
✓ Applications running on the computer systems previously listed.
✓ A copy of the policy or policies that relate to accessing and using the
systems previously listed.
✓ A list of administrators responsible for the routine maintenance of the
system. A detailed list of steps used in collecting and analyzing
evidence. Specifically, this list needs to identify the date and time each
task was performed, a description of the task, who performed the
task, where the task was performed, and the results of the analysis.
✓ An access control list of who had access to the collected evidence at
what date and time
Storage and Analysis of Data
✓ The date and time of analysis
✓ Tools used in performing the analysis
✓ Detailed methodology of the analysis
✓ Results of the analysis
COMPUTER IMAGE VERIFICATION AND AUTHENTICATION:-
Special Needs of Evidential Authentication:- A wealth of mathematical
algorithms deal with secure encryption, verification, and authentication of
computer-based material. These display varying degrees of security and
complexity, but all of them rely on a second channel of information, whereby
certain elements of the encryption/decryption/authentication processes are
kept secret. This is characterized most plainly in the systems of public and
private key encryption but is also apparent in other protocols.
Consider the investigative process where computers are concerned. During
an investigation, it is decided that evidence may reside on a computer
system. It may be possible to seize or impound the computer system, but
these risks violating the basic principle of innocent until proven guilty, by
depriving an innocent party of the use of his or her system. It should be
perfectly possible to copy all the information from the computer system in a
manner that leaves the original system untouched and yet makes all
contents available for forensic analysis.
When this is done, the courts may rightly insist that the copied evidence is
protected from either accidental or deliberate modification and that the
investigating authority should prove that this has been done. Thus, it is not
the content that needs protection, but its integrity.
Digital IDS and Authentication Technology:- When customers buy
software in a store, the source of that software is obvious. Customers can
tell who published the software and they can see whether the package has
been opened. These factors enable customers to make decisions about what
software to purchase and how much to “trust” those products.
When customers download software from the Internet, the most they see is a
message warning them about the dangers of using the software. The
Internet lacks the subtle information provided by packaging, shelf space,
shrink wrap, and the like. Without an assurance of the software’s integrity,
and without knowing who published the software, it’s difficult for customers
to know how much to trust software. It’s difficult to make the choice of
downloading the software from the Internet.
For example (when using Microsoft Authenticode coupled with Digital IDs™
from VeriSignR), through the use of digital signatures, software developers
are able to include information about themselves and their code with their
programs
enabled applications, the end user’s browser verifies the authenticity of the
software developer digital ID (which is itself signed by the VeriSign root
Private Key).
6. Using the publisher’s public key contained within the publisher’s digital
ID, the end user’s browser decrypts the signed hash.
7. The end user’s browser runs the code through the same hashing
algorithm as the publisher, creating a new hash.
8. The end user’s browser compares the two hashes. If they are identical, the
browser messages that the content has been verified by VeriSign, and the
end user has confidence that the code was signed by the publisher identified
in the digital ID and that the code hasn’t been altered since it was signed.
Time stamping:- Because key pairs are based on mathematical
relationships that can theoretically be “cracked” with a great deal of time
and effort, it is a well-established security principle that digital certificates
should expire. Your VeriSign Digital ID will expire one year after it is issued.
However, most software is intended to have a lifetime of longer than one
year. To avoid having to resign software every time your certificate expires, a
time stamping service is now available. Now, when you sign code, a hash of
your code will be sent to VeriSign to be time stamped.
Practical Considerations
1. Forensic data collection should be complete and non-software specific,
thus avoiding software traps and hidden partitioning.
2. In operation, it should be as quick and as simple as possible to avoid
error or delay.
3. It should be possible for anyone to use a forensic data collection
system with the minimum amount of training.
4. Necessary costs and resources should be kept to a minimum.
UNIT - III
Syllabus:- Computer forensic analysis: Discover of Electronic Evidence-
Identification of Data – Reconstructing Past Events – Fighting against Macro
Threats – Information Warfare Arsenal – Tactics of the Military – Tactics of
Terrorist and Rogues – Tactics of Private Companies
But why was Bristol-Myers suddenly seeking to cut down 200 times as
many yews? Was it ready to put its planned anticancer drug, Taxol, into
production? Back at SmithKline headquarters in Philadelphia, the news was
enough to trigger serious nail-biting in the boardroom.
The intelligence officer’s team wasted no time. It immediately began
canvassing conferences and scouring online resources for clues. It tapped
into Web sources on the environment and got staffers to work the phones,
gathering names of researchers working for Bristol-Myers. It even zeroed in
on cities where Bristol-Myers had sponsored experimental trials of the
substance.
Information Overload:- The growing information glut makes it critical for
CIOs to start thinking about how they can support their company’s CI
snoopsters and do it with as much zeal and imagination as they already
apply to building hacker-proof security systems. Most existing systems and
organizations are still ill-equipped to keep pace with the evergrowing
amount of information available. Many companies are still stumbling to
process and respond to competitive information as fast as it pours in. The
result is that the key to carving out the leading edge of the knowledge gap in
one’s industry (the difference between what you know and what your rival
knows) lies in the ability to build IT systems that can scope out the
movements of corporate rivals in real time. IT-aided intelligence gathering is
so critical that entire industries will be redefined by the companies most
skilled at snooping. Players unable to surmount their bureaucratic inertia
will find their existence threatened.
The goal is to tie technology and business together in a common pursuit of
becoming more competitive and responsive to rivals and customers in the
marketplace. CI is to a company what radar is to an airplane. Companies
are now installing radar in the corporate cockpit, and that’s where the CIO
comes in.
Companies that ignore the CIO do so at their peril. Recently, that happened
to a large telecom equipment maker with 30,000 home pages on its supply-
chain intranet. Several hundred of the home pages were dedicated to the
Cyber Forensics Page 53
Annamalai University Department of IT
competition, but there was no coordination between home pages. This was a
situation where the CIO could have taken charge and made sure the
information was in one spot. How many tens of millions of dollars were
thrown at that intranet and wasted annually in inefficient man-hours?
Building Teams:- You need to build teams with diverse membership. People
who understand the concept of organizing information and indexing it could
be paired with someone who understands different technology capabilities,
such as a relational database showing connections between different terms
or items. As managers, CIOs have to amass different strengths on a CI
project so they don’t have an abundance of hammer holders who look only
for nails.
However, don’t get carried away on the technology. A few years ago, a
study conducted by Fuld & Company [1] found flaws with many of the 170
software packages with potential CI applications. None of them were able to
take companies through the process of data identification, discovery,
distribution, and analysis. Each did some part of the process, but not the
whole thing. The thinking machine has not yet arrived. No company should
buy a software package in the hope it will build an intelligence process for
the corporation. CIOs need to help build that. It won’t come off the shelf.
In other words, in this business, you need to be aggressive. Take the
offensive. Always recall the words of ancient Chinese general Sun Tzu (6th–
5th century B.C.): “Be so subtle that you are invisible, be so mysterious
that you are intangible; then you will control your rival’s fate.”
end, all recovery and analysis work is performed on image copies of the
original.
Because there is a wide variety of computers, peripherals, and software
available, including many different forms of archival storage (Zip, Jaz, disk,
tape, CDROM, etc.) [1] It is important that a wide variety of equipment be
available for recovery and analysis of evidence residing on a computer’s
hard disk and external storage media. Recovered data must be analyzed,
and a coherent file must be reconstructed using advanced search programs
specifically developed for this work.
For example, these techniques were recently used to recover data from
several computers that indicated a large check forgery ring was in operation
throughout California and personal and business identities were being
stolen without the knowledge of the victims. Case files going back over five
years were cleared with the information obtained.
How to Become A Digital Detective:- Recovering electronic data is only the
beginning. Once you recover it, you need to determine how to use it in your
case. In other words, how do you reconstruct past events to ensure that
your findings will be admissible as evidence in your case? What follows are
some recommendations for accomplishing that goal.
Convert Digital Evidence:- Before you can reconstruct past events and
present the data, you need it on a medium and in a format you can work
with. In other words, you need to get the data onto a medium you can use, if
it is not already on one. Today, data can come on a variety of media, such as
holograms, video, data tapes, Zip disks, CD-ROM disks, and even 3.5-inch
floppy disks.
For example, you could use Zip disks. Zip disks are simpler. The cost of
Iomega Zip drives (http://www.iomega.com/global/index.jsp) is so low that
you can keep one on hand just to copy data from Zip disks you receive (and
to copy data to Zip disks when others request data from you on that
medium). CDs are even simpler, as CD drives have become commonplace on
PCs. Similarly, even 3.5-inch disks generally pose no problem.
Useable File Formats:- Even if the data is in a format that appears to be one
you already use, conversion still may be necessary. The format may be too
new. The problem is a basic one. In a similar vein, you may have to get the
data converted if it comes to you in a format that is too old or runs on a
different operating system. Although simple files created with one
company’s software generally can be opened without a problem using a
competitor’s comparable product, this often does not hold true for more
complex files.
Unusable File Formats:- You may get electronic data in a format that you
cannot use “out of the box.” When that happens, you have to convert the
files to a format you can use—or find someone to do the conversion for you.
You may have already encountered these issues with a variety of files
including email files, database files from mainframe systems, and “.txt”
files containing data dumped from database files.
For example if you receive a “.txt” file that appears to contain information
from a database file, try to find out, among other things, the make and
model of the computer the file came from; the name and version of the
operating system the computer ran; the name and version of the database
program used; the name of the database file; a list of all fields in the
database; and descriptions of each field with the descriptions including the
type, length, and other characteristics of the field.
Converting Files:- If you are going to attempt converting the data yourself,
you may be fortunate enough to have received electronic data that you can
covert directly into programs such as Access or Excel using the wizards built
into those programs. This can be the case with “.txt” files. Sometimes the
first line in a file you are converting may even contain the names of the
fields that need to be created, further simplifying your task. If that
information is not in the file, then try to get the field names and descriptions
from the producing party. Should you fail at that, you may have an
exceedingly difficult time carrying out a meaningful conversion.
✓ Get the Right Software, Hardware, and Personnel
enemy, those who are friendly to his or her cause, or those who are neutral,
with each target chosen for a specific purpose. If the attacker is simply a
hacker, cracker, or script-kiddie, it might be for nothing more than to grab a
credit card number or prove to friends that he orshe could do it.
Education, not legislation, is the key component. The U.S. government can
pass all the laws it wishes, but it won’t affect the traffic that is coming out
of countries such as Korea, China, and Singapore. The government needs to
communicate these messages with intelligence. If the U.S. government
knows what needs to be done and doesn’t communicate it effectively, then
whatever else it does is irrelevant. If the government scatter shots their
communications without filtering them through an understanding of the
message they need to convey, then all they are sending out is noise.
Are other Governments Prepared for Information Warfare?
important first step in building computer security programs for the nation.
Among topics discussed were the creation of a rapid response system and
communications between industry and government.
Doomsday Software:-
FBI Fingers China:- Many unnamed countries are developing technologies
(previously discussed) to complicate what the U.S. military refers to as
“power projection” and to undermine morale at home. The interagency,
FBI-led National Infrastructure Protection Center, uses a slide depicting
China’s Great Wall in its standard presentation on cyberthreats, along
with a quote from Sun Zi, author of a treatise on war in about 350 B.C.
Strategic Diplomacy and Information Warfare:- Strategic diplomacy,
according to the Department of Defense, is the “art and science of
developing and using political, economic, psychological, and military forces
as necessary during peace and war, to afford the maximum support to
policies, in order to increase the probabilities and favorable consequences of
victory and to lessen the chances of defeat.”
New tools and technologies for communication have created the potential for
a new form of psychological warfare to a degree imagined only in science
fiction. This new form of warfare has become known as information warfare
(IW). In other words, the United States armed forces need to develop a
systematic, capstone concept of military knowledge and diplomatic strategy.
Such a strategy would include clear doctrine and a policy for how the armed
forces will acquire process, distribute, and project knowledge.
Fictive or fictional operational environments, then, whether mass-targeted or
niche-targeted, can be generated, transmitted, distributed, or broadcast by
governments or all sorts of other players through increasingly diversified
networks. The niche-manipulation potential available to states or private
interests with access to the universe of internetted communications, such as
the networks over which business, commercial, and banking information are
transmitted could easily provoke financial chaos. The target state would not
know what had happened until too late. Direct satellite broadcast to selected
attack capabilities. At the low end, in June 1998, the director of central
intelligence stated that several countries are sponsoring IW programs and
that nations developing these programs recognize the value of attaching
their country’s computer systems—both on the battlefield and in the civilian
arena.
jobs. A CIA (or Super Cyber Protection Agency [SCPA] as they are called now)
representative recently named Israel and India as the countries most likely
to be doing this because they each handle a large amount of software repair
not done by U.S.-born workers. According to the CIA, these two countries
each have plans to conduct information warfare, and planting trapdoors
wherever they can would be a part of that. As previously explained, IW is a
nation’s concerted use of network hacking, denial-of-service attacks, or
computer viruses to gain access to or disrupt computer networks, now the
heart of modern society in terms of banking, telecommunications, and
commerce.
TACTICS OF THE MILITARY:-
The growing reliance on computer networks makes the networks
themselves likely sites for attack. What is more, civilian and military
networks are becoming increasingly intertwined, so the U.S. military’s focus
has shifted from protecting every network to securing mission-critical
systems. Current efforts include software agent–based systems (for real-time
detection and recovery from a cyber attack) and network-level early-warning
systems (for monitoring suspicious online activity). As tensions continue to
mount in the Middle East because of the continued occupation of U.S. forces
in Iraq and the recent death of Palestinian leader Yasser Arafat, a different
sort of pitched battle is being waged behind the scenes. With all the fervor of
their comrades in arms, computer-savvy patriots on both sides have
managed to infiltrate and disable enemy Web servers.
The prospect of cyber warfare, or information warfare (IW), is a deadly
serious matter in military circles. The electron is the ultimate precision-
guided weapon. Indeed, the more heavily we come to rely on computer
networks, the greater the fear that adversaries will attack the networks
themselves. In the very worst case (what some have termed an electronic
Pearl Harbor) a sudden, all-out network assault would knock out
communications as well as financial, power, transportation, military, and
other critical infrastructures, resulting in total societal collapse.
activities also are posted on the sites, which the officials declined to name.
To a greater and greater degree, terrorist groups, including Hezbollah,
Hamas, and bin Laden’s al Qaeda, are using computerized files, email, and
encryption to support their operations—like the train bombing in Madrid in
the winter of 2004. According to various unnamed officials and
investigators, the messages are scrambled using free encryption programs
set up by groups that advocate privacy on the Internet. It’s something the
intelligence, law-enforcement, and military communities are struggling to
deal with. The operational details and future targets, in many cases, are
hidden in plain view on the Internet. Only the members of the terrorist
organizations, knowing the hidden signals, are able to extract the
information.
The Terrorist Profile:- Sid-Ra, a 6-foot-4-inch, 350-pound giant of a man,
paces between his “subjects” in the smoke-filled Goth club Click + Drag,
located in the old meat-packing district of Manhattan. Inside the club are
leather-clad, black-lipped females and young men dressed in women’s
underwear. Sid is a hacker-terrorist and an acknowledged “social
engineer” with curious nocturnal habits. There are thousands of people like
him, who by day care system and network administrators, security analysts,
and startup cofounders. When night comes, they transform into something
quite different. Is this the profile of a “wanna-be” terrorist? Perhaps! These
are the selfproclaimed freedom fighters of cyberspace. They even have a
name for it: hactivism. Political parties and human rights groups are circling
around to recruit hactivists into their many causes. Recently, for example,
the Libertarian Party set up a table at the HOPE (Hackers on Planet Earth)
conference. The San Francisco– based Electronic Frontier Foundation (EFF)
collected donations, and members of civil-rights groups, including the
Zapatistas, a Mexican rebel group, spoke up at one of two sessions on
hactivism.
From Vietnam Marches to Cyberdisobedience:- Like any social engineer,
Sid exaggerates. Except for the four-year jail terms handed down to Kevin
Mitnick and Kevin Poulsen, sentencing for even criminal hacking in 2003–
2004 has been relatively light (mostly probation and fines) because of the
suspects’ young ages.
Hackers question conventional models. They don’t just look at technology
and say, “This is how it works.” They say, “How can I make it better?”
They look at society that way too—their government, their schools, and their
social situations. They say, “I know how to make this better,” and they go
for it. In the Motion Picture Association of America (MPAA) case, staffers at
2600 Enterprises Inc., based in Middle Island, New York, were threatened
with imprisonment if they didn’t remove a link on the 2600 Web site to the
code used to crack DVD encryption. Because the link was editorial content,
it set Sid off on another diatribe. The Libertarian Party also recruits hackers
and technologists. At HOPE, the party’s New York State committee
(http://www.cownow.com) handed out fliers, signed up recruits, and took a
“sticker” poll of party affiliations. The poll got hacked, but about half the
stickers were yellow—for libertarian, anarchist, or independent. Many party
members are programmers
Why Terrorists and Rogues have an Advantage In IW:- Governments have
neither the financial resources nor the technical know-how to stay on top of
hackers and computer terrorists. This is why terrorists and rogues have an
advantage in IW. The private sector must itself take much of the action that
is necessary to prevent attacks being made on the Internet. It’s no longer
possible for governments to provide the resources and investment necessary
to deal with these kinds of issues.
There are no cookie-cutter solutions; every network is different. At the top of
chief information officers (CIOs) lists of concerns is denial of service (DoS)
attacks, which recently brought Yahoo, Amazon.com, eBay, and other high-
profile Web sites to their knees. DoS attacks are a key concern because the
only way that is currently available to prevent them is to catch the
perpetrators.
Solutions seem harder to come by today than solutions to the problems just
discussed. Governments, businesses, and research institutions must band
together to find the best technologies and courses of action to defeat cyber
crimes. Companies must be more willing to invest in security systems to
protect their networks. A few of these companies called on software
companies and service providers to make their products more secure.
Default settings for software products sold to consumers should be at the
highest level of security. You wouldn’t build a swimming pool in the center
of town and not put a fence around it. Basically, that’s just what the
software companies are doing.
Although security firms have financial incentives for promoting security
issues, for the average corporation, the benefits of spending millions of
dollars to bolster security in networks aren’t immediately obvious, thus
making them slow to act. If you have a choice of spending five million dollars
on getting 693,000 new customers, or five million dollars on better serving
the ones you already have, that’s a difficult value proposition. Most
companies would take the additional customers. The severity of attacks
could get worse, though, and businesses would be wise to make
precautionary investments now. Most businesses have been lucky so far.
The Criminal Café in Cyberspace:- Not long ago, if a terrorist wanted to
cause a blackout in, say, New York, it would have taken some work. He or
she might have packed a truck with explosives and sent it careening into a
power plant. Or he or she might have sought a job as a utility worker to
sabotage the electrical system.
In a closed briefing to Congress, the CIA reported that at least a dozen
countries, some hostile to America, are developing programs to attack other
nations’ information and computer systems. China, Cuba, Russia, Korea,
and Iran are among those deemed a threat, sources later declared.
Reflecting official thinking no doubt, the People’s Liberation Daily in China
noted that a foe of the United States only has to mess up the computer
systems of its banks by high-tech means “Eligible Receiver” culminated
when three two-person “red teams” from the National Security Agency
used hacker techniques that can be learned on the Internet to penetrate
DoD computers. After gaining access to the military’s electronic message
systems, the teams were poised to intercept, delete, and modify all messages
on the networks. Ultimately, the hackers achieved access to the DoD’s
classified network (see sidebar, “Espionage By Keystroke?”) and, if they
had wished, could have denied the Pentagon the ability to deploy forces. In
another exercise, the DoD found that 74% of test attacks on its own systems
went undetected.
Sabotage:- Sophisticated hackers, meanwhile, are breaking into sensitive
Chinese computers (see sidebar, “Cyberspace Incidents on the Rise in
China”). Members of the Hong Kong Blondes, a covert group, claim to have
gotten into Chinese military computers and to have temporarily shut down a
communications satellite last year in a hacktivist” protest. The ultimate aim
is to use hacktivism to ameliorate human rights conditions.
The Super Computer Literate Terrorist:- During the next 20 years, the
United States will face a new breed of Internet-enabled terrorists, super
computer literate criminals, and nation-state adversaries who will launch
attacks not with planes and tanks, but with computer viruses and logic
bombs. America’s adversaries around the world are hard at work
developing tools to bring down the United States’ private sector
infrastructure. The United States faces an increasingly wired but dangerous
world, as evidenced by the following:
1. Many countries have programs to develop cyberattack technologies and
could develop such capabilities over the next decade and beyond.
2. The Unites States, Russia, China, France, and Israel are developing
cyberarsenals and the means to wage all-out cyberwarfare.
3. Terrorist groups are developing weapons of mass destruction.
4. Russia has become a breeding ground for computer hackers. The Russian
equivalent of the U.S. National Security Agency and organized crime groups
recruit the best talent.
UNIT - IV
SYLLABUS:- Information warfare: Arsenal – Surveillance Tools – Hackers
and Theft of Components – Contemporary Computer Crime-Identity Theft
and Identity Fraud –Organized Crime &Terrorism – Avenues Prosecution
and Government Efforts –Applying the First Amendment to Computer
Related Crime-The Fourth Amendment and other Legal Issues.
ARSENAL:-
Arsenal is the only weapon available to the weak the terror.
Online terror sites concentrate on recruitment and propaganda platforms
which deny their strength and their violence Instead, the groups emphasize
their own weakness and the vulnerability of the community.
While not openly stated, this approach implies that terroris actions are all
that is available in their depleted arsenal.
Digital evidence can be any information stored or transmitted in digital
form. All digital evidence is printed out to be presented in court.
► Groups such as the Scientific Working Group on Digital Evidence
(SWGDE) and the International Organization on Computer Evidence
(IOCE) set standards for recovering, preserving, and examining digital
evidence.
► The general tasks investigators perform when working with digital
evidence:
► Identify digital information or artifacts that can be used as evidence.
Collect, preserve and document evidence.
► Analyze, identify and organize evidence.
► Rebuild evidence or repeat a situation to verify that the results can be
reproduced reliably.
► Collecting computers and processing a criminal or incident scene must be
done systematically.
► To minimize confusion, reduce the risk of losing evidence and avoid and
avoid damaging evidence, only one person should collect and catalog digital
what DNA sequences are and how they may be used. Most forensic
scientists and crime lab technicians use what’s called DNA profiling to
identify criminals and victims using trace evidence like hair or skin samples.
In cases where those samples are highly degraded, however, they often turn
to the more powerful DNA sequence, which allows them to analyze old bones
or teeth to determine the specific ordering of a person’s DNA nucleobases,
and generate a “read” or a unique DNA pattern that can help identify that
person as a possible suspect or criminal.
8. Forensic Carbon-14 Dating: Carbon dating has long been used to
identify the age of unknown remains for anthropological and archaeological
findings. Since the amount of radiocarbon (which is calculated in a Carbon-
14 dating) has increased and decreased to distinct levels over the past 50
years, it is now possible to use this technique to identify forensic remains
using this same tool. The only people in the forensic science field that have
ready access to Carbon-14 Dating equipment are forensic scientists, usually
with a Master’s Degree in Forensic Anthropology or Forensic Archaeology.
9. Magnetic Fingerprinting and Automated Fingerprint Identification
(AFIS) : With these forensic technologies, crime scene investigators, forensic
scientists and police officers can quickly and easily compare a fingerprint at
a crime scene with an extensive virtual database. In addition, the
incorporation of magnetic fingerprinting dust and no touch wanding allows
investigators to get a perfect impression of fingerprints at a crime scene
without contamination. While using AFIS requires only an Associate’s
Degree in Law Enforcement, magnetic fingerprinting usually requires a
Bachelor’s Degree in Forensic Science or Crime Scene Investigation.
10. Link Analysis Software for Forensic Accountants: When a forensic
accountant is trying to track illicit funds through a sea of paperwork, link
analysis software is an invaluable tool to help highlight strange financial
activity. This software combines observations of unusual digital financial
transactions, customer profiling and statistics to generate probabilities of
illegal behavior. In order to accurately understand and interpret findings
all other areas of computing, where speed is the main concern, in computer
forensics the absolute priority is accuracy. One talks of completing work as
efficiently as possible, that is, as fast as possible without sacrificing
accuracy.
Lack of Reporting: - Although estimates vary, most experts agree that the
vast majority of Fortune 500 companies have been electronically
compromised to the tune of at least $10 billion/year. However, early studies
indicated that only 17 percent of such victimizations were reported to law
enforcement authorities (Center for Strategic and International Studies,
1998). At the same time, number of reported incidents handled by Carnegie-
Mellon University (CERT–Computer Emergency Response Team) has
increased from 1,334 in 1993 to 4,398 during the first two quarters of 1999
(U.S. General Accounting Office, 1998). It does appear that reporting is
getting better; a survey of 521 security personnel from American companies,
financial institutions, universities and government agencies revealed that 32
percent of respondents reported electronic crime to law enforcement. This
represented an increase of 15 percent of the previous study. However,
computer intrusion is still vastly underreported.
Traditional Problems Associated with Computer Crime: - Individuals
seeking a crime have always displayed a remarkable ability to adapt to
changing technologies, environments, and lifestyles. This adaptability has
often placed law enforcement at a disadvantage, struggling to keep up with
criminal innovations. This trend has proven to be true in contemporary
society. Fortunately, much computer-related crime involves non-specialist
users (e.g., child pornography, drug dealers, harassment, etc.). In fact, the
earliest computer crimes were characterized as non-technological specific.
Theft of computer components and software piracy were particular favorites.
Hacking and technologically complicated computer crime came later.
Although the advent of technology has vastly changed the modus operandi
of certain criminal elements throughout history, current advances have
changed the very physical environment in which crime occurs.
Lack of Reporting:- Although estimates vary, most experts agree that the
vast majority of Fortune 500 companies have been electronically
compromised to the tune of at least $10 bil- lion/year. However, early
studies indicated that only 17 percent of such victim- izations were reported
to law enforcement authorities (Center for Strategic and International
Studies, 1998). At the same time, number of reported incidents handled by
Carnegie-Mellon University (CERT–Computer Emergency Response Team)
has increased from 1,334 in 1993 to 4,398 during the first two quarters of
1999 (U.S. General Accounting Office, 1998). It does appear that reporting is
get- ting better; a survey of 521 security personnel from American
companies, financial institutions, universities and government agencies
revealed that 32 percent of respondents reported electronic crime to law
enforcement. This represented an increase of 15 percent of the previous
study. However, computer intrusion is still vastly underreported.
Lack of Resources:- Although computer intrusions have proven to be
problematic within the corpo- rate world, their unwillingness or inability to
effectively communicate with judi-cial authorities has led to an increase in
computer crime. Unfortunately, law en- forcement and corporate entities
desperately need to cooperate with one another. Unlike their civil service
counterparts, the business communities have the re- sources (both financial
and legal) necessary to effectively combat computer crimes. First, these
companies, through their system administrators, have far more leeway in
monitoring communications and system activities, and they have the ability
to establish policies which enable wide-scale oversight.
Jurisprudential Inconsistency:- Unfortunately, the Supreme Court has
remained resolutely averse to deciding matters of law in the newly emerging
sphere of cyberspace. They have virtually denied cert on every computer
privacy case to which individuals have appealed, and have refused to
determine appropriate levels of Fourth Amendment protections of
individuals and computer equipment. As such, the country is remarkably
divided on fundamental elements of law establishing a legality standard of
behavior in one jurisdiction which negates or supersedes another.
Defining Terrorism:- The word “terror” comes from the Latin term terrere,
which is defined as“to arouse fear.” Although individuals and organizations
sought to arouse fear in ancient civilizations, the current etymology of the
term is probably traced to Robespierre’s “the Terror,” which immediately
followed the French Revolution.2 Etymological origins aside, no universal
definition of terrorism exists. Rather, individual and social definitions are
influenced by a variety of characteristics, including individual politics,
ideologies, national original, theology or organizational agenda. As a result,
definitions may vary by region, state or nation.
According to the United Nations Office on Drugs and Crime, there is no
international definition for terrorism. Although attempted a number of
times, consensus among all member states has not been achieved.
Below is a sampling of traditional definitions:
Government Definitions:-
League of Nations Convention (1937) - all criminal acts directed against a
State and intended or calculated to create a state of terror in the minds of
particular persons or a group of persons or the general public.
UN Resolution Language (1994) - criminal acts intended or Calculated to
provoke a state of terror in the general public, a group of persons or
particular persons for political purposes are in any circumstance
unjustifiable, whatever the considerations of a political, philosophical,
ideological, racial, ethnic, religious or other nature that may be invoked to
justify them.
U.S. Department of Defense (2007) - the calculated use of unlawful
violence or threat of unlawful violence to inculcate fear; intended to coerce
or to intimidate governments or societies in the pursuit of goals that are
generally political, religious, or ideological
Academic Definitions:-
Schmid and Jongman (1998) - Terrorism is an anxiety-inspiring method of
repeated violent action, employed by (semi-) clandestine individual, group or
state actors, for idiosyncratic, criminal or political reasons, whereby—in
contrast to assassination— the direct targets of violence are not the main
crime, the commission was the first of its kind to recognize differences
between traditional crimes and criminals and the emerging pattern of
criminal behavior perpetrated by organized criminal groups. They found that
such entities were unique in that they resembled an independent society of
sorts, with systemized tasks and practices, unique traditions and rituals,
and distinctive jargon. These findings were expanded upon by the
Wickersham Commission of 1929. This commission, designed to evaluate
the impact of prohibition, found that the organization of criminal activity
surrounding prohibition was actually created by it. (Unfortunately, the
structure that was created during and flourished throughout the period did
not end with the repeal of the Eighteenth Amendment, as profits from
bootlegging had been utilized to create additional criminal markets.) As with
the recommendations of its predecessor, the admonitions put forth by the
Wickersham Commission were largely ignored until the 1950s, and
organized crime continued on its path of organizational sophistication and
criminal maturation.
In 1957, a string of gangland murders and the discovery of a meeting
of top echelon underworld figures in Apalachin, New York, propelled the
Italian mafia into the national spotlight. Such events served as an impetus
for government scrutiny and law enforcement activity. At that time, the
Kefauver Committee, which had been in existence since 1950, increased
their efforts to evaluate the connection of organized crime to gambling.
In addition, the committee expanded their original focus to include a
plethora of other organized criminal activities. Headed by Senator Estes
Kefauver, the committee transfixed the American public as they televised the
testimony of over 600 witnesses.
Contemporary definitions of organized crime must include the
following characteristics:
1. Structure and hierarchy - Virtually all organized crime groups are
characterized by recognition of responsibility, task assignment, and
leadership. Whether formally appointed or elected, each organized crime
groups has a system of interrelated positions specifically designed to
causes loss of more than $5,000 within a year to one or more persons; (2)
modifies or impairs, or potentially modifies or impairs.
The medical examination, diagnosis, treatment, or care of one or more
persons; (3) causes physical injury to a person; or (4) threatens public
health 1030(e)(8).
• Section 1030(a)(5) generally governs access without authority (outsiders).
• Section 1030(a)(5)(B) charges the individual who intentionally accesses a
protected computer and, as a result of such conduct, recklessly causes
damage as guilty of a felony.
• Section 1030(a)(5)(C) charges the individual who intentionally accesses a
protected computer and, as a result of such conduct, causes damage as
guilty of a misdemeanor when it cannot be shown that the damage caused
was either intentional or reckless.
• Section 1030(a)(6) prohibits trafficking in passwords, information or
devices through which unauthorized access may result, if such trafficking
affects interstate or foreign commerce or is a government computer—aimed
primarily at hackers, and underground hacking boards.
• Section 1030(a)(7) involves extortion through threats to damage a
protected computer (this has been utilized against a variety of individuals
who have threatened to exploit holes in security systems if their demands
are not met).
(A) name, social security number, date of birth, official State or government
issued driver’s license or identification number, alien registration number,
government passport number, employer or taxpayer identification number;
(B) Unique biometric data, such as fingerprint, voice print, retina or iris
image, or other unique physical representation;
(C) Unique electronic identification number, address, or routing code; or
(D) Telecommunication identifying information or access device.
The Financial Modernization Act of 1999:-
Financial Modernization Act (FMA) was enacted to promote greater
accountability of an provide civil remedies against corporate America. Also
known as the Gramm Leach-Blile Act or GLB for short, the act includes
provisions to protect consumers’ personal financial information held by
financial institutions.
Fair and Accurate Credit Transactions Act (FACTA) 2003:-
Major Provisions to FACTA
• Free Credit Report—Consumers may avail themselves of one free credit
report from each of three largest credit reporting agencies (Equifax,
Experian, TransUnion). This provision encourages consumers to regularly
monitor their credit reports, therefore allowing the discovery of unlawful
activity much more quickly. Initially, the provision was ineffective, as the
process was not streamlined.
Consumers may now request their free copies through
www.annualcreditreport.com. However, it is not recommended to request
and access individual reports online. Ironically, the FTC has filed at least
one suit against, and issued several warnings to, various imposter sites
designed to steal your personal information.
• Fraud Alerts:- Consumers have the right to create alerts on their credit
files, indicating that they have been the victim of identity theft and that
some information included in the report may be based on the victimization.
Such alerts must be attached to the credit file and provided to all entities
requesting data. In addition, credit reporting agencies must exclude such
accounts from those used for marketing purposes by third parties and
provide additional free credit reports to consumers who have initiated the
alert process. In files containing alerts, businesses seeking to extend credit
are required to contact the consumer directly or to take other reasonable
steps to authenticate the applicant. These actions are designed to minimize
the potential costs associated with the theft by hampering the acquisition of
additional credit and by encouraging verification of identity by potential
creditors.
• Active Duty Alerts:- FACTA also contains special provisions for
individuals actively performing military duty. Requires credit reporting
agencies to place an active duty alert within a credit file of an individual
actively serving in the military. In addition, it also provides for an automatic
two-year “opt out” from lists provided to third parties.
• Truncation of Credit/Debit Account Numbers:- FACTA prohibits
merchants from putting any but the last five digits of a credit card number
on customer receipts. This is designed to minimize the effectiveness of
dumpster diving by limiting the amount of information printed on a receipt.
As a result, many dumpster divers have modified their mods operandi to
focus exclusively on manually imprinted receipts which are often used by
small businesses or roadside merchants.
• Truncation of Social Security Numbers:- Like the previous provision,
FACTA requires credit reporting agencies to exclude the first five digits of
consumer social security numbers from their disclosures upon request.
• One-Call Fraud Alerts and Enhanced Victims’ Resolution Process:-
FACTA creates a national system of fraud detection and alerts to increase
the ease of incident reporting and protection of credit standings. Known as
“one-call fraud alerts,” the system allows consumers to generate a
nationwide fraud alert with one phone call.
• Mandates to Card Issuers to Investigate Changes of Address and
Requests for New or Additional Cards: - It requires all creditors to send
notification of changes to both the old and new addresses. It is intended to
quickly alert victims.
accounts from those used for marketing purposes by third parties and
provide additional free credit reports to consumers who have initiated the
alert process. In files containing alerts, businesses seeking to extend credit
are required to contact the consumer directly or to take other reasonable
steps to authenticate the applicant.
These actions are designed to minimize the potential costs associated with
the theft by hampering the acquisition of additional credit and by
encouraging verification of identity by potential creditors.
• Active Duty Alerts—FACTA: - It also contains special provisions for
individuals actively performing military duty. Requires credit reporting
gencies to place an active duty alert within a credit file of an individual
actively serving in the military.
In addition, it also provides for an automatic two-year “opt out” from lists
provided to third parties.
Truncation of Credit/Debit Account Numbers: - FACTA prohibits
merchants from putting any but the last five digits of a credit card number
on customer receipts. This is designed to minimize the effectiveness of
dumpster diving by limiting the amount of information printed on a receipt.
As a result, many dumpster divers have modified their modus operandi to
focus exclusively on manually imprinted receipts which are often used by
small businesses or roadside merchants.
• Truncation of Social Security Numbers: - Like the previous provision,
FACTA requires credit reporting agencies to exclude the first five digits of
consumer social security numbers from their disclosures upon request.
• One-Call Fraud Alerts and Enhanced Victims’ Resolution Process: -
FACTA creates a national system of fraud detection and alerts to increase
the ease of incident reporting and protection of credit standings. Known as
“one-call fraud alerts,” the system allows consumers to generate a
nationwide fraud alert with one phone call.
• Mandates to Card Issuers to Investigate Changes of Address and
Requests for New or Additional Cards: - It requires all creditors to send
the discovery of the violation or five years after the date of the violation itself,
whichever is earlier.
• Additional Efforts to Protect Personal Information:- Social security
numbers are especially attractive to identity thieves, as they are
permanently assigned to American citizens. Traditionally, they could be
easily obtained through perusal of public records, where they are
prominently displayed on various documents like bankruptcies, tax liens,
civil judgments, real estate transactions, voter registrations, and the like.
• Drivers Privacy Protection Act: - Prohibits the disclosure of SSNs and
other personal information from a motor vehicle record in any situation not
expressly permitted under the law. Permissible purposes include the
following:
1. The use by a government agency in carrying out its function;
2. In connection with motor vehicle or driver safety and theft (i.e., emissions,
alterations, recalls, advisories, and research activities);
3. The use in the normal course of business to prevent fraud and verify the
accuracy of information submitted or in the recovery of a debt;
4. The use in legal or arbitral proceedings; and
5. Any other use specifically authorized by state laws in regard to the
operation of a motor vehicle or public safety.
Federally Funded Initiatives and Collaborations:-
This group was originally tasked with providing an analysis of legal and
policy issues involving the Internet for criminal behavior. More specifically,
they were charged to evaluate the following:
1. The extent to which existing federal laws are sufficient to address
unlawful conduct via the Internet (provide a framework for analyzing policy
and legal responses);
2. The extent to which new technologies or legal authorities may be needed
to investigate and prosecute Internet crime (i.e., the development of new
tools and formulating training strategies); and
UNIT – V
Syllabus:- Computer forensic cases: Developing Forensic Capabilities –
Searching and Seizing Computer Related Evidence –Processing Evidence
and Report Preparation – Future Issues.
characteristics (e.g., size and number of suspect drives, amount of data) and
departmental resources.
b. Color scanner:- Used to record potential evidence which may not
be seized.
c. Color printer and an assortment of computer paper:- used to
capture potential evidence residing in print buffers in those cases where on-
scene printers are not included w thin the specifications of the applicable
warrant. Printers may also be used to print additional forms, labels, and the
like.
3. Antivirus software:- used for the documentation and validation of
suspect machines and the prevention of infection of forensic machines.
4. Imaging software:- used for the preservation of the original evidence. As
mentioned previously, all forensic analysis should be conducted on the
forensic image, ensuring the integrity of the suspect data.
5. Application software.
6. Forensic software:-used for on-site evidence analysis (discussed in
greater detail in the previous chapter).
a. Viewers enable investigators to quickly scan the contents of large
numbers of computer files, providing, among other things, a rapid
mechanism for identification of criminal contraband.
b. Text editors enable investigators to quickly search for keywords
applicable to the current investigation.
c. Hex editors enable investigators to view files in hexadecimal
formats and quickly search for files which may have been intentionally
manipulated or which have been erased or deleted.
d. Password crackers enable investigators to circumvent many
security measures employed by the suspect.
e. Verification software is used to demonstrate the validity of the
imaged drive.
f. Time/date programs verify the system time on the suspect
machine.
✓ This will prevent data corruption from previous use and data
contamination from destructive programs.
Non-Windows Operating Systems
✓ Although most forensic investigations on personal computers are
conducted on Windows platforms, there are occasions when other
operating systems are present.
✓ Unfortunately, many local agencies may not have the resources to
process and analyze such data and may have to rely upon outside
experts.
✓ The two most common non-Windows operating systems relevant to
computer forensics are Macintosh and Unix/Linux.
Macintosh Operating System
The Macintosh operating system was designed by Apple computers
and is currently used by Macintosh computers bearing the Apple logo.
Although contemporary users are more familiar with Windows products,
• Forensic Toolkits
1. Black Bag Technologies Mac Forensic Software is a
comprehensive toolkit designed for Mac OS X. The suite is a one-stop
shop for most investigations and includes imaging, recovery, and analysis
tools. The 19 utilities contained within the package include provisions for
text searching, directory browsing, image viewing, examination of file
headers and metadata, and data segmentation.
2. MacForensicsLab is similar to Black Bag’s suite of tools. Operating
within a self-contained environment, it has additional utilities which
provide for automatic note taking and reporting. Thus, users may
prepare comprehensive professional reports for courtroom presentation.
Finally, the program provides powerful search tools. Investigators can
employ string searches to identify credit card and social security
numbers or skin-tone searches to identify pornographic material.
Linux/Unix Operating Systems
Below is a sampling of files which may contain criminal evidence:
• /etc/passwd - this file contains information on every account
created on the suspect machine. This information includes the
following:
1. Account ID
2. Encrypted password
3. Numeric UserID (UID)
4. Numeric GroupID (GID)
5. Account information (typically the user’s name)
6. Home directory
7. Login shell
• /etc/shadow - If the installation is configured to use shadow
passwords, this file would contain the encrypted password and
associated user account information.
This file is accessible via root privileges only. An asterisk symbol (*)
serves as a placeholder for the encrypted password. Information
regarding password management is also contained herein.
✓ At the same time, the default hibernation mode of such devices may
prove useful to investigators as processes and applications remain
active even on idle devices.
✓ Finally, the handheld market is characterized by product cycles that
are far shorter than traditional computer technology.
✓ As a result, forensic tools should be chosen carefully, and vendors
which have demonstrated a history of innovation and product
adaptation should be strongly considered
Navigation Systems:
✓ The current emphasis on consistent accountability via mobile
communications has been mirrored by an increasing demand for
devices that maximize personal efficiency and time management.
✓ Toward this end, navigation systems allow individual users to avoid
traffic, identify fastest destination routes, and eliminate unnecessary
detours. In addition, they allow corporations to monitor employees’
use of company resources.
✓ Coupled with these advantages are falling prices as vendors compete
for market share.
✓ As a result, the popularity of both in-dash and portable units has
surged internationally, and millions of individuals across the globe
use the devices daily.
✓ Fortunately for law enforcement, such technological dependence has
resulted in a new avenue for evidence acquisition in criminal
investigations.
✓ More specifically, they contain the following data:
• Ephemeris data - This information contains the precise
location of the satellite and the locations of all other satellites in
the system.
• Almanac data - This information includes the time and date of
signal transmission and the operational status of the satellite at
the time of transmission.