Volonino-computerforensics

  • Uploaded by: Ankita
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Volonino-computerforensics as PDF for free.

More details

  • Words: 1,077
  • Pages: 27
Computer Forensics & Electronic Evidence Reconstructing what happened

06/18/09

PHIT 2005

1

Issues to think about… 

What’s Electronic Evidence (e-evidence) …& why is it important?



What’s Computer Forensics …& why is it growing so fast?



Where’s the crime scene?



What’s on your PC, PDA, cell, GPS, camera, …& what could they reveal?

06/18/09

2

More issues to think about… 

Enrollment in comp sci, info systems, & IT



Demand for CF & network intrusion (NI) investigators



Gov’t, accounting, & IT sectors need CF & NI investigators (outsourcing to other countries—no)



Pren-Hall will be offering a full series of books to help launch & support your InfoSec/CF program



Steal back students from digital media program

06/18/09

3



What’s Electronic Evidence …& why is it important?

06/18/09

4

1st Why is Evidence important? 

In the legal world, evidence is everything & the only thing



Evidence is used to establish facts



Evidence must be admissible in court or legal action



To be admissible, the investigator must follow proper procedure

06/18/09

5

E-evidence: Today's fingerprint & smoking gun Zacarias Moussaoui  20th hijacker in the 9/11 terrorist attacks against the U.S.  his laptop, 4 computers, and several email accounts ([email protected]) were searched for e-evidence http://www.cnn.com/2002/LAW/09/04/moussaoui.computer/index.html

FBI discovered that the 19 hijackers used Kinko's computers in various cities to gain access to the Internet to plan 9/11.

06/18/09

Zacarias Moussaoui passing through a London airport. [BBC]

6

11-digit computer code cracks the case 

It was neither a fingerprint nor physical evidence that led authorities to the woman suspected of strangling a mother-to-be & fetus-kidnapping. It was IP address 65.150.168.223



Within hours of the killing of Bobbie Jo Stinnett at her home, investigators searched her PC to find her killer.



Police zeroed in on Lisa Montgomery by searching computer records, examining online message boards and by tracing an IP address to a computer at her home.



The IP address in & of itself led the FBI to her home.



By analyzing e-evidence on the victim’s PC, authorities cracked the case in a matter of hours & rescued the premature baby. http://www.cnn.com/2004/US/12/18/fetus.found.alive/ http://www.eventhelix.com/RealtimeMantra/Networking/ip_routing.htm

 

06/18/09

7

Crime Investigations 

Crime investigations are searches for evidence— & e-evidence—to trace & reconstruct what happened. 

Digital profiling of crime suspects to trace who did what when.



Data stored on or created by hard-drives, email systems, cellular and handheld devices, or even TiVo reveal a lot about a person and tell a lot about that person’s friends, family, co-workers…

06/18/09

8

What is CyberCrime? 

A crime that involves computers, digital devices, or the Internet.  A computer is: • the target of an attack • the tool used in an attack • used to communicate or store data related to criminal activity

06/18/09

9

Computer Crime 

Easy to commit—too many vulnerable systems & gullible people



Crime without punishment—too often



Lots of media sensationalism & public apathy



06/18/09

Leaves digital trails

10

Types of Cyber Crime          

06/18/09

Unauthorized Access Denial of Service Extortion Theft Sabotage Espionage Computer Fraud Embezzlement Copyright Violation Cyber terrorism

   

    

Forgery and Counterfeiting Internet Fraud Spoofing or “Imposter Sites” SEC Fraud and Stock Manipulation Child Pornography Stalking & Harassment Credit Card Fraud & Skimming Identity theft Tsunami fraud

11

Technological progress is like an axe in the hands of a pathological criminal.

06/18/09

12

Issues to think about… 

What’s Computer Forensics …& why is it growing so fast?

06/18/09

13

What is Computer Forensics? A process of applying scientific & analytical techniques to computers, networks, digital devices, & files to discover or recover admissible evidence.

06/18/09

14

Who needs Computer Forensics?     

  

06/18/09

The Victim! Businesses and government Financial sector Law Enforcement Those involved in marital or employment disputes Anti-terrorist & National Security agencies Insurance Carriers Those in need of Data & Disaster Recovery 15

Issues to think about…



06/18/09

Where’s the crime scene?

16

Crime scene is where the evidence is 

Information: 95% of information created & worked on is only in electronic form.



Communication: Erosion of traditional paper-based communication.



Access: Explosion of mobile, multi-purpose devices with web access.

06/18/09

17

Types of Computer Forensics     

06/18/09

Disk (data) Forensics Network Forensics Email Forensics Internet Forensics Portable Device Forensics (flash cards, PDAs, Blackberries, email, pagers, cell phones, IM devices, etc.)

18

Disk Forensics 

06/18/09

Disk forensics is the process of acquiring and analyzing the data stored on some form of physical storage media.  Includes the recovery of hidden and deleted data.

19

Network Forensics 

Network forensics is the process of examining network traffic.  After-the-fact analysis of transaction logs  Real-time analysis via network monitoring • Sniffers • Real-time tracing

06/18/09

20

Email Forensics 

06/18/09

Email forensics is the study of source and content of electronic mail as evidence.  identifying the actual sender and recipient of a message, date/time it was sent.  Often email is very incriminating.

21

Tracking down Email Evidence Reading Email Headers http://www.stopspam.org/email/headers.html

How to Interpret Email Headers

http://help.mindspring.com/docs/006/emailheaders/

How do I get my email program to reveal the full, unmodified email? http://www.spamcop.net/fom-serve/cache/19.html

06/18/09

22

Internet Forensics 

06/18/09

Internet or Web forensics is the process of piecing together where and when a user has been on the Internet.  E.g., Scott Peterson, Michael Jackson

23

Source Code Forensics 

To determine software ownership or software liability issues.  

06/18/09

Review of actual source code. Examination of the entire development process, e.g., development procedures, documentation review, and review of source code revisions.

24

Issues to think about… 

What’s on your PC, PDA, cell, GPS, camera, …& what could they reveal?

06/18/09

25

Self-Evaluation

If your email, cellular devices, voice-mail, digital camera, faxes, or files were subject to search & discovery, do you think there’d be any incriminating evidence that you broke a law?

06/18/09

26

The Future of Computer Forensics

06/18/09



Computer forensics is now part of criminal investigations.



Crimes & methods to hide crimes are becoming more sophisticated.



Computer forensics will be in demand for as long as there are criminals and misbehaving people.



Will attract students and law professionals who need to update their skills. 27

More Documents from "Ankita"