Laws and Legal issues

advertisement
Chapter 1
Introduction to
Computer Forensics
Basic Forensic Methodology
The three As:
-- Acquire
-- Authenticate
-- Analyze
Basic Forensic Methodology
Step 1. Acquire the Evidence
Investigator’s big initial decision:
-- Let the computer continue to
run?
-- Pull the power plug from the
back?
-- Perform the normal
administrative shutdown
process?
Examination of a Computer System
--Ideal way to examine system and maintain
defensible evidence: Freeze it and examine a
copy of the original data
--Most real examinations, however, involve
tradeoffs between quality and convenience
--An aim is to avoid hostile code (malware)
Methods of Protecting Evidence and Avoiding
Hostile Code
Method 1. Use a dedicated forensic workstation to
examine a write-protected hard drive or image of
suspect hard drive.
Advantages:
- No concern about validity of software or hardware
on suspect host.
- Produces evidence most easily defended in court.
Disadvantages:
- Inconvenient and time-consuming.
- May result in loss of volatile information.
Methods of Protecting Evidence and Avoiding
Hostile Code
Method 2. Boot the system using a verified, writeprotected floppy disk or CD with kernel and tools.
Advantages:
- Convenient and quick.
- Evidence is defensible if suspect drives are
mounted as read-only.
Disadvantages:
- Assumes that hardware has not been compromised
(which is rare).
- May result in loss of volatile information.
Methods of Protecting Evidence and Avoiding
Hostile Code
Method 3. Build a new system containing an image of
the suspect system and examine it.
Advantage:
- Completely replicates operational environment of
suspect computer, without running the risk of
changing its information.
Disadvantages:
- Requires availability of hardware that is identical to
suspect computer.
- May result in loss of volatile information.
Methods of Protecting Evidence and Avoiding
Hostile Code
Method 4. Examine the system using external media
with verified software on it.
Advantages:
- Convenient and quick.
- Allows examination of volatile information.
Disadvantages:
- If a kernel is compromised, results may be
misleading.
- External media may not have every necessary
utility on it.
Methods of Protecting Evidence and Avoiding
Hostile Code
Method 5. Verify the software on the suspect system, and
then use the verified local software to conduct
examination.
Advantages:
- Requires minimal preparation.
- Allows examination of volatile information.
- Can be performed remotely.
Disadvantages:
- Lack of write-protection for suspect drives makes
evidence difficult to defend in court.
- Finding sources for hash values and verifying the
local software requires a minimum of several hours,
unless Tripwire was used ahead of time.
Methods of Protecting Evidence and Avoiding
Hostile Code
Method 6. Examine the suspect system using the
software on the suspect system (without verifying
the software).
Advantages:
- Requires least amount of preparation.
- Allows examination of volatile information.
- Can be performed remotely.
Disadvantages:
- Least reliable method.
- This is exactly what cyber hackers are hoping
you will do.
- Often a complete waste of time.
Computer Forensics: Basics
Class 2
Computer/Technology Law
Learning Objectives
• At the end of this module you will be able to:
– Describe the various major world legal systems
– Explain the differences between civil and criminal law
– Explain the various US legislation and regulations that
impact technology
– Describe the fundamental difference between the wire
tap act and ECPA
Legal Systems in North
America
• Common Law System
– Major important categories include:
• Criminal Law
• Civil Law
• Administrative or Regulatory Law
Legal Systems in North
America
• Criminal Law
– Individual conduct that violates government laws that
are enacted for the protection of the public.
– Violations of criminal law regarding computer crimes
can lead to a variety of punishments, including
imprisonment, financial penalty, loss of right to work
with computers, etc.
Legal Systems in North
America
• Civil or Tort Law
– Wrong against individual or business that results in
damage or loss.
– Violations of civil law regarding computer crimes can
lead to financial restitution or compensatory
damages. There is no prison time.
Legal Systems in North
America
• Administrative or Regulatory Law
– Standards of performance and conduct expected by
government agencies from organizations, industries,
and certain officials or officers.
•
•
•
•
Banks
Insurance companies
Stock markets
Food and drug companies
Intellectual Property Laws
• Intellectual Property typically involves at least four
types of laws:
–
–
–
–
Patent
Trademark
Copyright
Trade Secrets
• One application in information security is determining
the legal protections for sensitive information.
Intellectual Property Laws
• Patent
– Grants owner a legally enforceable right to exclude
others from practicing the invention covered.
– Protects novel, useful, and non-obvious inventions.
Intellectual Property Laws
• Trademark
– Any word, name, symbol, color, sound, product
shape, device, or combination of these that are
used to identify goods and distinguish them from
those made or sold by others.
Intellectual Property Laws
• Copyright
– Covers the expression of ideas rather than the ideas
themselves - “original works of authorship”
• Trade Secret
– Proprietary business or technical information that is
confidential and protected as long as the owner takes
certain security actions.
Criminal Law
What is a Computer Crime?
• Computer Assisted Crime:
Criminals activities that are not unique to computers, but merely
use computers as tools to assist the criminal endeavor (e.g.,
fraud, child pornography).
• Computer Specific or Targeted Crime:
Crimes directed at computers, networks and the information
store on these systems (e.g., denial of service, sniffers,
attacking passwords).
• Computer Incidental:
The computer is incidental to the criminal activity (e.g., customer
lists for traffickers).
So What Are The Criminal Laws?
• International
– EoC Convention on Cybercrime
• Federal
– Computer Fraud and Abuse Act, 18 USC 1030
– Electronic Communications Privacy Act, 18 USC
• Wiretap Act, 18 USC 2511
• Stored Communications Act
– Patriot Act (USAPA)
– Digital Millennium Copyright Act
– Child Pornography, 18 USC 2252A
– Criminal Copyrights, 18 USC 2319 & 17 USC 506(a)
– Criminal Trademark, 18 USC 2320
CoE Convention on Cybercrime
• November 23, 2001, the United States and 29 other countries signed
the Council of Europe Cybercrime Convention,
• the first multilateral instrument drafted to address the problems
posed by the spread of criminal activity on computer networks.
• The Cybercrime Convention will require parties to:
– establish laws against cybercrime,
– to ensure that their law enforcement officials have the necessary
procedural authorities to investigate and prosecute cybercrime offenses
effectively,
– to provide international cooperation to other parties in the fight against
computer-related crime.
Computer Fraud & Abuse Act
• Passed in 1984 to protect classified information on
federal government computers
• Protect financial records & credit information on
government & financial institution systems
• Amended in 1986 to extend to federal interest
computer systems
• Amended in 1996, federal interest replaced with
protected system (all computers involved in
interstate or foreign commerce).
• Covers unauthorized access and unauthorized use
Electronic Communications Privacy Act
(ECPA)
• Passed in 1986
• Extended privacy to
–
–
–
–
–
Radio paging devices
Electronic mail
Cell phones
Private communications carriers
Computer transmissions
• Title I covers Wiretap Act and Title II Stored
Communications Act
ECPA
• Provide privacy protection for new technology
• Designed to cover both government surveillance
and recreational eavesdropping by private parties
–
–
–
–
–
–
Electronic mail
All communications carriers
Cellular phones
Radio paging
Customer records
Satellite transmissions
Wire Tap Act
• 18 U.S.C. 2511
– Prohibits the interception and disclosure of
• wire
• Oral
• Electronic communication
– The prohibitions are absolute, subject only to the specific
exemptions in Title III.
– Unless an interception is specifically authorized, it is
impermissible and, assuming existence of the requisite
criminal intent, in violation of 18 U.S.C. § 2511.
– Covers the illegal interception in real time!
Stored Communications Act
• Covers the legal/illegal access to certain
stored voice and electronic communications!
• Famous Case
– Steve Jackson Games Inc. v. United States Secret
Service
ECPA
• Workplace privacy
– Under the ECPA an employer cannot monitor
employee telephone calls or electronic mail when
employees have a reasonable expectation of privacy.
– However, the Act does allow employer eavesdropping
if employees are notified in advance or if the employer
has reason to believe the company's interests are in
jeopardy.
Patriot Act (USAPA)
• Passed Oct 26 2001
• Expanded powers to law enforcement &
intelligence agencies
• Protected computer now includes foreign
computers
• Covers activities that touch the US backbone
(approx. 90% of all Internet traffic uses backbones
in the US)
• Sunset clauses on the expanded powers
(intercepts, Pen & traps etc.)
• Patriot Act II ???
DMCA
• Effective 1998
• The Act is designed to implement the treaties
signed in December 1996 at the World
Intellectual Property Organization (WIPO)
Geneva conference
DMCA
•
•
•
•
•
Makes it a crime to circumvent anti-piracy measures built into most
commercial software.
Outlaws the manufacture, sale, or distribution of code-cracking
devices used to illegally copy software.
Does permit the cracking of copyright protection devices,
however, to conduct encryption research, assess product
interoperability, and test computer security systems.
Provides exemptions from anti-circumvention provisions for
nonprofit libraries, archives, and educational institutions under
certain circumstances.
In general, limits Internet service providers from copyright
infringement liability for simply transmitting information over the
Internet.
Summary
• The US legal system is based on Common Law
– Criminal, Civil, Regulatory
• Civil Law (Electronic Discovery)
• Criminal
– Computer Assisted, Targeted, & Incidental
• Fed Legislation
– CFAA, Wire Tap, ECPA, Patriot, DMCA
– ECPA is for stored, Wire Tap is realtime
Computer Forensics: Basics
Law: Searches & Warrants
Learning Objectives
• At the end of this module you will be able to:
–
–
–
–
–
Explain the container analogy
Discuss basic issues related to search warrants
Describe warrant and warrantless search criteria
Explain the concept of Reasonable Expectation of Privacy
Compare and contrast the criteria for real-time interceptions
and access to stored data
– Explain when a warrant, subpoena, or other court order is
required to seize electronic evidence
– Critically analyze the impact of computer crime search and
seizure on 4th and 5th amendment rights.
The Container Analogy
Think of a computer file stored in a
computer as a paper file stored in a closed
container



Think of any electronic storage device
(a computer, a PDA, a cell phone,
a pager) as the closed cabinet
Looking through the device means
“opening” the closed container,
which is a search
Fourth Amendment is implicated
Felonies
2002
Fraud
Files
Cooked
Books
Exceptions to the Warrant
Requirement: Consent
Target can consent to a search, raising “scope of
consent” issues:
– Does consent include searching through electronic
storage devices?
– Test is, what would a reasonable person
listening
in to the exchange think?
– Very fact-specific and unpredictable
– Written consent forms should expressly include
computers and other electronic storage devices
Third Party Consent
Any private person who shares common authority or
control over the computer can consent to the search
(Matlock)
Target’s spouse? Usually
Target’s Parents? Maybe
Target’s co-workers? Maybe
Computer repairman? No
Government officials? No
Password protection probably defeats a claim of
common authority
Private Searches
Private third party may search files and show or tell
gov’t what she finds. Do you need a warrant to see it?
No, it’s a private search (Jacobsen). Under Jacobsen,
you can see what private person saw, but no more.
Use what private person saw to establish P.C. to get a
warrant
Very common in computer cases
Plain View
Plain view lets you seize what you lawfully see if
the incriminating nature of what you see is
immediately apparent (Horton)
Does not authorize an independent violation of a
REP
Courts differ on whether each file is closed
container (compare Carey (10th Cir.) with
Slanina (5th Cir.))
But, you can seize a computer temporarily
while you get a warrant (Hall).
Other Exceptions
Exigent Circumstances
If necessary to prevent destruction of evidence,
can seize computer without a warrant.
Pager cases
Can’t, however, search the seized computer without
a warrant if exigency is gone. A limited exception.
•Search Incident to Arrest
Permits “reasonable” search of the person and
electronic storage devices on his person at the
time of arrest
(e.g., pagers).
Special Case: Workplace
Searches
Private-sector rules are easy
Employee retains REP at work
unless stuff is “open to the world
at large”
Employer can consent to search
of employee’s space
Employer searches are usually
private searches
Public Employment Searches
Unique Reasonable Expectation of Privacy (REP)
test for government employees; O’Connor v. Ortega,
480 U.S. 709 (1987).
1) Is workspace to be searched “open to fellow employees or
the public”? OR
2) Are there “actual office practices and procedures . . . or
legitimate regulation” that permit search?
If so, then no REP; very different from private-sector
REP test.
Public Employment & Banners
This is a government
computer network. You have
no expectation of privacy in
your use of this computer.
Your use constitutes consent
to monitoring and disclosure
of the fruits of the monitoring.
The first question:
“Is there a banner or
written policy that
covers this?”
Your next line:
“Go find out.”
U.S. v. Simons, 206 F.3d 392
(4th Cir. 2000); US v.
Angevine, 281 F.3d 1130,
1134-35 (10th Cir. 2002)
Public Employment &
Work Related Searches
What if there is no banner?
The search will still be okay if it is “reasonable” in scope
and duration. (O’Connor)
In effect, another exception to warrant requirement.
Search must be work-related (e.g., workplace misconduct
investigation, or getting a file for work purpose); this is for
employers, not law enforcement.
Search must be justified at its inception, and reasonably
related in scope to the circumstances.
Mixed Motives Okay.
Examples of Collateral Damage
When an employee uses his company’s server to
commit a crime, seizing the entire server as an
“instrumentality” and shutting down the company.
When an ISP has child pornography on its servers,
removing the server, effectively shutting down the ISP
and denying law abiding users their Internet service.
When a kid uses the family PC to hack into NASA,
taking the PC even though it has the family’s tax and
accounting records on it.
Summary
• A computer system can be thought of as filing cabinet
(container)
• A computer file can be thought of as a file housed
inside the container
• What is the importance: Think 4th amendment
• Consent for search can be problematic
• Reasonable expectation of privacy is very important
• Exceptions: Plain view, exigent circumstance, incident
to an arrest
Further Reading
• http://www.cybercrime.gov/s&smanual200
2.htm
Download