SURVEY OF CYBER FORENSICS AND CYBER

advertisement
SURVEY OF
CYBER
FORENSICS
AND CYBER
SECURITY
IRA WILSKER
July 17, 2014
Be sure to follow
the Justice
Department
Guidelines
published in
“Searching and
Seizing
Computers and
Obtaining
Electronic
Evidence in
Criminal
Investigations”
which can be
found online
http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf
WARRANTS
If the equipment is seized
pursuant to a criminal
investigation, be absolutely
sure that a search warrant
has been issued prior to
any type of analysis unless
exigent circumstances,
consent, or other legal
requirements are met
Failure to have a proper and
timely issued warrant or
other exception may likely
render the computer and
anything found in it
inadmissible as evidence.
Follow proper protocols.
IF THE COMPUTER IS TURNED ON
WHEN ENCOUNTERED, DO NOT
TURN IT OFF OR UNPLUG IT.
FOLLOW ESTABLISHED PROTCOLS
FOR SAVING ANY DATA THAT MAY
BE STORED IN VOLATILE RAM
PRIOR TO ANY SHUT DOWN
IF THE COMPUTER IS OFF WHEN
ENCOUNTERED, DO NOT TURN IT
ON – FOLLOW APPROPRIATE
PROTOCOLS FOR A SECURITY
CHECK AND POSSIBLE REMOVAL
OF ANY FORMS OF HARD DRIVE,
SSD, FLASH MEMORY, OR OTHER
STORAGE DEVICE
BEWARE!
Suspect Computers May Be BOOBY-TRAPPED
with either destructive software that will significantly wipe
and destroy any data on the hard drive, or with EXPLOSIVES.
There are many documented cases of both.
It is COMMON for organized groups of PEDOPHILES and
CHILD PORNOGRAPHERS to have software “bombs” that will
automatically initiate a high grade wipe utility. These wipe
utilities my be initiated with a single keystroke, an icon, a
voice command, speech recognition, or other form of input.
There is serious debate in the forensics community as to
whether the power should be shut off at the time of a raid in
order to prevent the hard drive from being wiped; but this
may lead to the loss of volatile RAM. Many pedophiles use a
UPS to prevent the computer from being externally shut
down if the power is lost, thus allowing data destruction to
continue.
It is not unusual for drug dealers and terrorists to plant
EXPLOSIVES inside or in close proximity of the computer
case which can detonate if the case is moved, opened, hard
drive removed, or other common investigative processes
occur.
SOURCES:
http://cleaninternetcharity.com/2013/03/21/how-pedophiles-booby-trap-their-computers
http://www.jurispro.com/uploadArticles/Pelton-Destroyed.pdf
LEADING COMMERCIAL FORENSIC SOFTWARE PRODUCTS
UNIVERSALLY ACCEPTED AS VALID IN COURT
ENCASE
https://www.guidancesoftware.com
FORENSIC TOOLKIT (FTK)
http://www.accessdata.com/solutions/digital-forensics/ftk
OPEN SOURCE FORENSIC SOFTWARE
FREE, BUT NOT ALWAYS ACCEPTED IN COURT
AUTOPSY and THE SLEUTH KIT
http://www.sleuthkit.org
Digital Forensics Framework
http://www.digital-forensic.org
SOURCE:
http://www.justice.gov/criminal/cybercrime/docs/forensics_chart.pdf
THERE IS AN ORDERLY SEQUENCE WHICH MUST (SHOULD ) BE
FOLLOWED IN ORDER TO PROPERLY MEET THE LEGAL AND
TECHNICAL REQUIREMENTS FOR A PROPER CYBER FORENSIC
INVESTIGATION
TECHNOLOGY, LEGISLATION, and COURT RULINGS
ARE DYNAMIC AND EVER CHANGING
There is a necessity that cyber forensic investigators stay informed of
factors that can impact or influence their activities. Several resources are
available that should be frequently monitored for these changes.
http://www.swgde.org
THERE ARE ALSO SEVERAL OTHER EXCELLENT
RESOURCES THAT THE INVESTIGATOR SHOULD
UTILIZE IN ORDER TO BE AWARE OF CHANGES AND
TO STAY CURRENT WITH LEGAL AND OTHER ISSUES
http://www.hightechcrimecops.org
OTHER ONLINE RESOURCES WITH INFORMATION ON
CYBER FORENSIC TRENDS
http://publicintelligence.net
http://www.justice.gov/criminal/cybercrime
http://nc4.net/cybercop.php
https://cybercop.esportals.com
http://www.justnet.org/ect_coe/Pages/Home.aspx
http://www.htcia.org
http://www.infragard.net
CONTACT:
IRA WILSKER ira.wilsker@lit.edu
Download