Investigating Computer Crime

advertisement
Investigating Computer Crime
Professor Carsten Maple
University of Bedfordshire
8th February 2013
RCPsych Faculty of Forensic Psychiatry Annual Conference 2013
Why am I here?
Background



Computer Scientist – applicable computing
Co-author of UK Security Breaches Report
supported by SOCA and PCeU
A director of the National Centre for
Cyberstalking Research
Definition of Computer Crime

We restrict our definition to where the computer;
 is a target of a criminal activity
 is a tool to commit a criminal activity

Some add that it;
 is a repository of either direct or circumstantial evidence of the
crime

The term ‘cybercrime’ has gradually become a general synonym
for computer crime, as is ‘e-crime’, defined as; [+] ‘ the use of
networked computers or internet technology to commit of facilitate
the commission of crime’.

We will use computer crime in place of these definitions
+ACPO,
The Association of Chief Police Officers of England, Wales and Northern Ireland, e-Crime strategy,
http://www.acpo.police.uk/asp/policies/Data/Ecrime%20Strategy%20Website%20Version.pdf; 2009.
Types of Computer Crime
+Ali
Alkaabi et al, “Dealing with the Problem of Cybercrime, Digital and Forensics and Cyber Crime”, 2 nd Internal ICST Conference, ICDF2C
2010, Abu Dhabi, UAE, 2010
Computer Crimes Against the Person

As a result victims suffer (not necessarily a complete list):

Financial (theft of credentials through Phishing, Trojans, hacking customer databases)
Scams (eBay bogus auctions, fake online shops, letters (Nigerian, Russian brides))
Extortion (Ransomware, personal data theft)

Loss of Reputation
Impersonation (hacking of victim’s email, Facebook, Twitter, etc.)

.
Loss of Data (failed extortion scheme leading to destruction of data held as ‘hostage’)
Computer Crimes Against the Person….cont’d

Also suffer:

Loss of Employment
Scams (EBay bogus auctions, fake online shops, letters (Nigerian, Russian brides))
Extortion (Ransomware, personal data theft)

Loss of Freedom (victim’s IP address hijacked, used for criminal action and victim
incarcerated)

.
Loss of Physical Integrity (online predators)
Computer Crimes Against the Computer

As a result organisations suffer (again some examples):

Theft of Critical Data (intellectual property, customer base)
Theft of Credentials (phishing/social engineering, Trojans, IT system hack)
Paralysis of Production Tools (Botnet DDoS, software vulnerability, compromise of
SCADA)

Loss of Reputation
Trust among users (loss of confidence, defacement of company’s website)

Financial Loss
Online Extortion (DDoS blackmail, loss of share value)
Financial Cost of Computer Crime

Financial costs includes;
•
•
•
•
•
•
•
•
•
•
•
•
Costs in anticipation of cybercrime
Physical & virtual security measures
Compliance (PCI DSS, etc.,), insurance costs
Costs as a consequence of cybercrime
Business continuity, disaster recovery
Commercial exploitation of IP
Costs in response to cybercrime
Compensation payments to victims
Regulatory fines, legal costs
Indirect costs associated with cybercrime
Reputational damage
Expansion of the underground economy
+Cabinet Office, The cost of cyber-crime, A Detica report in partnership with the Office of Cyber Security and Information Assurance in the
Cabinet Office, Available at:, http://www.cabinetoffice.gov.uk/resourcelibrary/, 2011.
Financial Cost of Computer Crime….cont’d
+Cabinet
Office, The cost of cyber-crime, A Detica report in partnership with the Office of Cyber Security and Information Assurance in the
Cabinet Office, Available at:, http://www.cabinetoffice.gov.uk/resourcelibrary/, 2011.
Opportunities for Computer Crime
[4] Cabinet Office, The cost of cyber-crime, A Detica report in partnership with the Office of Cyber Security and Information Assurance
in the Cabinet Office, Available at:, http://www.cabinetoffice.gov.uk/resourcelibrary/, 2011.
UK Legislation

In the UK, most computer crime falls under offences covered by
one of three pieces of law:





Computer Misuse Act 1990
Communications Act 2003
Fraud Act 2006
Regulation of Investigatory Powers Act 2000
Victims of computer crime are more often than not affected by at
least one of the three acts listed above
Motives

The motives for computer crime:
 Financial Gain
 Extortion
 Reputation (Kudos)
 Revenge / Malicious Damage (disgruntled employee)
 Hacktivism / Sense of Justice (Annoymous, LulzSec)
 Cyber Warfare / Espionage (Stuxnet)
 Terrorism
Methods used in Computer Crime

The methods used in computer crime include:
 Use of available vulnerabilities (known weaknesses in software
apps)
 Denial of Service (DoS) (is stopping a system by sending
enormous IP packets that disables the system which cannot
answer each request)
 Back doors (also called ‘trap-doors’, used by programmers to
access systems quickly and easily by bypassing security
mechanisms)
 Logic bombs (program stays inactive in system until a specific
date or event occurs)
 Malware (‘malicious software’) (computer viruses, worms,
Trojan horses, rootkits, key loggers, spyware, adware, etc.)
 Social Engineering (phishing, spoofing, tailgating, shoulder
surfing, etc.)
Opportunities for Computer Crime
Cyberstalking example:

Stalking existed before the development of computer, internet or mobile
phone.

The motivation & techniques of stalkers have remained consistent over
time.

Tools stalkers use has changed over time.

They exploit technology in ways never envisioned or intended by the
creators [5]
 Surveillance, tracking and eavesdropping with commonly used
technology
 Location tracking devices attached to victim’s car
 Social networking
 Email communications

2011 Cyberstalking in the UK – An Analysis of the ECHO Pilot Survey
found that of those who reported being stalked electronically;
 83% were stalked through e-mail
 35% through instant messaging
 46% reported been stalked using a hidden camera to monitor their
actions
 10% reported that Global Positioning System (GPS) location tracking
technology was used to monitor their location
How NCCR advises on Cyberstalking





Prevention
Motivation
Means
Impact
Investigation
Types of attack
•
•
•
•
•
•
•
•
•
•
•
Identity theft – controlling victim’s credentials
Posting false profiles
Posing as the victim and attacking others
Discrediting in online communities
Discrediting victim in workplace
Direct threats through email/instant messaging
Constructing websites targeting the victim
Transferring attack to victim’s relatives
Use of the victim’s image
Provoking others to attack the victim
Following the victim in cyberspace
Attribution
Attacker
Victim
Communication Medium
Challenges in Investigating Computer Crime
‘‘we will never have enough law enforcement to deal with the extent of cybercrime out there’’
Charlie McMurdie, 2008 [+]
Technical




Legal



challenges:
Offenders can use software devices that do not require in-depth technical
knowledge, e.g.; Backtrack – Port Scanning, Cain and Abel – Password Cracking,
etc.
Attribution – Difficulty in tracing offenders and they can hinder investigation by
disguising their identity and employing Anti-Forensic techniques e.g.; TimeStomp,
MAC Spoofing, etc.
Few control instruments that can be utilised by law enforcement available on the
internet
Technical proficiency of perpetrators often exceeds the capability of the victims and
law enforcement
challenges:
Legislation and procedures can differ across international jurisdictions
A single crime scene can be compounded by the lack of any definitive jurisdiction or
consistent global legislation
No clear distinction between issues that are best dealt with through better regulation
and those that require law enforcement action
+McMurdie
C, The e-crime gap, Police Professional, December 11, 2008
Computer Forensics Approach
 Machine Learning Forensics
• Borrows techniques and technology from Computer Security domain for
Computer Forensics. Log Analysis (use of data mining algorithms to search
& correlate large log datasets)
• Mining Intrusion Detection Systems (IDS) collect multiple event log data
sources
 Live Digital Forensics
• Gathering data from a system during operation. Reveals open ports, active
network connections, memory resident malware, etc.
• Encrypted data could be unlocked as encryption key usually stored in RAM
 Distributed Digital Forensics
• Addresses problem of imaging very large datasets and helps alleviates I/O
bottlenecks
 Email Forensics
 Remote Forensics
Support for Successful Prosecution

UK instrumental in contributions to fight Computer Crime nationally
and internationally

ACPO (Association of Chief Police Officers)
• Leads the strategic and operational development of policing practice in
England, Wales and Northern Ireland

PCeU (Police Central e-Crime Unit)
• Investigates significant intrusions (‘hacking’) eg. Government, commercial
and academic
• DoS, BotNets, large scale phishing

CEOP (Child Exploitation and Online Protection)
• Tackles the sexual abuse and exploitation of children and young people
•
Virtual Global Taskforce (VGT)
• Partnership approach between police, industry and academia
Case Studies – Good and Bad Computer Crime Investigations

Good - PCeU
• Operation Pagode (investigation into underground forum for
cybercriminals. Saved £84m ‘ worth of harm’)
• Operation Dynamaphone (investigation into co-ordinated online banking
fraud and phishing attacks. Saved £5.5m ‘worth of harm’

Bad – Northfolk Constabulary
• Operation Cabin+ – (‘botched’ investigation into the hacking of data from
the Climate Research Centre (CRU) at the University of East Anglia (UEA)
nicknamed ‘Climategate’)
• Complex and costly investigation, involving Met’s Counter Terrorism
Command (CTC), National Domestic Extremism Team (NDET) , PCeU and
consultants in online security
• Investigation team ‘lacked expertise and resources to identify
perpetrators’
• Investigation started in 2009, 3 year time limit for prosecution expired in
2012
*http://www.met.police.uk/pceu/
+http://thinkprogress.org/climate/2012/07/19/546131/uk-police-cease-botched-investigation-into-stolen-uea-climate-scientists-emails/
Questions?
Download