• Tidak ada hasil yang ditemukan

Welcome Information Systems Security Association May 8, 2007

N/A
N/A
Protected

Academic year: 2018

Membagikan "Welcome Information Systems Security Association May 8, 2007"

Copied!
38
0
0

Teks penuh

(1)

Handling of Digital Evidence Pertemuan-3

Dosen :Kundang K Juman

(2)

Welcome

Welcome

Information Systems

Information Systems

Security Association

Security Association

May 8, 2007

May 8, 2007

FBI Update FBI Update

(3)

Agenda

Agenda

 Case UpdateCase Update

 FBI ActivitiesFBI Activities

(4)

FBI Cyber Investigations

FBI Cyber Investigations

 Computer Intrusion MattersComputer Intrusion Matters

 Innocent Images National InitiativesInnocent Images National Initiatives

 Intellectual Property Rights MattersIntellectual Property Rights Matters

(5)

Computer Intrusion Matters

Computer Intrusion Matters

 Financial InstitutionsFinancial Institutions

 Phishing schemesPhishing schemes  ManufacturingManufacturing

 Installation of Warez siteInstallation of Warez site  USB HacksawUSB Hacksaw

 UniversitiesUniversities

(6)

Innocent Images National Initiative

Innocent Images National Initiative

 Undercover OperationsUndercover Operations

 TravelersTravelers  DistributorsDistributors

(7)

Intellectual Property Rights

Intellectual Property Rights

 Theft of Trade Secret InvestigationsTheft of Trade Secret Investigations

 Organizations need to protect information in Organizations need to protect information in

accordance with legal requirements (Title 18 accordance with legal requirements (Title 18

US Code Section 1832) US Code Section 1832)

 Recording Industry Association of America Recording Industry Association of America

(RIAA) (RIAA)

 Motion Picture Industry Association of Motion Picture Industry Association of

America (MPAA) America (MPAA)

(8)

Internet Fraud

Internet Fraud

 Click Fraud InvestigationClick Fraud Investigation

(9)

Regional Cyber Action Team

Regional Cyber Action Team

Mission

Mission

 Respond to significant computer intrusions which threaten national Respond to significant computer intrusions which threaten national

critical infrastructures or impact the national economy or security. critical infrastructures or impact the national economy or security.

 Provide expertise and resources to assist affected Field Offices.Provide expertise and resources to assist affected Field Offices.  Augment ResourcesAugment Resources

 Harvest data during the investigation and analyze that data to derive Harvest data during the investigation and analyze that data to derive

useful intelligence. useful intelligence.

 Strategic intelligenceStrategic intelligence  Operational intelligence Operational intelligence

 Coordinate the Computer Intrusion Program’s major cases and Coordinate the Computer Intrusion Program’s major cases and

initiatives from FBIHQ. initiatives from FBIHQ.

 Botnet InitiativeBotnet Initiative  Top Ten HackersTop Ten Hackers

 DOE/FBI Working GroupDOE/FBI Working Group

(10)

Typical CAT Deployment

Typical CAT Deployment

 SSA (2)SSA (2)

Team LeadersTeam Leaders

Experienced cybercrime agentsExperienced cybercrime agentsDeployabilityDeployability

Intelligence Analysts (2)Intelligence Analysts (2)Operational intelligenceOperational intelligence

Conduct toll analysis, linkage analysis, public records searches, Conduct toll analysis, linkage analysis, public records searches,

financial analysis, ACS and other database mining

financial analysis, ACS and other database mining

Interface with Information Sharing & Analysis Section (ISAS) to Interface with Information Sharing & Analysis Section (ISAS) to

produce assessments and bulletins, develop cases when not

produce assessments and bulletins, develop cases when not

deployed in support of Field

deployed in support of Field  ITS (2)ITS (2)

Technically trained specialistsTechnically trained specialists

Interacts with Technical PersonnelInteracts with Technical PersonnelReview technical data/evidenceReview technical data/evidence

Assists in creation of technical solutions to house and analyze data Assists in creation of technical solutions to house and analyze data

within CATU

(11)

Regional

Regional

CAT

CAT

 46** members from four regions46** members from four regions  NortheastNortheast

 Southeast Southeast  CentralCentral

 WestWest

 Augments CATAugments CAT  “Cadre” conceptCadre” concept

 Specialized training, equipment, communication with Specialized training, equipment, communication with

HQ….within Field Office

HQ….within Field Office

(12)
(13)

Disclaimer

Disclaimer

 Do not attempt this without first seeking Do not attempt this without first seeking

appropriate legal advice and documenting appropriate legal advice and documenting

a legal opinion. a legal opinion.

 Each and every situation is unique and Each and every situation is unique and

should be handled on a case by case should be handled on a case by case

basis. basis.

 All cases must be handled in accordance All cases must be handled in accordance

with a legal framework consistent with with a legal framework consistent with

(14)

Objectives

Objectives

 What is Digital EvidenceWhat is Digital Evidence

 Considerations with Digital EvidenceConsiderations with Digital Evidence

 Guidelines for Seizing Digital EvidenceGuidelines for Seizing Digital Evidence

 Guidelines for Seizing Live Digital Guidelines for Seizing Live Digital

Evidence Evidence

(15)

Typical Legal Process

Typical Legal Process

Incident OccursIncident Occurs

 Determine Nature and ScopeDetermine Nature and Scope

Policy Violation or Criminal ConductPolicy Violation or Criminal ConductInvestigation InitiatedInvestigation Initiated

Internal Corporate InvestigationInternal Corporate InvestigationReferral to Law EnforcementReferral to Law EnforcementEvidence is CollectedEvidence is Collected

Digital Evidence vs. Physical EvidenceDigital Evidence vs. Physical Evidence

Follow Legal Protocol for Collection and PreservationFollow Legal Protocol for Collection and PreservationInterviews are ConductedInterviews are Conducted

Direct Witnesses or VictimsDirect Witnesses or Victims

 Third Party Witnesses Such as ISPsThird Party Witnesses Such as ISPsLegal Action is InitiatedLegal Action is Initiated

Criminal or CivilCriminal or Civil

 Administrative Sanctions Such as Employee DismissalAdministrative Sanctions Such as Employee Dismissal

(16)

Computer Security Incident

Computer Security Incident

Response Team

Response Team

 Establish User Policies – Implementable, Establish User Policies – Implementable,

Enforceable and Function as Expected Enforceable and Function as Expected

 Establish a CSIRT to Respond to Incidents Establish a CSIRT to Respond to Incidents

Within Organizations and Support External Within Organizations and Support External

Requests Requests

 Identify Operational Elements – Team Identify Operational Elements – Team

(17)

Rules Governing Evidence

Rules Governing Evidence

Collection

Collection

 US ConstitutionUS Constitution

 44thth Amendment – Reasonable Expectation of Privacy Amendment – Reasonable Expectation of Privacy

 Is Government Action Involved?Is Government Action Involved?

 The Wiretap ActThe Wiretap Act

 Omnibus Crime Control and Safe Streets Act of 1968 Omnibus Crime Control and Safe Streets Act of 1968

(18 USC Section 2501)

(18 USC Section 2501)

 Electronic Communications Privacy ActElectronic Communications Privacy Act  18 USC Section 270118 USC Section 2701

(18)

What is Digital Evidence?

What is Digital Evidence?

 Any kind of storage deviceAny kind of storage device

 Computers, CD’s, DVD’s, floppy disks, hard Computers, CD’s, DVD’s, floppy disks, hard

drives, thumb drives drives, thumb drives

 Digital cameras, memory sticks and memory Digital cameras, memory sticks and memory

cards, PDA’s, cell phones cards, PDA’s, cell phones

 Fax machines, answering machines, cordless Fax machines, answering machines, cordless

phones, pagers, caller-ID, scanners, printers phones, pagers, caller-ID, scanners, printers

and copiers and copiers

(19)
(20)
(21)

Considerations with Digital

Considerations with Digital

Evidence

Evidence

 Digital evidence is fragileDigital evidence is fragile

 Recognizing potential evidenceRecognizing potential evidence  The role of the computer in the The role of the computer in the

crime/violation crime/violation

(22)

Guidelines for Seizing Digital

Guidelines for Seizing Digital

Evidence

Evidence

 Secure the sceneSecure the scene

(23)

Guidelines for Seizing Digital

Guidelines for Seizing Digital

Evidence

Evidence

 Determine if any information in Determine if any information in

the memory is important the memory is important

 If computer is “OFF” do NOT If computer is “OFF” do NOT

turn “ON”. turn “ON”.

 Photograph Monitor & Photograph Monitor &

Document active programs Document active programs

 Disconnect Internet/Ethernet Disconnect Internet/Ethernet

Access Access

(24)

Guidelines for Seizing Digital

Guidelines for Seizing Digital

Evidence

Evidence

 Take all peripheralsTake all peripherals

 Obtain passwords, if possibleObtain passwords, if possible

 Photograph scenePhotograph scene

 Process scene for other Process scene for other

storage devices

(25)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence

Evidence

 Four Phases of Incident ResponseFour Phases of Incident Response11

 PreparationPreparation

 Detection/AnalysisDetection/Analysis

 Containment, Eradication, and RecoveryContainment, Eradication, and Recovery  Post-Incident ActivityPost-Incident Activity

1

(26)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence

Evidence

 PreparationPreparation

 Capability to respondCapability to respond  Preventing incidentsPreventing incidents  Response ToolsResponse Tools

 Contact listContact list

 Communication equipmentCommunication equipment  Software/HardwareSoftware/Hardware

(27)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence

Evidence

 Detection and AnalysisDetection and Analysis

 Most challenging part to detect and assessMost challenging part to detect and assess

 SoftwareSoftware

 Problems users reportProblems users report  Obvious signsObvious signs

 AssessmentAssessment

 Determine if incident needs attentionDetermine if incident needs attention

(28)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence

Evidence

 Containment, Eradication, and RecoveryContainment, Eradication, and Recovery  Develop containment strategyDevelop containment strategy

 Will vary based on the type of incidentWill vary based on the type of incident

Need to consider when to containNeed to consider when to contain

 Document every stepDocument every step

 Evidence should be accounted for at all timesEvidence should be accounted for at all times

 Consider screen captures before copying evidenceConsider screen captures before copying evidence  After acquiring volatile data, make disk imageAfter acquiring volatile data, make disk image

 Eradication and RecoveryEradication and Recovery

(29)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence

Evidence

 Post-Incident ActivityPost-Incident Activity

 Perform debriefingPerform debriefing

 Lessons learnedLessons learned

 Evidence RetentionEvidence Retention

 ProsecutionProsecution

 Will need to clear with legal/law enforcementWill need to clear with legal/law enforcement

 Policy on data retentionPolicy on data retention

 90 days, 180 days, etc for future incidents90 days, 180 days, etc for future incidents

 CostCost

(30)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence

Evidence

 Document EverythingDocument Everything

 Attach Another Device or use Open Attach Another Device or use Open

Network Connection Network Connection

 Record System Date/TimeRecord System Date/Time

 Determine LogonDetermine Logon

(31)

Guidelines for Seizing Live Digital

Guidelines for Seizing Live Digital

Evidence (cont.)

Evidence (cont.)

 List Socket ProcessesList Socket Processes  List Running ProcessesList Running Processes  List Systems ConnectedList Systems Connected  Record Steps TakenRecord Steps Taken

 Save all Pertinent Data to External DeviceSave all Pertinent Data to External Device  Minimal Commands to Acquire Digital Minimal Commands to Acquire Digital

Evidence Evidence

 Cause the Least Amount of Damage as Cause the Least Amount of Damage as

(32)

Preparing Your Case

Preparing Your Case

(33)

Documentation

Documentation

 Documentation is a Reflection of Your Documentation is a Reflection of Your

Case Case

 Problems Arise When Shortcuts are TakenProblems Arise When Shortcuts are Taken

 Conditions of All Evidence Needs to be Conditions of All Evidence Needs to be

Documented Documented

(34)

Preservation

Preservation

 If Preservation Poor, Your Handling/Collecting If Preservation Poor, Your Handling/Collecting

Techniques Become Questionable. Techniques Become Questionable.

 Maintain Chain of CustodyMaintain Chain of Custody

 Eliminate ANY Possibility of ContaminationEliminate ANY Possibility of Contamination  CollectionCollection

 TransportationTransportation  StorageStorage

(35)

Authentication

Authentication

 If Authentication is Poor, Everything Comes into If Authentication is Poor, Everything Comes into

Question. Question.

 MD5 or SHA algorithmMD5 or SHA algorithm

Ensure bit-by-bit copy of originalEnsure bit-by-bit copy of original

 Ensure evidence unalteredEnsure evidence unaltered

 Need to Demonstrate Evidence is…Need to Demonstrate Evidence is…What you say it is.What you say it is.

 Came from where you say it did.Came from where you say it did.

 Has not been modified in any way since you last handled it.Has not been modified in any way since you last handled it.

(36)

General Do’s and Don’ts of

General Do’s and Don’ts of

Evidence

Evidence

Minimize Handling/Corruption of Original DataMinimize Handling/Corruption of Original Data

 Account for Any Changes and Keep Detailed Logs of Your Actions Account for Any Changes and Keep Detailed Logs of Your Actions

Maintain a detailed log of who handled the evidence and where stored and when Maintain a detailed log of who handled the evidence and where stored and when

transferred transferred

Comply with the Five Rules of Comply with the Five Rules of EvidenceEvidence

AdmissibleAdmissibleAuthenticAuthenticCompleteCompleteReliableReliable

Believable (Criminal - Reasonable Doubt? Civil – Preponderance of the Believable (Criminal - Reasonable Doubt? Civil – Preponderance of the

Evidence) Evidence)

 Do Not Exceed Your Knowledge Do Not Exceed Your Knowledge

Follow Your Local Security Policy and Obtain Written Permission Follow Your Local Security Policy and Obtain Written Permission Capture as Accurate an Image of the System as Possible Capture as Accurate an Image of the System as Possible

Be Prepared to Testify Be Prepared to Testify

Ensure Your Actions are Repeatable Ensure Your Actions are Repeatable

 Proceed From Volatile to Persistent Proceed From Volatile to Persistent EvidenceEvidenceDon't Run Any Programs on the Affected System Don't Run Any Programs on the Affected System

(37)

Resources

Resources

 Digital Evidence in the Courtroom: A Guide for Digital Evidence in the Courtroom: A Guide for

Preparing Digital Evidence for Courtroom Preparing Digital Evidence for Courtroom

Presentation – The National Center for Forensic Presentation – The National Center for Forensic

Science Science

 Handbook for Computer Security Incident Handbook for Computer Security Incident

Response Teams – CERT Coordination Center Response Teams – CERT Coordination Center

 Searching and Seizing Computers and Searching and Seizing Computers and

Obtaining Electronic Evidence in Criminal Obtaining Electronic Evidence in Criminal

Investigations – US Department of Justice, Investigations – US Department of Justice,

Cybercrime.gov/searchmanual.htm Cybercrime.gov/searchmanual.htm

 Computer Security Incident Handling Guide – Computer Security Incident Handling Guide –

(38)

Many Thanks To:

Many Thanks To:

 Sgt. Aaron DeLashmuttSgt. Aaron DeLashmutt

Iowa State University Police Iowa State University Police

168 Armory Building 168 Armory Building

Ames, IA 50011 Ames, IA 50011

 Presented at: Presented at:

InfraGard – Des Moines, IAInfraGard – Des Moines, IA

Referensi

Dokumen terkait