Contents
1.Computer Crime and the Electronic Crime Scene................................1Thomas A. Johnson
I.Introduction and Historical Developments...........................................2 II.Crime Scenes with Digital and Electronic Evidence.............................5 III.Computers, Electronic Equipment, Devices, and Information
Repositories ..............................................................................................6
A.The Value of Equipment and Information................................7 B.Information Repositories — Informational Value....................8
Information Collection................................................................8
Management of the Electronic Crime Scene.............................9
Electronic Crime Scene Procedures..........................................10
Initiating the Forensic Computer Investigation ......................14 G.Investigative Tools and Electronic Crime Scene
Investigation...............................................................................16
Legal Issues in the Searching and Seizure of Computers ...................16
Searching and Seizing Computers without a Warrant............17
Searching and Seizing Computers with a Warrant .................18
Summary ................................................................................................19
References.........................................................................................................20
2.The Digital Investigative Unit: Staffing, Training, and Issues.............21Chris Malinowski
Unit Name..............................................................................................22
Mission Statement..................................................................................22
- One Unit’s History.....................................................................30
Investigations..........................................................................................31
- Responsibility.............................................................................31 B. Proactiveversus Reactive...........................................................32
Productivity and Metrics...........................................................33
Resources....................................................................................34
Staffing....................................................................................................36
Case Investigator........................................................................38
Lab Specialist..............................................................................39 C. Simple Case: Dual Role .............................................................40
- Participation with Other Agencies ...........................................42
5
Civil Service: Performing Out-of-Title.....................................42
Recruitment, Hiring, and Retention.........................................42 G. Administrative Issues.................................................................43
Retirement..................................................................................43
Advancement and Rewarding ...................................................44 1.Unavailability of Personnel and the Interchangeable
Man....................................................................................45
Misuse of Personnel...................................................................47
Interviewing................................................................................48
Training.......................................................................................50
Summary ................................................................................................53
3.Criminal Investigation Analysis and Behavior: Characteristics of
Computer Criminals ..............................................................................55
William L. Tafoya
Annals of Profiling.................................................................................58
History ....................................................................................................59
- Premodern Antecedents ............................................................59 B. The FBI Era ................................................................................62
C.Successes and Failures................................................................65
Profiling Defined....................................................................................65
- CIBA Defined.............................................................................67 IV. Review of the Literature........................................................................67
V.Uncertainties...........................................................................................69
A. Conceptual Considerations.......................................................69 B. Investigative Dilemmas..............................................................70 C. Interagency Obstacles................................................................70
Scholarly Concerns ....................................................................71
Related Issues .............................................................................71 VI. Education and Training.........................................................................72
Science or Art?........................................................................................73
The Status Quo ..........................................................................73
Profiling Process.........................................................................74
Risk Levels ..................................................................................76
Low Risk............................................................................76
Moderate Risk...................................................................76
High Risk...........................................................................76
B.Behavioral Assessment of the Crime Scene .............................76
Victimology.......................................................................77
Typology............................................................................77
Predictive Indicators ..............................................................................78
Methodology.........................................................................................80
Indicators of Further Positive Developments ....................................80
- Neurolinguistic Analysis............................................................81 B. Neurotechnology Research........................................................81
C. Checkmate..................................................................................81 XI. Insider Threat.......................................................................................82 XII. The Future of Cyberprofiling..............................................................82 References.........................................................................................................83 Web Sources.....................................................................................................89 Acknowledgements..........................................................................................90
4.Investigative Strategy and Utilities........................................................91Deputy Ross E. Mayfield
Introduction ........................................................................................91
The Growing Importance ofComputer Forensic Investigations .....92 III. Computer Crime Investigations Viewed as a System........................93
IV. Is There a Crime?.................................................................................94 V. Who Has Jurisdiction?.........................................................................94 VI. Gathering Intelligence about the Case ...............................................94 VI. Determining the Critical Success Factors for a Case.........................99 VII. Gathering Critical Evidence ..............................................................100
The Raid..............................................................................................100
Processing: Critical Evidence Recovery from Electronic Media.....103
Drive Duplication Utilities......................................................103
Search Utilities .........................................................................104
Graphicand File Viewer Utilities............................................104
Recovering Deleted Evidence..................................................104
Disk Utilities.............................................................................104
Hash orChecksum Utilities....................................................105
Passwords and Encrypted Media............................................105
Evidence Recovery from RAM Memory ................................106
Forensic Suite Software............................................................106
Network Drive Storage............................................................106 XII. The Investigator as a Determined Intruder .....................................107 XIII. Mayfield’s Paradox .............................................................................107 XIV. Chain of Custody...............................................................................108 XV. Exhibits, Reports, and Findings ........................................................108 XVI. Expert Testimony ...............................................................................109 XVII. Summary.............................................................................................109 Credits ............................................................................................................110
5.Computer Forensics & Investigation: The Training Organization...111Fred B. Cotton
I. Overview...............................................................................................111 II. Hands-on Training Environment .......................................................111 III. Course Design ......................................................................................114 IV. Specializedor Update Training...........................................................115 V. Personnel ..............................................................................................117 VI. Equipment............................................................................................120 VII. Materials ...............................................................................................123 VIII. Funding.................................................................................................123 IX. Record Keeping ....................................................................................124 X. Testing and Certification .....................................................................126 XI. Summation...........................................................................................127
6.Internet Crimes Against Children.......................................................129Monique Mattei Ferraro, JD, CISSP with Sgt. Joseph Sudol
Background...........................................................................................129
Computer-Assisted and Internet Crimes Against Children..............133
Law Enforcement Efforts.....................................................................142 IV. Conclusion............................................................................................146
References.......................................................................................................148
7.Challenges to Digital Forensic Evidence.............................................149Fred Cohen
Basics.....................................................................................................149
- Faults and Failures...................................................................149 B. Legal Issues...............................................................................150 C. The Latent Nature of Evidence...............................................150
D.Notions Underlying "Good Practice" .....................................151 E.The Nature of Some Legal Systems and Refuting
Challenges.................................................................................151
F.Overview...................................................................................152
Identifying Evidence ............................................................................152
Common Misses ......................................................................152
Information Not Sought .........................................................153 C.False Evidence ..........................................................................153
Nonstored Transient Information ..........................................153
Good Practice...........................................................................154
Evidence Collection .............................................................................154
- Establishing Presence...............................................................154 B. Chain of Custody.....................................................................155
C.How the Evidence Was Created..............................................155 D.Typical Audit Trails..................................................................155
E. Consistency of Evidence..........................................................155 F. Proper Handling during Collection .......................................156
Selective Collection and Presentation ....................................156
Forensic Imaging......................................................................157
Nonstored Transient Information ..........................................158
Secret Science and Countermeasures .....................................159
Seizure Errors.......................................................................................160
- Warrant Scope Excess..............................................................160B.Acting for Law Enforcement...................................................161
C. Wiretap Limitations and Title 3 .............................................161 D. Detecting Alteration.................................................................162
Collection Limits......................................................................162
Good Practice...........................................................................163
Fault Type Review....................................................................164
Transport of Evidence..........................................................................164
Possession and Chain of Custody...........................................164
Packaging for Transport ..........................................................164
Due Care Takes Time ..............................................................165
Good Practice...........................................................................165
Storage of Evidence..............................................................................165
Decay with Time......................................................................165
Evidence of Integrity ...............................................................166
Principles of Best Practices .....................................................166
Evidence Analysis.................................................................................167
Content.....................................................................................167
Contextual Information ..........................................................167
Meaning....................................................................................168 D. Process Elements......................................................................168 E. Relationships ............................................................................169 F. Ordering or Timing.................................................................169 G. Location....................................................................................170
Inadequate Expertise................................................................170
Unreliable Sources ...................................................................171 J.Simulated Reconstruction .......................................................171
Reconstructing Elements of Digital Crime Scenes................172
Good Practice in Analysis .......................................................174
The Process of Elimination............................................174
The Scientific Method ....................................................175
The Daubert Guidelines.................................................175
Digital Data Is Only a Part of the Overall Picture.........176
Just Becausea Computer Says So Doesn’t Make It So...177
Overall Summary.................................................................................178
8.Strategic Aspects in International Forensics.......................................179Dario Forte, CFE, CISM
I.The Current Problem of Coordinated Attacks..................................179 II.The New Antibacktracing and Antiforensics Tools, and Onion
Routing .................................................................................................180
- Using Covert Channels to Elude Traffic Analysis:
NCovert ....................................................................................180
Difficulties in Backtracing Onion Router Traffic ..................181
The Goal: Protection from Traffic Analysis..................181
Onion Routing: What It Is.............................................181
The Differences with the Other Anonymizers..............182
The Onion Routing Roadmap.......................................183
A Glossary of Project Terms..........................................183
The Potential Dangers of Onion Routers .....................186
Onion Routers in the Real World: The Dual Use
of Dual Use......................................................................187
- Planning an International Backtracing Procedure: Technical and
Operational Aspects.............................................................................188
- Some Commonly Used Tools in Digital and Network
Forensics ...................................................................................191
- Why Use Freeware and Open Source for Digital
Forensics?.........................................................................191
Tcpdump.........................................................................192
Sanitize.............................................................................192
A Series of Questions .....................................................194
More Tools.......................................................................194
Snort ................................................................................195
The CLF Paradigm (Common Log Format) .........................196
- Where the Logging Information Could Be Found .........197
Preventive Methods: Information Sharing andHoneynets..............198
Deploying Honeynet: Background and Implications............198
Low- and High-Interaction Honeypots ........................198
Two Types: More Risks...................................................201
Honeypots in Detail: The Variations.............................201
How Investigators Can Use Honeynets.........................203
An Example of International Cooperation: Operation Root Kit.....203
Conclusions ..........................................................................................205 References.......................................................................................................205
9.Cyber Terrorism....................................................................................207
Thomas A. Johnson
I.Policy Issues Regarding Cyber Terrorism...........................................210 II.Cyber Terror Policy Issues Linking Congress and Executive
Branch of Government........................................................................214 A. Protection of Critical Infrastructure Sectors .........................215
B. Securing Cyberspace................................................................215 III. Information Warriors ..........................................................................218 IV. Net War and Cyber War ......................................................................220 V. Cyber Intelligence or Cyber Terrorism...............................................222 VI. Research Issues in Cyber Terrorism....................................................224 VII. Summary ..............................................................................................226 References.......................................................................................................226
10.Future Perspectives...............................................................................229
Thomas A. Johnson
I. Network Infrastructure: Security Concerns.......................................230 II. The Role of Education and Training..................................................231 III. The Emergence of a New Academic Discipline.................................232
Our Nation’s Investment in Cyber Security Research.......................235
Recommendations................................................................................235 VI. Conclusion............................................................................................237 References.......................................................................................................237
11.Concluding Remarks............................................................................239
Thomas A. Johnson
Appendix A.Executive Summary..............................................................243
Appendix B.Executive Summary..............................................................253
Appendix C.Computer Security Incident Handling Guide....................265
Appendix D.Sample Language for Search Warrants and Accompanying
Affidavits to Search and Seize Computers..........................281
Forensic Computer Crime Investigation Text.............................................299 Contributing Author Biographies ................................................................299
Index...............................................................................................................305