Presentation is loading. Please wait.

Presentation is loading. Please wait.

SURVEY OF CYBER FORENSICS AND CYBER SECURITY IRA WILSKER July 17, 2014.

Similar presentations


Presentation on theme: "SURVEY OF CYBER FORENSICS AND CYBER SECURITY IRA WILSKER July 17, 2014."— Presentation transcript:

1 SURVEY OF CYBER FORENSICS AND CYBER SECURITY IRA WILSKER July 17, 2014

2 Be sure to follow the Justice Department Guidelines published in “Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations” which can be found onlinehttp://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdf

3 WARRANTS If the equipment is seized pursuant to a criminal investigation, be absolutely sure that a search warrant has been issued prior to any type of analysis unless exigent circumstances, consent, or other legal requirements are met Failure to have a proper and timely issued warrant or other exception may likely render the computer and anything found in it inadmissible as evidence. Follow proper protocols.

4 IF THE COMPUTER IS TURNED ON WHEN ENCOUNTERED, DO NOT TURN IT OFF OR UNPLUG IT. FOLLOW ESTABLISHED PROTCOLS FOR SAVING ANY DATA THAT MAY BE STORED IN VOLATILE RAM PRIOR TO ANY SHUT DOWN IF THE COMPUTER IS OFF WHEN ENCOUNTERED, DO NOT TURN IT ON – FOLLOW APPROPRIATE PROTOCOLS FOR A SECURITY CHECK AND POSSIBLE REMOVAL OF ANY FORMS OF HARD DRIVE, SSD, FLASH MEMORY, OR OTHER STORAGE DEVICE

5 BEWARE! Suspect Computers May Be BOOBY-TRAPPED with either destructive software that will significantly wipe and destroy any data on the hard drive, or with EXPLOSIVES. There are many documented cases of both. It is COMMON for organized groups of PEDOPHILES and CHILD PORNOGRAPHERS to have software “bombs” that will automatically initiate a high grade wipe utility. These wipe utilities my be initiated with a single keystroke, an icon, a voice command, speech recognition, or other form of input. There is serious debate in the forensics community as to whether the power should be shut off at the time of a raid in order to prevent the hard drive from being wiped; but this may lead to the loss of volatile RAM. Many pedophiles use a UPS to prevent the computer from being externally shut down if the power is lost, thus allowing data destruction to continue.

6 It is not unusual for drug dealers and terrorists to plant EXPLOSIVES inside or in close proximity of the computer case which can detonate if the case is moved, opened, hard drive removed, or other common investigative processes occur. SOURCES:

7 LEADING COMMERCIAL FORENSIC SOFTWARE PRODUCTS UNIVERSALLY ACCEPTED AS VALID IN COURT ENCASE https://www.guidancesoftware.com

8 FORENSIC TOOLKIT (FTK)

9 OPEN SOURCE FORENSIC SOFTWARE FREE, BUT NOT ALWAYS ACCEPTED IN COURT AUTOPSY and THE SLEUTH KIT

10 Digital Forensics Framework

11 SOURCE: THERE IS AN ORDERLY SEQUENCE WHICH MUST (SHOULD ) BE FOLLOWED IN ORDER TO PROPERLY MEET THE LEGAL AND TECHNICAL REQUIREMENTS FOR A PROPER CYBER FORENSIC INVESTIGATION

12

13

14

15

16

17 TECHNOLOGY, LEGISLATION, and COURT RULINGS ARE DYNAMIC AND EVER CHANGING There is a necessity that cyber forensic investigators stay informed of factors that can impact or influence their activities. Several resources are available that should be frequently monitored for these changes.

18 THERE ARE ALSO SEVERAL OTHER EXCELLENT RESOURCES THAT THE INVESTIGATOR SHOULD UTILIZE IN ORDER TO BE AWARE OF CHANGES AND TO STAY CURRENT WITH LEGAL AND OTHER ISSUES

19 https://cybercop.esportals.com OTHER ONLINE RESOURCES WITH INFORMATION ON CYBER FORENSIC TRENDS

20 CONTACT: IRA WILSKER


Download ppt "SURVEY OF CYBER FORENSICS AND CYBER SECURITY IRA WILSKER July 17, 2014."

Similar presentations


Ads by Google