Understanding Technology Crime Investigation for Managers.

Slides:



Advertisements
Similar presentations
1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Advertisements

XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
® Microsoft Office 2010 Browser and Basics.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Online Collaboration Applications ADE100- Computer Literacy Lecture 28.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
CSCI 4550/8556 Computer Networks Comer, Chapter 3: Network Programming and Applications.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
August 15 click! 1 Basics Kitsap Regional Library.
Your Website Chat & Live Customer Support Solution "Instant Customer GratificationSM" Brought to you by: Affordable Business Productivity and Communications.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
INTERNET CHAPTER 12 Information Available The INTERNET contains a huge amount of information a huge amount of information information on any topic you.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Computer Concepts 2014 Chapter 7 The Web and .
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
© Anthony J. Nowakowski, Ph.D. Communications © Anthony J. Nowakowski, Ph.D. EDC 601 Instructional Technologies .
Lecturer: Ghadah Aldehim
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
(or ?) Short for Electronic Mail The transmission of messages over networks.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
CPSC 203 Introduction to Computers Lab 23 By Jie Gao.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Activating Clarity  Activating Clarity  Activation  Online Activation  Fax Activation  Review and Verify Activation and License Terms  Updating.
ITEC 1001 Tutorial 1 Browser and Basics. Web browser software & Web pages The Web is a collection of files that reside on computers, called Web.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
TCP/IP (Transmission Control Protocol / Internet Protocol)
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Technical Awareness on Analysis of Headers.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
By Toby Reed.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
SDA Formulas Online Webinar Please use the mute button or press #6 on your phones to mute the teleconference line If you have questions or technical problems.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Microsoft Virtual Academy Talbott Crowell | Chief Architect, ThirdM.com Rob Latino | Program Manager in Office 365 Support, Microsoft.
Copyright © SkyeyTech, Inc. CRMdesk Power and elegance.
CitiBuy Support January, 2009 This guide will provide you with a quick overview of the new Support Portal for the Baltimore CitiBuy Purchasing System City.
Introduction to the Internet
Online Training Course
How Works Ameera Al Ghamdi ID:
Chapter 8 Building the Transaction Database
How Works Ameera Al Ghamdi ID:
Using Microsoft Outlook: Outlook Support Number
Presentation transcript:

Understanding Technology Crime Investigation for Managers

Session 3 A grounding in technology concepts (Tracing & Instant Messages)

How works cannot be sent directly from computer to computer (think about what would happen if the destination computer was turned off?) It works in a similar way to real mail – it passes through a series of servers (post offices) until it is near the destination. Then when it is appropriate (ie the end user requests to download the mail), it is delivered to the recipient.

Tracing – breadcrumbs! Every time an is received by a server it stamps the message with details of the server that it received the mail from. This effectively leaves a trail which can be used to return to the originator Confused……?

Mail Server with IP: User sends from IP address: Mail server stamps the header with originating IP: Recipient downloads e- mail: the last stamp contains the IP of the Mail Server

Tracing – headers Why can’t you see this information in an e- mail? Information is stored in extended headers We need to know how to access (and read) these headers…. Demo!

Simple faking It’s very easy to create a (superficially) fake software does not check that you have entered the correct identity information when you set up an account Demo!

Simple faking Exercise Use the client Outlook Express to create a new account on your computer You must use the correct mail server settings, but you can choose a fake identity Send a to your neighbour Open the that you receive & see how it looks – view the header and then trace the originating IP address.

content Of course, being able to trace the is extremely important. However, we also need to understand the nature of the content s can be received in two ways –Plain text –HTML encoded with multimedia addins

content Of course, being able to trace the is extremely important. However, we also need to understand the nature of the content s can be received in two ways –Plain text –HTML encoded with multimedia addins

content If you receive an in plain text, then wysiwyg However, s in HTML coding can be used to hide true content and location of any hyperlinks Thus they are commonly used to perpetrate frauds

Fraud A good example is in your manual (P.59) This involves a case where a large US ISP’s website was faked The fraudsters then sent out a huge volume of s hoping that at least some of them would be received by Earthlink customers The s directed victims to the fake website and instructed them to submit personal details

Fraud

<a tion/step1_e.htm">

<a fication/step1_e.htm”>

<a tion/step1_e.htm">

<a ation/step1_e.htm”>

<a ation/step1_e.htm”>

Fraud

Instant Messaging Real time text chat facilities Many people (especially youngsters) use as a complement or replacement for Therefore may contain criminal communications

Instant Messaging Real time text chat facilities Many people (especially youngsters) use as a complement or replacement for Therefore may contain criminal communications

Instant Messaging Example of when a trace of instant messaging may be required Example (see page 65 of manual)

as a Spy Tool or for undercover work (extra topic)

Normal Tracing After receiving the , we view the header and use the information to trace the originating IP address BUT… What if you are conducting an undercover operation and want to trace a suspect address without receiving an from the suspect?

Tracking s How to spy on someone using s? Commercial services are available which claim to: –Prove the was opened –Show the time that the was opened –Show the IP address of the computer used –Show if any links were clicked in the message –Show if the was forwarded…

ReadNotify.com

How does it Work? Readnotify allows a short free trial Using this it is possible to analyse how it works A fre account with was used to register To send tracked mail, we just need to add.readnotify.com to the end of the target address

Demo A Test was sent using the fre account Addressed to When received, it looks like this…

Demo

The was received by MS Outlook and viewed using the preview pane A check was then made at realnotify website to see if this had been recorded…

Demo

A new demo – this time to PEN

Once again, we check with the ReadNotify website to see if they have a record… This time though, it has no record to report – even though the has been opened. However, if “launch” is selected instead of file viewer, this opens ‘Netscape’ web browser

A new demo – this time to PEN

This time, the ReadNotify website tells us that the has been opened.

A new demo – this time to PEN

So, what is happening? We now know that the tracking will only work in web-enabled clients. Therefore, if the is html, we need to look at the code behind it…

So, what is happening?

Final example in a non- html client (Linux)

Conclusions (from an investigation p.o.v.) This method is a very good way of tracing addresses in a covert way The user must be using html enabled , but nowadays it is very unusual not to be This includes web-mail as well as POP mail Unfortunately, need to subscribe if using for a long period

Conclusions (from a personal p.o.v.) This tool shows how easy it is for spammers to know if you receiving and viewing their mail Others can know if you are forwarding the mail and to whom! Privacy is being compromised This is why many people are insisting on using non-html

Summary