National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Overview of Live Computer System Capture and Triage Tool (CCTT)

Slides:



Advertisements
Similar presentations
National Database Templates for the Biosafety Clearing-House Application (NDT-nBCH) Overview of the US nBCH Applications.
Advertisements

XProtect ® Professional Efficient solutions for mid-sized installations.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
EDW647 Internet For Educators Setting Up a Gmail Account Roger W. Webster, Ph.D. Department of Computer Science Millersville University (717)
HOW MANY HAVE USED QUALTRICS? WHO WHAT WHEN WHERE WHY.
2 Language of Computer Crime Investigation
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
How to keep your kids safe online
Defense Travel Management Office Office of the Under Secretary of Defense (Personnel and Readiness) Defense Travel Management Office Office of the Under.
Virtual Meetings Increasing Collaboration While Reducing Costs and Ensuring Business Continuity Ram Narayanaswamy CTO 8x8, Inc.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
GMetrix SMS Testing Center Guide.
CATHOLIC DIOCESE OF DALLAS OFFICE OF COMMUNICATIONS GETTING TO KNOW THE NEW DALLASCATHOLIC.ORG S.
SMSS offers the LOWEST bulk sms costs in South Africa 3 Options to use SMSS: Option.1 Simply buy bulk sms messages from only 16c per sms (Depending on.
Question: What is Secure Envelope?
Administrator’s Guide
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
Outlook Web Access (OWA) is a web mail service of Microsoft Exchange; allow users to connect remotely via a Web browser OWA is used to access ,
By Drudeisha Madhub Data Protection Commissioner Date:
MyIsagenix - Intro Class. Intro Class Agenda  MyIsagenix Overview  Getting Started  Page by Page Walkthrough  Q & A.
Capturing Computer Evidence Extracting Information.
“Consistency is Key!” A Quick Guide to Online Marketing By Virtual Marketing Empire, LLC
XProtect ® Enterprise. XProtect Enterprise is comprehensive IP video surveillance software with interactive monitoring capabilities The perfect match.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Computer Concepts 2014 Chapter 7 The Web and .
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Microsoft Office Communicator A General Introduction.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 7 The Internet and the World Wide Web START This multimedia product and its contents are protected.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
02 | Install and Configure Team Foundation Server Anthony Borton | ALM Consultant, Enhance ALM Steven Borg | Co-founder & Strategist, Northwest Cadence.
1 ITI 1120 Lab # 1 An Introduction to the Lab Environment Contributors: G. Arbez, M. Eid, D. Inkpen, A. Williams, D. Amyot.
An innovative, electronic personal health record Overview.
Use of Electronic and Internet advertising options Standard 3.4.
AOL SELF-HELP Built into the AOL program are the answers to nearly any problem you might encounter when using AOL.
Using Skype to Communicate with Family and Friends Presented by: Karla Lechuga.
Technology in Computer Forensics  Alicia Castro  Thesis Defense  Master of Software Engineering  Department of Computer Science  University of Colorado,
Introducing the Internet and The Web Computer Concepts Unit A What Is Internet.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
National Center for Supercomputing Applications Barbara S. Minsker, Ph.D. Associate Professor National Center for Supercomputing Applications and Department.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
1 of 3 Microsoft ® Office Communicator 2007 can help you perform a wide range of tasks including secure Instant Messaging (IM). With its rich collaboration.
Module 9 Planning and Implementing Monitoring and Maintenance.
CITRIX REVIEW Presented by Mary Kay Black and Christy Randall.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Digital Forensics Market Analysis: By Forensic Tools; By Application (Network Forensics, Mobile Forensics, Database Forensics, Computer Forensics) - Forecast.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Step 1 Lead Notifications Dear Partner, New leads have been assigned to your organization based on customer preference and are available for you.
Microsoft Customer 2 Partner Connector Quick Reference Guide
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
Office 365 Help Desk Troubleshooting Guide
Accessing Your Online Courses in Litmos
To the ETS – Accounts Setup and Preferences Online Training Course
Extract and Correlate Evidences in Computer Forensics
Chapter 7 Electronic Business Systems
Use of Electronic and Internet advertising options
Skills Development Program
Preparing for and ADMINISTERING the ABMGG IN-TRAINING EXAMINATION
CYBERSAFETY & Personal information
Chapter 7 Electronic Business Systems
Presentation transcript:

National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Overview of Live Computer System Capture and Triage Tool (CCTT)

National Center for Supercomputing Applications Enabling Initial Computer Investigations by Non-Expert Law Enforcement Personnel NCSA led project with collaboration from the FBI & local law enforcement Guide LE through initial investigation of computer related crimes Consent based complaints Work on live systems Gather evidence/information from SOHO Windows systems Support on-site investigation USB memory stick form factor (keep it in your glove box) National Institute Of Justice Funded Project

Motivations How critical are the actions of the law enforcement first responder to any crime? How well prepared is the typical LEFR to answer computer related complaints such as; I received an based threat. I responded to an about my inheritance but ended up loosing my life savings. My young son is getting indecent proposals from someone over IM. My daughter did not come home last night and I think it might be related to something she is doing on-line. How many LEFR resort to taking notes and referring the case on to the department’s computer investigation expert? How overloaded is that expert? Live Computer System Capture and Triage Tool

Is your force ready to tackle computer crimes How many LEFR understand the differences between different browsers and know how to capture evidence from them? Say IE versus Firefox versus Safari? How many LEFR know their way around more than one client? How many LEFR know how to capture the logs off any of the handful of popular IM clients? How many LEFR know their way around MySpace and Facebook? Live Computer System Capture and Triage Tool

Project Goals Enable non-experts LEFR to gather evidence/information from a Windows™ system and perform a preliminary examination. Preserve evidence for subsequent investigation. Lessen the number of computer based investigative situations in which an expert is required. Increase the actions a LEFR can take by providing them with on-site triage of the information. Provide configuration guidance, i.e. enable history and log caching for on-going investigations. Live Computer System Capture and Triage Tool

Driving Scenarios Threats Fraud Missing persons Suicide pacts Theft Additional evidence and or information for non-computer cases Live Computer System Capture and Triage Tool

Technology Challenges & Opportunities New forms of communication present new challenges Electronic Mail, Instant Messaging, Social Networking, Virtual Worlds, not to mention multiple client and service options. Technology can be intimidating yet it also may provide opportunities that previously did not exist. Before and social networks people still communicated only those conversations were often times not recorded. There is a potential treasure trove of information available on-line that may provide valuable time sensitive information Live Computer System Capture and Triage Tool

Live Computer Capture and Triage Tool (CCTT) Live Computer System Capture and Triage Tool Provides law enforcement personnel a simple, easy-to-use mechanism for capturing live data via step-by-step assistance. Ensures that the evidence is collected from the initial contact and provides the investigator with something to analyze. Provides a triage tool to aid the first responder in the initial examination and next step determination.

What Makes CCTT Unique? The last thing we need is another forensics tool. Wizard that guides LEFR through a collection of “typical” complaints. On-site triage of the available information for immediate action. Capture of web-based information/evidence. Live Computer System Capture and Triage Tool

What is Microsoft COFEE? From Microsoft’s website: Announced in April of this year. Focused on the extraction of “live” data from a Windows™ system before turning off the machine. Preconfigured, automated, fast tool. Up to 150 commands; previously would have taken a forensics expert hours to execute. Over 2,000 LE officers have registered COFEE in over 15 countries. Live Computer System Capture and Triage Tool

How does CCTT work with COFEE? Live Computer System Capture and Triage Tool Immediate Action

Live Computer System Capture and Triage Tool

Software Distribution and Upgrades Exploring options for software distribution via the FBI PD downloads software over the Internet Software upgrades Added support features New capabilities Live Computer System Capture and Triage Tool

Prototype Feedback Live Computer System Capture and Triage Tool “I definitely see the need for this tool in my line of work. The live capture alone is helpful, but the CCTT wizard really helps my guys to target the specific kind of information I need, like headers or instant messaging conversation logs. It’s simple to use, and that’s a good thing. We were excited to try it out, and you guys didn’t disappoint!” --Investigator Shaun Cook, Urbana, Illinois Police Department

Future Work Social Networking support This is our focus area right now Capture, present and utilize browser cookies, passwords and history information to discover and collect web-based information Automate as much as possible Automatically find the social network service and login. Collect the most relevant information and present in a straight- forward way – recent communications, to whom, content, friends, social network, blogs, pictures, and more Support for Virtual Worlds Live Computer System Capture and Triage Tool

Contact Information Randy Butler Live Computer System Capture and Triage Tool