Grover Kearns, PhD, CPA, CFE, CITP Catching Al Capone : What All Accountants Should Know About Computer Forensics
ScarfaceScarface
Eliot Ness
Catching Al Capone Capone was known to be responsible for a wide array of felonies and violent crimes but evidence was lacking Witnesses tended to disappear Direct evidence was needed Business records provide direct evidence Careful search, analysis, and handling of data are required to produce data that are acceptable as evidence 5
Survey Shows Companies Fear Fraud, But Many Not Prepared Ernst & Young's 9th Global Fraud Survey: Fraud Risk in Emerging Markets 60 percent of multinationals say they believe fraud is more likely to occur in emerging market operations than developed markets Robust internal controls remain the first line of defense against fraud for companies in all markets 6
8 Why Accountants and auditors … are better positioned to detect computer based fraud can assist in maintaining a chain-of-custody for digital evidence can better communicate with IT employees can promote IT-based internal controls can assist in the efficient use of IT resources
Common Applications of Computer Forensics Employee internet abuse common, but decreasing Unauthorized disclosure of corporate information and data accidental and intentional Industrial espionage Damage assessment Criminal fraud and deception cases 9
Cardinal Rules of Evidence Handling Only use tools and methods that have been tested and evaluated to validate their accuracy and reliability. Handle the original evidence as little as possible to avoid changing the data. Establish and maintain the chain of custody. Document everything done. Never exceed personal knowledge 10
Forensic Accountants are Involved In Criminal Investigations Shareholders' and Partnership Disputes Personal Injury Claims Business Interruption Fraud Investigations Matrimonial Disputes Professional Negligence Mediation and Arbitration 11
Computer forensics can be defined as the collection and analysis of data from computersystems, networks, communication streams (wireless) and storage media in a manner that is admissible in a court of law. -CERT 12
“Computer forensics” can thus not afford solely to concern itself with procedures and methods of handling computers, the hardware from which they are made up and the files they contain. The ultimate aim of forensic investigation is use in legal proceedings [Mandia 01]. The objective in computer forensics is quite straightforward. It is to recover, analyze and present computer based material in such a way that it is useable as evidence in a court of law [Mandia 01].
14 Digital Crime Scene Investigation Digital Forensic Investigation A process that uses science and technology to examine digital objects and that develops and tests theories, which can be entered into a court of law, to answer questions about events that occurred. IT Forensic Techniques are used to capture and analyze electronic data and develop theories.
15 Audit Goals of a Forensic Investigation Uncover fraudulent or criminal cyber activity Isolate evidentiary matter (freeze scene) Document the scene Create a chain-of-custody for evidence Reconstruct events and analyze digital information Communicate results
16 Audit Goals of a Forensic Investigation Immediate Response Shut down computer (pull plug) Bit-stream mirror-image of data Begin a traceback to identify possible log locations Contact system administrators on intermediate sites to request log preservation Contain damage and stop loss Collect local logs Begin documentation
17 Audit Goals of a Forensic Investigation Continuing Investigation Implement measures to stop further loss Communicate to management and audit committee regularly Analyze copy of digital files Ascertain level and nature of loss Identify perpetrator(s) Develop theories about motives Maintain chain-of-custody
18 Digital Crime Scene Investigation Scene Preservation & Documentation Goal: Preserve the state of as many digital objects as possible and document the crime scene. Methods: Shut system down Unplug (best) Do nothing Bag and tag
19 Audit Goals of a Forensic Investigation Requirements for Evidence Computer logs … Must not be modifiable Must be complete Appropriate retention rules
20 Digital Crime Scene Investigation Problems with Digital Investigation Timing essential – electronic evidence volatile Auditor may violate rules of evidence NEVER work directly on the evidence Skills needed to recover deleted data or encrypted data
21 Digital Crime Scene Investigation Extract, process, interpret Work on the imaged data or “safe copy” Data extracted may be in binary form Process data to convert it to understandable form Reverse-engineer to extract disk partition information, file systems, directories, files, etc Software available for this purpose Interpret the data – search for key words, phrases, etc.
22 Digital Crime Scene Investigation Technology Magnetic disks contain data after deletion Overwritten data may still be salvaged Memory still contains data after switch-off Swap files and temporary files store data Most OS’s perform extensive logging (so do network routers)
Role of a First Responder Essentially the first person notified and reacting to the security incident Responsibilities: Determine the severity of the incident Collect as much information about the incident as possible Document all findings Share this collected information to determine the root cause 23
Importance of Computer Forensics to Accountants First Responder IT Auditor Member of CERT Maintain Chain-of-Evidence Document Scene Develop Investigatory Process Manage Investigatory Process Advanced Certifications (CISA etc) 24
Beginning of Accounting About 9,000 BC 25 Double Entry Accounting
A Little Bit of History Our numbering system is based on a Hindu system that came into the Arabic world about 776 CE. This replaced the Roman that is still used today (at the end of movie credits). 26
A Little Bit of History Pingala (c. 5th-2nd century B.C.) An Indian scholar, used binary numbers in the form of short and long syllables (think Morse code).
Base 10 versus Base 2 When we talk numbers, we use a base 10 system, because we use ten characters to write out all of our numbers. Computers using binary language operate on a base-2 number system, because the two numbers they use are “0” and “1” These are called binary digits or bits.
Alphabet Soup We use the English language consisting of 26 characters. Computers use binary language consisting of 2 characters, arranged together in groups of eight, to communicate. Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz Aa = Zz = bits = 1 byte
The Byte Scale
This is where it gets tricky. 31
Binary Numbering System 32
Placeholders In the value 5,736,941 the 3 stands for 30,000 because of its location in the fifth place or 3 x 10 4 power. Nearly all numbering systems use placeholders. An exception is the Roman where they write down numbers from biggest to smallest. Ex. MCMXCVIII is
Binary to Decimal 34
Hands-on Activity 1 Use your math skills to calculate the binary number for the base-10 number provided. __=
Hands-on Activity 1 Answer Use your math skills to calculate the binary number for the base-10 number provided =
Hands-on Activity 2 __= 31 __= __= 17
Hands-on Activity 2 Answer = = =
Hands-on Activity 3 = ? = 0? Use your math skills to translate the binary number into the decimal number it represents.
Hands-on Activity 3 Answer = = Use your math skills to translate the binary number into the decimal number it represents.
Do I Really Need to Know This? 41
Hexadecimal 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 A = 10 B = 11 C = 12 D = 13 E = 14 F = 15 (highest hex value in one place) 42
Hexadecimal 43
Hexadecimal 44
Hexadecimal and Binary Base 16 (0-9, A, B, C, D, E, F) Short-hand for binary Decimal Hex Binary 255 FF ,095 FFF ,
Odometer Effect When a value reaches its maximum for the placeholders and you add 1, it rolls over. For example, in decimal 46
Hands-on Activity 1 Use your math skills to calculate the hex number for the base-10 number provided. 47 = 65, ,536 4, = 4,095 _ _ _ _ _ _ _ __ _ _
Hands-on Activity 1 Answer Use your math skills to calculate the hex number for the base-10 number provided. 48 = F65,535 F F F ,536 4, = F4,095 F F
Hands-on Activity 2 Use your math skills to calculate the hex number for the base-10 number provided. 49 = 297, ,536 4, = 83,041 _ _ _ _ _ _ _ __ _ _
Hands-on Activity 2 Answer Use your math skills to calculate the hex number for the base-10 number provided. 50 = 297, ,536 4, = 83, C
Hands-on Activity 3 Use your math skills to calculate the hex number for the base-10 number provided = 2? A 0 C ,536 4, = B? 1 A D
Hands-on Activity 3 Answer 52 1 = 2107,020 A 0 C ,536 4, = B7,085 1 A D
Hands-on Activity 1. Calculate how many bytes are in a 500 GB hard drive. 2. How many bytes are in a 64 MB memory chip? 3. A hard drive has 1 terabyte of data. How many kilobytes is that?
Hands-on Activity Answers 1. Calculate how many bytes are in a 500 GB hard drive. 500 x 1,000,000,000 = 500,000,000, How many bytes are in a 64 MB memory chip? 64 x 1,000,000 = 64,000, A hard drive has 1 terabyte of data. How many kilobytes is that? 1,000,000,000,000 = 1,000,000,000 kbytes
Hands-on Activity Your computer just received the following binary message from the keyboard. Translate the message into English
Hands-on Activity Your computer just received the following binary message from the keyboard. Translate the message into English Just kidding!
Hexadecimal Editors Many freewares available. HxD is a popular editor. 57
The Hex Editor 58
59 jpg file opened in HxD editor. Note JFIF
60 gif file opened in HxD editor. Note GIF and signature.
61 exe file opened in HxD editor. Note 2E is.exe
62 MS Word document opened in HxD editor.
63 MS Excel spreadsheet opened in HxD editor. Note DO CF 11 EO signature for all MS files.
64 Bitmap image opened in HxD editor. Note 42 4D signature for bitmap files.
File Signatures in Hex 65 File TypeSignature PDF JPGFF D8 FF E0 EXE4D 5A DLL4D 5A DOCD0 CF 11 E0 XLSD0 CF 11 E0
66 A PDF file opened in a Hex Editor
67 A PDF file opened in NotePad
68 A BMP file opened in a Hex Editor
69 A JPG file opened in a Hex Editor
“Accountants are supposed to function as the nation’s watchdogs.” 70 ~ U.S. Supreme Court, 1984
Watch Dog’s Need Big Teeth 71
End Class 2 Lecture Questions? 72