Grover Kearns, PhD, CPA, CFE, CITP Catching Al Capone : What All Accountants Should Know About Computer Forensics.

Slides:



Advertisements
Similar presentations
Practical Application of Computer Forensics Lisa Outlaw, CISA, CISSP, ITIL Certified.
Advertisements

DATA PROCESSING SYSTEMS
Computer Forensics.
Evidence Collection & Admissibility Computer Forensics BACS 371.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
In the subject line write PLZ ADD ME in all caps. Send me first and last names and addresses. If I do not confirm your request that means I did not.
Guide to Computer Forensics and Investigations, Second Edition
BACS 371 Computer Forensics
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
ABC Book by student/teacher name
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
COS/PSA 413 Lab 4. Agenda Lab 3 write-ups over due –Only got 9 out of 10 Capstone Proposals due TODAY –See guidelines in WebCT –Only got 4 out of 10 so.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Learning Letter Sounds Jack Hartman Shake, Rattle, and Read
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Ms. Giannini Kindergarten Language Arts Lesson 2.
Grover Kearns, PhD, CPA, CFE Computer Forensics for Accountants Class 2 Summer 2013.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Guide to Computer Forensics and Investigations, Second Edition Chapter 2 Understanding Computer Investigation.
Working with text ASCII and UNICODE.   
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Skill Area 311 Part A. Lecture Overview Binary Numbers Binary Arithmetic ASCII Code Machine Code Instruction Format Advantages and disadvantages of machine.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
1 IT Investigative Tools Tools and Services for the Forensic Auditor.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Alphabet Book. Have students take pictures or draw (and then scan) images for each letter they can then copy and paste the images into the slide with.
By: Megan Guild and Lauren Moore. Concept Map Mountain Stream Co. OS Active wear Computer Security Their Questions Details Examples Computer Forensics.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
1 Aa 2 a 3 apple.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Catching Al Capone : What All Accountants Should Know About Computer Forensics.
The Alphabet Review.
Intrusion Detection MIS ALTER 0A234 Lecture 12.
This project has been funded with support from the European Commission. This courseware reflects the views only of the authors,
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
PhD Oral Exam Presentation
Computer Forensics 1 1.
Guide to Computer Forensics and Investigations Fifth Edition
Ms. Katie’s Kindergarten Class
Computer Forensics Discovery and recovery of digital evidence
Introduction to Computer Forensics
Snakes & Ladders Board Game
Miss Schwarz’s class rules
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Revolutionary America Pre-AP U.S. History | QVMS
By: The Kid’s in Mrs. Tower’s Room
The English Alphabet/Alphabetic Words/Simple Sentences
Exam Information CSI5107 Network Security.
The ABC’s of Web Site Evaluation
ABC Book by student/teacher name
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presentation transcript:

Grover Kearns, PhD, CPA, CFE, CITP Catching Al Capone : What All Accountants Should Know About Computer Forensics

ScarfaceScarface

Eliot Ness

Catching Al Capone Capone was known to be responsible for a wide array of felonies and violent crimes but evidence was lacking Witnesses tended to disappear Direct evidence was needed Business records provide direct evidence Careful search, analysis, and handling of data are required to produce data that are acceptable as evidence 5

Survey Shows Companies Fear Fraud, But Many Not Prepared Ernst & Young's 9th Global Fraud Survey: Fraud Risk in Emerging Markets 60 percent of multinationals say they believe fraud is more likely to occur in emerging market operations than developed markets Robust internal controls remain the first line of defense against fraud for companies in all markets 6

8 Why Accountants and auditors … are better positioned to detect computer based fraud can assist in maintaining a chain-of-custody for digital evidence can better communicate with IT employees can promote IT-based internal controls can assist in the efficient use of IT resources

Common Applications of Computer Forensics Employee internet abuse  common, but decreasing Unauthorized disclosure of corporate information and data  accidental and intentional Industrial espionage Damage assessment Criminal fraud and deception cases 9

Cardinal Rules of Evidence Handling Only use tools and methods that have been tested and evaluated to validate their accuracy and reliability. Handle the original evidence as little as possible to avoid changing the data. Establish and maintain the chain of custody. Document everything done. Never exceed personal knowledge 10

Forensic Accountants are Involved In Criminal Investigations Shareholders' and Partnership Disputes Personal Injury Claims Business Interruption Fraud Investigations Matrimonial Disputes Professional Negligence Mediation and Arbitration 11

Computer forensics can be defined as the collection and analysis of data from computersystems, networks, communication streams (wireless) and storage media in a manner that is admissible in a court of law. -CERT 12

“Computer forensics” can thus not afford solely to concern itself with procedures and methods of handling computers, the hardware from which they are made up and the files they contain. The ultimate aim of forensic investigation is use in legal proceedings [Mandia 01]. The objective in computer forensics is quite straightforward. It is to recover, analyze and present computer based material in such a way that it is useable as evidence in a court of law [Mandia 01].

14 Digital Crime Scene Investigation Digital Forensic Investigation A process that uses science and technology to examine digital objects and that develops and tests theories, which can be entered into a court of law, to answer questions about events that occurred. IT Forensic Techniques are used to capture and analyze electronic data and develop theories.

15 Audit Goals of a Forensic Investigation Uncover fraudulent or criminal cyber activity Isolate evidentiary matter (freeze scene) Document the scene Create a chain-of-custody for evidence Reconstruct events and analyze digital information Communicate results

16 Audit Goals of a Forensic Investigation Immediate Response Shut down computer (pull plug) Bit-stream mirror-image of data Begin a traceback to identify possible log locations Contact system administrators on intermediate sites to request log preservation Contain damage and stop loss Collect local logs Begin documentation

17 Audit Goals of a Forensic Investigation Continuing Investigation Implement measures to stop further loss Communicate to management and audit committee regularly Analyze copy of digital files Ascertain level and nature of loss Identify perpetrator(s) Develop theories about motives Maintain chain-of-custody

18 Digital Crime Scene Investigation Scene Preservation & Documentation Goal: Preserve the state of as many digital objects as possible and document the crime scene. Methods:  Shut system down  Unplug (best)  Do nothing Bag and tag

19 Audit Goals of a Forensic Investigation Requirements for Evidence Computer logs … Must not be modifiable Must be complete Appropriate retention rules

20 Digital Crime Scene Investigation Problems with Digital Investigation Timing essential – electronic evidence volatile Auditor may violate rules of evidence NEVER work directly on the evidence Skills needed to recover deleted data or encrypted data

21 Digital Crime Scene Investigation Extract, process, interpret Work on the imaged data or “safe copy” Data extracted may be in binary form Process data to convert it to understandable form  Reverse-engineer to extract disk partition information, file systems, directories, files, etc  Software available for this purpose Interpret the data – search for key words, phrases, etc.

22 Digital Crime Scene Investigation Technology Magnetic disks contain data after deletion Overwritten data may still be salvaged Memory still contains data after switch-off Swap files and temporary files store data Most OS’s perform extensive logging (so do network routers)

Role of a First Responder Essentially the first person notified and reacting to the security incident Responsibilities: Determine the severity of the incident Collect as much information about the incident as possible Document all findings Share this collected information to determine the root cause 23

Importance of Computer Forensics to Accountants First Responder IT Auditor Member of CERT Maintain Chain-of-Evidence Document Scene Develop Investigatory Process Manage Investigatory Process Advanced Certifications (CISA etc) 24

Beginning of Accounting About 9,000 BC 25 Double Entry Accounting

A Little Bit of History Our numbering system is based on a Hindu system that came into the Arabic world about 776 CE. This replaced the Roman that is still used today (at the end of movie credits). 26

A Little Bit of History Pingala (c. 5th-2nd century B.C.) An Indian scholar, used binary numbers in the form of short and long syllables (think Morse code).

Base 10 versus Base 2 When we talk numbers, we use a base 10 system, because we use ten characters to write out all of our numbers. Computers using binary language operate on a base-2 number system, because the two numbers they use are “0” and “1” These are called binary digits or bits.

Alphabet Soup We use the English language consisting of 26 characters. Computers use binary language consisting of 2 characters, arranged together in groups of eight, to communicate. Aa Bb Cc Dd Ee Ff Gg Hh Ii Jj Kk Ll Mm Nn Oo Pp Qq Rr Ss Tt Uu Vv Ww Xx Yy Zz Aa = Zz = bits = 1 byte

The Byte Scale

This is where it gets tricky. 31

Binary Numbering System 32

Placeholders In the value 5,736,941 the 3 stands for 30,000 because of its location in the fifth place or 3 x 10 4 power. Nearly all numbering systems use placeholders. An exception is the Roman where they write down numbers from biggest to smallest. Ex. MCMXCVIII is

Binary to Decimal 34

Hands-on Activity 1 Use your math skills to calculate the binary number for the base-10 number provided. __=

Hands-on Activity 1 Answer Use your math skills to calculate the binary number for the base-10 number provided =

Hands-on Activity 2 __= 31 __= __= 17

Hands-on Activity 2 Answer = = =

Hands-on Activity 3 = ? = 0? Use your math skills to translate the binary number into the decimal number it represents.

Hands-on Activity 3 Answer = = Use your math skills to translate the binary number into the decimal number it represents.

Do I Really Need to Know This? 41

Hexadecimal 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 A = 10 B = 11 C = 12 D = 13 E = 14 F = 15 (highest hex value in one place) 42

Hexadecimal 43

Hexadecimal 44

Hexadecimal and Binary Base 16 (0-9, A, B, C, D, E, F) Short-hand for binary Decimal Hex Binary 255 FF ,095 FFF ,

Odometer Effect When a value reaches its maximum for the placeholders and you add 1, it rolls over. For example, in decimal 46

Hands-on Activity 1 Use your math skills to calculate the hex number for the base-10 number provided. 47 = 65, ,536 4, = 4,095 _ _ _ _ _ _ _ __ _ _

Hands-on Activity 1 Answer Use your math skills to calculate the hex number for the base-10 number provided. 48 = F65,535 F F F ,536 4, = F4,095 F F

Hands-on Activity 2 Use your math skills to calculate the hex number for the base-10 number provided. 49 = 297, ,536 4, = 83,041 _ _ _ _ _ _ _ __ _ _

Hands-on Activity 2 Answer Use your math skills to calculate the hex number for the base-10 number provided. 50 = 297, ,536 4, = 83, C

Hands-on Activity 3 Use your math skills to calculate the hex number for the base-10 number provided = 2? A 0 C ,536 4, = B? 1 A D

Hands-on Activity 3 Answer 52 1 = 2107,020 A 0 C ,536 4, = B7,085 1 A D

Hands-on Activity 1. Calculate how many bytes are in a 500 GB hard drive. 2. How many bytes are in a 64 MB memory chip? 3. A hard drive has 1 terabyte of data. How many kilobytes is that?

Hands-on Activity Answers 1. Calculate how many bytes are in a 500 GB hard drive. 500 x 1,000,000,000 = 500,000,000, How many bytes are in a 64 MB memory chip? 64 x 1,000,000 = 64,000, A hard drive has 1 terabyte of data. How many kilobytes is that? 1,000,000,000,000 = 1,000,000,000 kbytes

Hands-on Activity Your computer just received the following binary message from the keyboard. Translate the message into English

Hands-on Activity Your computer just received the following binary message from the keyboard. Translate the message into English Just kidding!

Hexadecimal Editors Many freewares available. HxD is a popular editor. 57

The Hex Editor 58

59 jpg file opened in HxD editor. Note JFIF

60 gif file opened in HxD editor. Note GIF and signature.

61 exe file opened in HxD editor. Note 2E is.exe

62 MS Word document opened in HxD editor.

63 MS Excel spreadsheet opened in HxD editor. Note DO CF 11 EO signature for all MS files.

64 Bitmap image opened in HxD editor. Note 42 4D signature for bitmap files.

File Signatures in Hex 65 File TypeSignature PDF JPGFF D8 FF E0 EXE4D 5A DLL4D 5A DOCD0 CF 11 E0 XLSD0 CF 11 E0

66 A PDF file opened in a Hex Editor

67 A PDF file opened in NotePad

68 A BMP file opened in a Hex Editor

69 A JPG file opened in a Hex Editor

“Accountants are supposed to function as the nation’s watchdogs.” 70 ~ U.S. Supreme Court, 1984

Watch Dog’s Need Big Teeth 71

End Class 2 Lecture Questions? 72