Download presentation
Presentation is loading. Please wait.
Published byCalvin Cole Modified over 8 years ago
1
Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State Police Computer Crimes Unit
2
Topics MSP Computer Crimes Unit Trends Evidence Collection Incident Reporting Evidence Analysis
3
Mission Statement CCU was established to provide computer and Internet investigative support in the acquisition of digital evidence for the law enforcement community.
5
Forensic & Investigative Services Forensics –Perform Forensic examinations of computers –Assist state, county, & local law enforcement agencies Investigations –Online Investigations –Illegal Websites –Hacking complaints –Internet Crimes Against Children
6
Trends Child Exploitation Identity Theft –Ebay –Credit Cards –Phishing Organized Crime
7
Fraud Trends
8
Phishing What is “Phishing”? –Phishing defined: the act of attempting to fraudulently acquire through deception sensitive personal information such as passwords and credit card details by masquerading in an official-looking email, IM, etc. as someone trustworthy with a real need for such information. –Wikipedia.org
9
Phishing Growing faster than any other online threat The number of unique phishing email attacks increased by 1400% in 2004 An estimated $300-$400 million in fradulent (read unauthorized) bank transfers last year
10
Phishing Phishing has been called “The Perfect Crime” –All that is needed is a PC, Internet and a little ingenuity –Difficult to catch the criminals –Hackers are doing for profit and criminals following suit
11
Phishing People who receive Phishing attacks are three times as likely to become victims. Phishing scams are for sale on the internet Ebay hijacking becoming more and more common (phishing example)phishing example
12
Phishing How is phishing done? –Believable email to victim –Use programming tricks to hide fake sites –Using pop-up windows to cloak the real address in the victim’s address bar –“Pharming” victim redirected to a scam website when the victim types in the real address
13
Phishing How can you protect yourself? –Monitor credit card statements, bills –Keep up-to-date anti-virus protection/anti- spyware/firewallsoftware installed –Obtain credit reports on a regular basis –Don’t answer unknown email –If it looks to good to be true….
14
Child Exploitaion Business maybe liable to victims if employees are using company Internet for illicit activities Control chat programs/internet usage through routine monitoring of systems Hostile work environment through inappropriate usage AUP/Banners/Incident Response Plans
15
Liability Mobile Units –PDAs –Mobile Phones Wireless Connections Web Applications Banners, AUP, Employee Handbooks
16
Incident Reporting Must report to the agency that has jurisdiction for the alleged offense Who/what/when/where/how Explain in plain English the incident www.michiganlegislature.org/www.antiphishing.o rg www.michiganlegislature.org/www.antiphishing.o rg Contact local law enforcement for Digital Forensic contact MSP Computer Crimes Contact
17
Digital Forensics
18
Definition Develop a methodology Evidence Collection Evidence Analysis
19
Digital Forensics Definition-Digital Investigation –Process where we develop and test hypothesis that answer questions abut digital events using the scientific method –Carrier, Brian. File System Forensic Analysis, Addison Wesley 2005
20
Digital Forensics Definition-Digital Evidence –A digital object that contains reliable information that supports or refutes a hypothesis. –Carrier, Brian. File System Forensic Analysis, Addison Wesley 2005
21
Digital Forensics Definition-Digital Forensic Investigation –Process that uses science and technology to analyze digital objects and develops and tests theories which can be entered into a court of law to answer questions about events that have occurred. –Carrier, Brian. File System Forensic Analysis, Addison Wesley 2005
22
Digital Forensics Digital Investigations comprised of three phases –1) System Preservation Reduce the amount of evidence that may be overwritten This continues after acquisition because of further analysis and court
23
Digital Forensics Digital Investigations comprised of three phases –2) Evidence Searching Looking for data to support or refute event theories Keywords, internet history graphics
24
Digital Forensics Digital Investigations comprised of three phases –3) Incident Analysis This phase is done to reconstruct the execution of the event The “how” of the incident
25
Evidence Collection Evidence Collection should be done in a forensically sound manner –Baseline –Minimize invasiveness –Protect original –Document everything
26
Evidence Analysis Develop/adopt a forensic methodology –Examine and document the original System Settings Peripherals Add on cards –Write protect hard disks, media –Create an exact bit by bit “forensic copy” of the subject media
27
Evidence Analysis Maintain a controlled environment Correlate and validate data obtained Document actions taken and evidence obtained
28
Forensic Software Commercial software –EnCase Enterprised Edition –SMART for Linux –Forensic Tool Kit –ProDiscover Open Source –Sleuthkit/autopsy –Live Linux Cds Helix Knoppix STD
29
Questions? D/Sgt. Michael Harrington 4000 Collins Rd Lansing MI 48910 TX: 517.336.2010 harringm@michigan.gov chimp@forensic-mind.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.