Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime
Total Page:16
File Type:pdf, Size:1020Kb
The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime Author(s): Gary R. Gordon ; Chet D. Hosmer ; Christine Siedsma ; Don Rebovich Document No.: 198421 Date Received: January 2003 Award Number: 2000-LT-BX-K002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime A study sponsored by the National Institute of Justice under grant number 2000-96 14-NY-IJ February 4,2002 The Computer Forensics Research & Development Center (CFRDC) At Utica College al WetStone Technologies, Inc. Dr. Gary R. Gordon - Director, CFRDC at Utica College Chet D. Hosmer - President, WetStone Technologies, Inc. Christine Siedsma - Project Coordinator, CFRDC at Utica College Dr. Don Rebovich - Associate Professor, Economic Crime Programs, Utica College Supported under Award number 2000-LT-BX-KO02 from the Office of Justice Programs, US Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position of the U.S. Department of Justice *-. PROPERTY OF National Cn'mmal Justice Reference Service (NCJRS) Box 6000 Rockville, MD 20849-6000 &@-- This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Acknowledgements This report is the work of many individuals. The staff of the Computer Forensics Research & Development Center at Utica College, Christine Siedsma and Matt Ward, contributed many hours of research and analysis. Dr. Don Rebovich, Professor of Economic Crime Programs at Utica College, provided incisive advice on the research methodology and thoughtful editorial support. Thanks to the WetStone Technologies, Inc. staff who contributed to the effort: Chris Hyde and Todd Grant. We wish to express our thanks to the Northeast Law Enforcement and Corrections Technology Center (NLECTC) staff: John Ritz, Fred Demma, and Jim Riccardi. A special thanks goes to the Air Force Research Lab Information Directorate for funding several earlier efforts that provided the foundation for this work. We especially owe a great deal of gratitude to Joe Giordano, Technical Director. We would like to thank NU for supporting this project, and specifically Trent DePersia and Amon Young for their direction and patience. Most importantly, we owe a great deal to the numerous law enforcement personnel who provided comments, suggestions, and completed the survey. Thank you. Gary R. Gordon Chester D. Hosmer This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Table of Contents Acknowledgements ............................................................................................................. 2 Table of Contents ................................................................................................................ 3 Introduction ......................................................................................................................... 7 Computer Crime: New Investigative Needs for an Emerging Crime Area ..................... 7 Responding to a Growing Crime Problem For the 21’‘ Century ..................................... 8 Scope of the Problem ...................................................................................................... 9 The Approach of This Report: “Leveling” the Playing Field ....................................... 10 Task 1: Assessment of Tools Used in the Commission of Cyber Crimes ................... 13 Objective ........................................................................................................................... 13 Approach ........................................................................................................................... 13 Structure of Task 1 ............................................................................................................ 14 Description Section ....................................................................................................... 14 Evidentiary Value Section............................................................................................. 14 Introduction ....................................................................................................................... 14 The Roles....................................................................................................................... 15 Target ........................................................................................................................ 15 Instrumentali ty .......................................................................................................... 16 Incidental ................................................................................................................... 17 Introduction to the Tools ................................................................................................... 18 a Computer as the Instrumentality of Cyber Crime ......................................................... 18 Gaining Unauthorized Access ................................................................................... 18 Advancement of a Crime........................................................................................... 28 Computer as the Target of Cyber Crime ....................................................................... 30 Computer Incidental to Cyber Crime ............................................................................ 35 Concluding Remarks ......................................................................................................... 38 Task 2: Assessment of Cyber Crime Technologies Available to Law Enforcement 40 Introduction ....................................................................................................................... 40 Tool Selection and Assessment Criteria............................................................................ 40 Cyber Forensic Investigation.. Methodology ...................................................................... 41 Goals of an Investigation ............................................................................................... 41 Computer Forensics........................................................................................................... 43 Evidence Collection and Preservation ............................................................................... 44 Investigative Considerations ......................................................................................... 44 Disk Imaging Considerations........................................................................................ 45 Evidence Collection and Preservation Tools .................................................................... 46 Disk Imaging Tools ....................................................................................................... 47 Software Imaging Tools ............................................................................................ 47 Hardware Imaging Devices ....................................................................................... 49 Image Restoration Tools ........................................................................................... 50 Imaging Validation Tools .............................................................................................. 5 1 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Write Protection/Write Blocking Tools ........................................................................ 52 Hardware Write Blockers .......................................................................................... 52 System Time Recognition ............................................................................................. 52 . Evidence Collection and Preservation Assessment ....................................................... 53 Evidence Extraction .......................................................................................................... 53 Evidence Extraction Tools ................................................................................................ 53 Hidden Data Recovery Tools ........................................................................................ 53 Deleted Files .............................................................................................................