360 likes | 522 Views
BACS 371 Computer Forensics. Jay M. Lightfoot, Ph.D., GCFA Spring 2014. Welcome!. Welcome to BACS 371—Computer Forensics. This course will likely be one of the most challenging (and interesting) courses of your degree program.
E N D
BACS 371 Computer Forensics Jay M. Lightfoot, Ph.D., GCFA Spring 2014
Welcome! Welcome to BACS 371—Computer Forensics. This course will likely be one of the most challenging (and interesting) courses of your degree program. It is a mixture of law enforcement, technical computer science, and psychology.
Computer Forensics… … involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis.1 1Kruse & Heiser, Computer Forensics: Incident Response Essentials, Lucent Technologies, 2002
Course Overview • Syllabus • Reading • Textbooks • Supplementary Articles • Grading • In-Class Assignments • Homework (papers, podcast write-ups, forensic problems, …) • Labs • Quizzes • Exams • Misc.
In-Class work • Periodically I will assign relatively small projects that are intended to be done during class. • These will be due at the beginning of the next class period. • Often, you won’t finish the project during class, so despite the “in-class” name, you will sometimes need to work on them out of class also.
Homework • Homework will periodically be assigned. • Homework problems are more elaborate than in-class work and generally take more time. • You will generally not be given class-time to work on homework. • It is due at the beginning of the period on the due date. • Most homework are “individual assignments.”
Lab Projects • Lab projects are more elaborate than in-class work and normally take several days to complete. • Most lab projects will be “group projects”. • A group consists of 2 people. One project is turned in for the group and both members share the same grade. • It is up to you to make sure that each member understands the project well enough to answer questions on the test. • Off-hour lab access can be arranged via your Bear Card. • Some special hardware may be assigned to your group. You are responsible for keeping track of it and making sure that it is put up after use. • You will each need to have a USB flash drive (8GB or more). • Optionally, you may also want to purchase a 2.5 inch external drive (80 GB minimum).
Quizzes • Quizzes are short, unannounced “tests” that are given over recently covered material. • They are normally given at the beginning of class. • If you arrive late, you do not have extra time to complete them. • There are no make-up quizzes (but I do drop the lowest quiz grade). • They are intended to help you know areas that you need to study prior to the tests.
Examinations • There are 3 examinations in this course. • The first 2 are worth 15% of your grade and the 3rd (i.e., the “final”) is worth 25%. • The final is comprehensive. The first 2 examinations only cover the new material (to the extent possible). • There are rules that allow you to make up one of the first 2 examinations; but you cannot make up the final. (See syllabus for details).
Course Expectations • This is a new field – help me create content for the semester! • Work hard, read all assignments, look for alternative sources of information • Ask Questions!!Be Curious! Be sure you understand as you go. • Fast pace! • Somewhat obscure material! (sorry, but it is) • Learn from your classmates • When you learn new things, Teach the rest of us!
Create a Course Binder • Reading • Supplementary Articles • Notes distributed during class • Assignments • In-Class Activities • Labs • Homework Assignments • Presentation Slides • Class Notes • Document templates • Chain of custody • Evidence gathering notes • etc. • Other References
Internet Crime Complaint Center2012 Internet Fraud Crime Report (latest available) • Internet Fraud Complaint Center (IFCC) began operation May 8, 2000 • Partnership between National White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI) • Vehicle to receive, develop, and refer criminal complaints in cyber crime • Renamed Internet Computer Crime Complaint Center (IC3) on December 1, 2003 http://www.ic3.gov • Data from January 1, 2011 – December 31, 2012 • 289,874 complaints received for $525,444,110 (8.3% $ increase over 2011) • 114,908 of these involved a monetary loss • Average dollar loss: $4,573 Top 5 reported loss categories (as of 2011 report): • FBI-Relates scams: 35,764 • Advanced fee fraud: 27,892 • Identity theft: 28,915 • Non-Auction, Non-delivery of merchandise: 22,404 • Overpayment fraud: 18,511
FBI Computer Forensics Lab in Colorado http://www.rcfl.gov/ http://www.rmrcfl.org/ CENTENNIAL, COLO. (AP) _ A NEW FORENSIC LABORATORY WILL OPEN NEXT MONTH TO HELP LAW ENFORCEMENT AUTHORITIES IN COLORADO AND WYOMING INVESTIGATE CRIMES INVOLVING TECHNOLOGY. ANALYSTS AT THE ROCKY MOUNTAIN REGIONAL COMPUTER FORENSIC LABORATORY IN CENTENNIAL CAN WORK WITH SEIZED COMPUTERS TO DREDGE UP DELETED FILES, SEE WHAT WEB SITES HAVE BEEN DISPLAYED AND FIND E-MAIL MESSAGES. DENVER (AP) _ THE NUMBER OF INCIDENTS INVOLVING NURSES AND OTHER MEDICAL PROFESSIONALS STEALING DRUGS MEANT FOR PATIENTS IS GROWING -- DESPITE TECHNOLOGY IN NARCOTICS DISPENSERS THAT MAKES THAT INCREASINGLY DIFFICULT. STATE OFFICIALS SAYS THERE WERE 76 CASES OF ``DIVERTED DRUGS'' IN COLORADO'S HOSPITALS THIS FISCAL YEAR -- ALMOST TRIPLE THE 26 reported in FISCAL YEAR 2001.
Famous Cases with Forensic Links • Enron • BTK Killer • Chandra Levy • Wikileaks • Times Square bomber • . . .
Laws and Statues Coverage • Regarding Computer Crime • Regarding Collection of Digital Evidence • Regarding Handling of Digital Evidence • Regarding Disposition & Analysis of Digital Evidence • Regarding Privacy
Computer Basics • Hardware • CPU/Motherboard • Hard Drive • Removable Drives • Networking (minimal coverage) • Software • Operating Systems (DOS/Windows/UNIX) • File Systems (FAT32/NTFS/EXT3) • Applications (MS Word, Adobe, Outlook, …)
Computer Forensic Methods • Active Data • Data intentionally remaining on the computer • Data hidden in plain sight • Latent Data • Data unintentionally remaining on the computer • Data recoverable by forensic methods • Live vs. Dead analysis
BACS 371 Will Not Cover • Network Forensics • File Systems other than FAT/NTFS • E.g.: no Mac, DVD, CD • Malware • E.g.: Viruses, Trojan Horses, Spyware, … • Prevention • Advanced Data Hiding • Breaking Password Protection • Encrypted Files • Compressed Files • Steganography
Careers in Computer Forensics • Law Enforcement • Criminal Investigation • Corporate Computer Security • DoD/Military/Government • Information Technology • Consulting Firms • Expert Witness
Characteristics of a Good Cyber Investigator1 • Excellent observation skills • Good memory • Organization skills • Documentation skills • Objectivity • Knowledge • Ability to think like a criminal • Intellectually controlled constructive imagination • Curiosity • Stamina • Patience • Love of learning 1Scene of the Cybercrime, Shinder & Tittel, p.136
Plus1… • A basic knowledge of computer science • An understanding of computer networking protocols • Knowledge of computer jargon • An understanding of hacker culture • Knowledge of computer and networking security issues • Knowledge of computer file systems (FAT, FAT32, NTFS, Ext2, etc) 1Scene of the Cybercrime, Shinder & Tittel, p.136
The Perfect Forensics Candidate1 • Strong Computer Skills • Investigative Background • Understanding of state and federal statutes relating to the collection and preservation of evidentiary data • Understanding of criminal statues • High ethical and moral standards 1The Perfect Forensics Candidate,Computerworld, January 14, 2002, http://www.computerworld/com/printthis/2002/0,4814,67228,00.html