darwinism via forensics
play

Darwinism via Forensics People Make Dumb Decisions With Todays - PowerPoint PPT Presentation

Darwinism via Forensics People Make Dumb Decisions With Todays Technology Bill Dean, CCE Senior Manager, LBMC Information Security February 7, 2017 Todays Agenda Digital Forensics Basics How Does it work? Applicable Case Studies


  1. Darwinism via Forensics People Make Dumb Decisions With Today’s Technology Bill Dean, CCE Senior Manager, LBMC Information Security February 7, 2017

  2. Today’s Agenda  Digital Forensics Basics • How Does it work?  Applicable Case Studies • They Really did that?  “Pro” Tips Along the Way  This Will Not Be Boring 2

  3. Digital Forensics Basics  Recovering/Analyzing Deleted Information  Keyword Searching  Digital Communications  Internet Activities  Pictures/Movies  File Activity  External Storage Usage  Metadata/EXIF Data  Application Execution Histories  Anti-Forensics Efforts 3

  4. Technologies We Analyze  Computers  Servers  Memory  Mobile Devices  Cloud Storage  Removable Media  GPS Devices  Watches/FitBits 4

  5. Deleted Information 5

  6. Deleted Information 6

  7. Keyword Searching  Valuable..But Boring  Very Flexible • Operators (and, or, not) • Proximity (plum w/5 pear)  Stemming  Fuzzy  Synonym 7

  8. Communications  Conventional Email  Webmail (Gmail, Hotmail, etc.)  Associated Attachments  Social Network Communications  We will discuss TXT messaging later 8

  9. Internet Histories  Tells a Story  We Know What You Are Thinking  Google Keeps Your Search Histories (and more)  We Recover Deleted Internet Histories  We Don’t Care Which Browser You Use 9

  10. Facebook Chats  Suspected Affair  Suspect Learned About Investigation • Cleared All Chat Histories • Deleted Internet Histories  Didn ’ t Matter  282 Facebook Chat Messages Recovered  Exactly What Was Suspected 10

  11. Employment Matter  Workplace Injury  “Diminished Quality of Life”  Internet Research • Condition Symptoms • Workers’ Compensation Calculators • Computer Forensics  Personal Pictures • Vacations • Orange/White Game • Lake Activities 11

  12. File activity  Creation  Modification  Accessed  Deleted  Opened • From Where 12

  13. External Storage Usage  We Know Every USB Device Used • USB Storage • Mobile Phones • GPS Devices • Anything Else  First and Last Times Used • Sometimes Each time • And How Long  Model and Serial Number 13

  14. 14

  15. 15

  16. Intellectual Property Theft  12/22 – Employee Resigned from Company  12/02 – Google Search for “ Is ____ a good company to work for?”  12/10 – Copied “Projects” Folder to Desktop  Folder Contained 5000+ Proprietary Designs 16

  17. Intellectual Property Theft  12/22 @ 1:10AM – Laptop was powered on  12/02 @ 1:11AM – Laptop recognized USB drive  12/22 @ 1:13 – The “Projects” folder was moved to USB  12/22 @ 2:03 – Laptop was powered off 17

  18. Application Executions  We know the first execution date/time  We know the last execution date/time  We know how many executions  We know what user executed the application 18

  19. “Easy” Trade Secret Theft  Employee Resigned on May 6, 2011  Google Query “ How do I link another email account to Gmail if that other account uses IMAP? ”  Copied sensitive information to USB  DropBox installed March 3, 2011  DropBox uninstalled May 6, 2011 19

  20. “Easy” Trade Secret Theft 20

  21. “Easy” Trade Secret Theft 21

  22. “Easy” Trade Secret Theft 22

  23. DropBox ≠ “Easy” Trade Secret Theft  Analysis of home machine  Business secrets “synchronized”  Copied sensitive information to USB  Copied to USB drive on May 7, 2011  DropBox uninstalled May 6, 2011 23

  24. MetaData/EXIF Data  “Information about Information” • Dates of Creation or Access • Authors • Prior Histories • Editing Histories • Printing  Email  Spreadsheets  Office Documents  Pictures 24

  25. MetaData Case Study #1 25

  26. MetaData Case Study #1 26

  27. MetaData Case Study #2 27

  28. Anti-Forensics Efforts  Effort to Conceal/Destroy  Most Often Noticeable  Special Programs  System Utilities 28

  29. Anti-Forensics Case Study 29

  30. 30

  31. Klumb v. Goan  Young Attorney Marries Established Businessman  We Need to “Monitor” the Children  Speculation of a “Plan” 31

  32. http://www.goklg.com/2012/08/01/ex-spouse-hit-with-20k-in-damages-for-email- eavesdropping-klumb-v-goan/ 32

  33. Divorce Grand Scheme  All Computers Involved  Hundreds of YahooMail! Emails Recovered  Discrepancies of Emails Produced in Discovery  “I don’t have a USB drive”  Conflicting Antenuptual Agreements http://cyb3rcrim3.blogspot.com/2012/08/eblaster-wiretapping-and-prenup.html 33

  34. Ruthless Business Partner  Company Ownership Split  Competing Company Knew “Everything”  Thought Offices Were Bugged 34

  35. Triple Crown Winner  11/10 – Employee Dismissed (All Access Not Removed)  1/24 – Someone Connected and “Cracked” Passwords  1/25 – Someone Installed Remote Control Software • Began Accessing Sensitive Computers • Began Accessing CCTV Systems • Accessed Sensitive Information 35

  36. Triple Crown Winner  2/20 – Connected to Computer • Recovered Passwords • Accessed Email of – IT Director – Purchasing Manager  Placed Online Orders  Searched for More Credit Card Info 36

  37. Nation State Espionage  “ I Have Not Been to China”

  38. Nation State Espionage  “OK.. Maybe Once or Twice”

  39. iMessage Sync = $ Divorce  Suspected Affair  iMessage Communications  Borrowed Son’s iPad  Entire Conversation Synced 39

  40. Bill Dean, CCE bdean@lbmc.com (865) 862-3051

Recommend


More recommend