NCIS Overview. Prevent Terrorism Protect Secrets Reduce Crime



Similar documents
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network Incident Report

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Massachusetts Digital Evidence Consortium. Digital Evidence Guide for First Responders

Malware & Botnets. Botnets

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Cyber Security Awareness. Internet Safety Intro.

Infocomm Sec rity is incomplete without U Be aware,

e-discovery Forensics Incident Response

RMAR Technologies Pvt. Ltd.

Detailed Description about course module wise:


HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Top tips for improved network security

Common Cyber Threats. Common cyber threats include:

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Security A to Z the most important terms

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Section 12 MUST BE COMPLETED BY: 4/22

COB 302 Management Information System (Lesson 8)

FORBIDDEN - Ethical Hacking Workshop Duration

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Internet security: Shutting the doors to keep hackers off your network

Don t Fall Victim to Cybercrime:

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Information Security Incident Management Guidelines

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Managed Security Services

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

e-discovery Forensics Incident Response

Computer Security Maintenance Information and Self-Check Activities

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

The Leading Provider of Endpoint Security Solutions

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Internet Security. For Home Users

Data Security Incident Response Plan. [Insert Organization Name]

Network Security and the Small Business

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Protecting Organizations from Cyber Attack

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Scene of the Cybercrime Second Edition. Michael Cross

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

An overview of IT Security Forensics

Defending Against Data Beaches: Internal Controls for Cybersecurity

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

Cyber Security Response to Physical Security Breaches

Cyber Security Presentation Cyber Security Month Curtis McNay, Director of IT Security

BSHSI Security Awareness Training

Advanced Threat Protection with Dell SecureWorks Security Services

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY

Austin Peay State University

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

COSC 472 Network Security

Securing Endpoints without a Security Expert

Course Title: Penetration Testing: Network & Perimeter Testing

Who s Doing the Hacking?

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

INTRUSION DETECTION SYSTEM

EC-Council Ethical Hacking and Countermeasures

Protecting your business from fraud

October Is National Cyber Security Awareness Month!

Network Usage Guidelines Contents

Introduction to Computer Security

Information Technology Cyber Security Policy

Loophole+ with Ethical Hacking and Penetration Testing

Mobile Devices and Malicious Code Attack Prevention

High Speed Internet - User Guide. Welcome to. your world.

Security Policy JUNE 1, SalesNOW. Security Policy v v

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

COUNSEL S CHAMBERS LIMITED

Big Data for Public Safety: 4 use cases for intelligence and law enforcement agencies to leverage Big Data for crime prevention.

Actions and Recommendations (A/R) Summary

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

NATIONAL CYBER SECURITY AWARENESS MONTH

How to stay safe online

National Cyber Security Month 2015: Daily Security Awareness Tips

Chapter 7 Securing Information Systems

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Penetration Testing Service. By Comsec Information Security Consulting

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

The FBI and the Internet

How To Protect Your Network From Attack From A Hacker On A University Server

CEH Version8 Course Outline

Transcription:

NCIS Overview NCIS, a civilian organization, is the primary law enforcement and counterintelligence arm of the United States Department of the Navy. It works closely with other local, state, federal, and foreign agencies to counter and investigate the most serious crimes threatening the war fighting capability of Navy and Marine Corps. To accomplish this mission, NCIS pursues three strategic priorities: Prevent Terrorism Protect Secrets Reduce Crime NCIS employees approximately 2400 personnel world wide in over 140 locations: Special Agents Professional Support Analyst Forensic Experts Security Specialists UNCLASSIFIED 09-14-2009

Cyber Department Mission Directly support NCIS' mission objectives of preventing terrorism, protecting secrets and reducing major crimes. The Cyber Department leverages, deploys and executes advanced technologies and methodologies to process, identify and present electronic data of intelligence or evidentiary value to identify the human element behind the computer. Special Agents = Control of Investigations and Operations Investigative Computer Specialist = Conduct forensic analysis of media Computer Scientist = Provide technical expertise and guidance with new technologies and forensic tools Analyst = Provide detailed analysis of recovered data for additional leads/actions Approximately 110 personnel world wide UNCLASSIFIED 09-14-2009

STATISTICS Where Do Internet Users Live? 729.2 Million Total Worldwide Users (2003-2004) Only 35% of Websites are in English. 14% Chinese. 9.6% Japanese. 9% Spanish. 7.3% German. 4% Korean.

LAW ENFORCEMENT A Typical Computer Crime Scene Tower CPU Other Storage media Removable Storage Media

LAW ENFORCEMENT Computer Crime Scene cont. Media & Storage Pirated Software Backed-up Files Contraband Other Leads Website names Other Names and addresses Real / e-mail Telephone Numbers Bills from ISP, etc.

LAW ENFORCEMENT Computer Crime Scene cont. Hackers & Pedophiles are pack rats. Don t overlook any area it may contain potential evidence. More storage media, contraband, & leads on other suspects

LAW ENFORCEMENT A Computer Crime Scene cont. Hope there are no fish in here! Upstairs Room Secondary Computer Search Location Wireless Router

LAW ENFORCEMENT A Computer Crime Scene cont. What else? Pictures of serial numbers Pictures of wiring setup

Suspect s Automobile 5 5 2 6 1 4 1. IPOD in gym bag 2. CD/DVD jukebox residing under the seat 3. Game device* 4. 2nd cell phone* 250 contacts 30 min audio text messaging log 5. GPS Navigation System routes/locations continuous breadcrumbs 6. PDA wireless internet ready* 7. LoJack tracking device (hidden) 3 UNCLASSIFIED 09-14-2009

LAW ENFORCEMENT Digital Devices (Scary!)

Suspect s Work Office 2 6 7 8 1 4 9 10 5 3 1. Laptop computer* 500GB 2. Assorted Media 100GB 3. PDA* 20GB 4. External Hard Drive 500GB 5. Cellular Phone* 1-16 GB 6. KVM Switch 7. Network Switch/Hub* 8. CD DVD Burner 9. Multi-Card Reader 10. USB Hub Workspace contains desktop and server storage information. *Possible network interface

LAW ENFORCEMENT Law Enforcement Points Any Crim/Fraud/CI investigation can benefit from analysis of digital storage media and digital devices. Contact a Cyber Department Agent for help when seizing digital media. When in doubt, consult your digital evidence field manual for techniques of proper seizures methods.

NCIS Cyber Department The Forensic Acquisition & Examination Process

FORENSIC PROCESS Electronic Media Forensics What is the goal? Safely Seize Original Media. Acquire a Forensic Image to guarantee the preservation of the original data. Conduct Analysis of the data to find the puzzle pieces that fit. Work with the case agent to present evidence to the Courts.

FORENSIC PROCESS Electronic Media Forensics The Process Device Acquisitions: Bit-by-Bit copying of digital storage media to preserve the original and provide a working copy for examination

FORENSIC PROCESS Computer Forensics Forensic Tools EnCase: One industry standard tool for forensic analysis of digital media View contents of media, complete file structure, restore deleted files

FORENSIC PROCESS Cyber Dept. Forensic Roadmap Probable Cause Search & Physical Seizure Forensic Image Acquisition Detailed Analysis Report Generation Testify

Computer Investigation and Operations THREATS

THREATS Many Potential Cyber Threats 1. Insiders (highest threat) 2. Black Hat/White Hat Hackers 3. Recreational Hackers 4. Terrorists 5. Foreign Military 6. Organized Crime 7. Industrial Espionage 8. Hacktivists

THREATS Viruses & Trojans Malicious Code A program that executes unwanted commands while also sometimes copying itself to make removal difficult and transmission easy Scripts A string of OS specific commands. Can be hidden inside other, useful, applications & launched via backdoors, etc. Worms More invasive but less destructive. They spread like a virus by scanning network they are attached to for other open computers.

THREATS Computer Intrusions Who is doing it and why? Intelligence agencies: Theft of research & technology (Source code/databases/contract data) Industrial espionage: Money (theft of copyright & proprietary data/trade secrets) Hackers: Mainly just for the phun of it, bragging rights and now profit!

THREATS Industrial Espionage Who s spying now? Everyone! Targets Private & Commercial Companies DoD Sponsored Contracts Universities Military Computer Systems

THREATS Hacker Behavior Distributed Denial of Service Attack: Electronic bombardment of data to a server, clogging its ports and making access impossible or causing shutdown Backdoors: Code left on a computer lies dormant until activated; High Unused Ports left open allows hackers remote access to the system. Can be used for anything from stealing files to enabling full simulated control over the machine and its resources Cyber War: International Hacker groups wage war on the Internet. Systems may contain ticking time bombs. Only the hackers may know.

THREATS Identity Theft Information is freely available & for sale on the net DOB s Mailing addresses (Physical & Email) Social Security Numbers Family Information Credit Card Numbers While suspicious, much of this is still legal

THREATS Identity Theft Company Voluntary Information HACKERS? 3 rd Party Database Companies Other Corporate Divisions Insiders 3 rd Parties Marketing Divisions

THREATS Pedophiles, Child Predators & Stalkers Unprecedented access to unsuspecting victims IM/IRC/Email Potential anonymity Network with other offenders to share Unclear and incomplete state laws

Computer Investigation and Operations COUNTERMEASURES

COUNTER MEASURES Prevention Viruses, Worms, Scripts Install and maintain utilities such as Virus Detectors at user computers as well as at network systems such as Mail servers Practice smart usage habits. Do not download free apps from non-trusted sources, do not open suspicious email attachments Do not use file trading software

COUNTER MEASURES Hackers Prevention Install and maintain personal/network firewall software (Zone Alarm/Norton/Black Ice) Consider removing computers with sensitive information (ssn s, employee addresses, etc...) from networked computers Be vigilant. Sluggish performance, unexpected errors, and other uncharacteristic activity may be evidence of a virus infection, trojan or hacked computer.

COUNTER MEASURES Prevention Protecting your privacy On-Line Only signup for websites you will use Give the minimum amount of information Read the website s/company s privacy statement Don t sign up for promotional mailings (especially if they have a separate privacy statement) Don t even open spam when possible If you do by mistake do not reply Don t reply to any solicitation of moneyfor-free Don t send passwords, acct. # s, bank routing codes

COUNTER MEASURES Prevention Protecting your money Shop only on trusted websites featuring encrypted credit card servers (https://) Have 1 credit card with a small limit for online purchases Check your credit card statements for questionable activity and report it immediately Periodically check your own credit report for suspicious inquiries into your credit

COUNTER MEASURES Prevention Protecting your children Put computer in open, often used, place (Family Room, Living Room, Kitchen) Monitor your child s online capabilities Learn as they learn and show an interest Limit usage to certain hours or type of use Be aware of drastic changes in behavior

Where can I get more Information? www.sans.org www.securityportal.com www.securityfocus.com www.cert.org www.nipc.gov www.securiteam.com www.attrition.org www.iss.net/xforce www.symantec.com/avcenter Mailing Lists/Listservs