Networks and the Internet A Primer for Prosecutors and Investigators



Similar documents
NETWORKS AND THE INTERNET

The Internet and Network Technologies

Masters of Science in Information Technology

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Chapter 4 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Barracuda Networks Web Application Firewall

Step-by-Step Configuration

Best Practices for Controlling Skype within the Enterprise. Whitepaper

Using MIS 3e Chapter 6A Appendix

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

lesson 19 Internet Basics

Glossary of Technical Terms Related to IPv6

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Cornerstones of Security

See Criminal Internet Communication as it Happens.

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

Configuring a Domain to work with your Server

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

What really is a Service?

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Sage ERP Accpac Online

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Basic Network Configuration

Chapter 3 Security and Firewall Protection

How Your Computer Accesses the Internet through your Wi-Fi for Boats Router

Internet Privacy Options

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

12. Firewalls Content

3Degrees Group, Inc. Privacy Policy

CHAPTER 9: THE EVOLVING INTERNET

User Guide. You will be presented with a login screen which will ask you for your username and password.

UIP1868P User Interface Guide

Configuring Network Address Translation (NAT)

Using TestLogServer for Web Security Troubleshooting

Internet Basics. Basic Terms and Concepts. Connecting to the Internet

Proxy Server, Network Address Translator, Firewall. Proxy Server

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Transferring Your Internet Services

Technology/Internet Usage Workshop

Network Configuration Settings

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

Load Balance Mechanism

Configuring Your Gateman Proxy Server

NEW AND IMPROVED! INSTALLING an IRC Server (Internet Relay Chat) on your WRT54G,GS,GL Version 1.02 April 2 nd, Rusty Haddock/AE5AE

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

UTM Quick Installation Guide

Communications and Networking

Internet Services. Sadiq M. Sait, Ph.D

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

Chapter 1 Configuring Basic Connectivity

Remote Console Installation & Setup Guide. November 2009

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Step-by-Step Configuration

Remote login (Telnet):

Why your own server space? Why should you set it up?

Network setup and troubleshooting

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).


Secure Web Service - Hybrid. Policy Server Setup. Release Manual Version 1.01

Installation Guide For Choic Enterprise Edition

Web Browsers And Mailing Tools

F-Secure Messaging Security Gateway. Deployment Guide

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

DESTINATION MELBOURNE PRIVACY POLICY

Lawful Interception in P2Pbased

Quick Scan Features Setup Guide

Broadband Phone Gateway BPG510 Technical Users Guide

Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud

MSGCU SECURE MESSAGE CENTER

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

Guide to Analyzing Feedback from Web Trends

Securing the Transition Mechanisms

ΕΠΛ 674: Εργαστήριο 5 Firewalls

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Using Internet or Windows Explorer to Upload Your Site

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Installing GFI MailSecurity

SSL VPN Technology White Paper

Transcription:

Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section () Criminal Division, U.S. Department of Justice

Getting There From networks to the Internet Locating a place on the Internet Applications that people use on the Internet 2

to Get the Evidence What evidence does Internet use create? Where is this evidence located? How do we gather this evidence? 3

Getting There From networks to the Internet Locating a place on the Internet Applications that let people use the Internet 4

What is a network? 5

What is an inter-network? Router Node 6

Network What Is the Internet? 7

A Decentralized Network No center No one is in charge No one knows exactly where all the components are located 8

How do Internet hosts exchange data? WEB PAGE MOVIE E-MAIL MESSAGE VOICE DATA PACKETS SOFTWARE 9

Exchanging Data Information to be sent to another Internet host is divided into small DATA PACKETS The data packets are sent over the network to the receiving host The receiving host assembles the data packets into the complete communication 10

Exchanging Data 11

Internet Protocol (IP) Packets 172.31.208.99 213.160.116.205 0111001010101011 1011011000100101 0100... SOURCE ADDRESS DESTINATION ADDRESS DATA BEING SENT 12

Getting There From networks to the Internet Locating a place on the Internet Applications that let people use the Internet 13

IP Addresses 213.160.116.205 14

Assigning IP Addresses Public Dynamic Private Static Blocks of IP addresses registered to Internet service providers (ISP) 15

Assigning IP Addresses INTERNET Computer Modem Internet Service Provider 149.101.1.120 149.101.1.120 assigned to Harry at 2:30 PM 16

ISP Login Records The ISP-equivalent of telephone company records Records each time a user logs in (or tries and fails) Logs show Start time Session duration Account identifier Assigned IP address 17

The Traceback We know the IP address used by the suspect How do we find out who this person is? 149.101.1.120?? 18

Step 1: What ISP has that address? Use the IP whois service to find out what ISP owned that IP address. 149.101.1.120 19

Step 2: What user had that address at that time? Subpoena the ISP to find out who had that address Specify at least the address and the time and date with time zone. Subpoena + 20

Another Location Method: Prospective Evidence Gathering We know that our suspect was at a site and believe he ll return A pen/trap device installed at the site s server provides the suspect s IP address when he returns Pen/Trap Order INTERNET 21

A Twist: The NAT Several computers share one IP address Outside world sees the same address regardless of which computer communicates 10.232.33.9 10.232.33.10 NAT INTERNET 10.232.33.8 149.101.1.120 22

Another Twist: The Proxy Laundering communications through someone else s IP address Outside world sees only the proxy s IP address PROXY 23

Infamous Proxies America Online s proxy cache Proxy caches used by private companies Bots Anonymizers 24

Domain Names How humans handle IP addresses Every domain name has whois information Owner, physical address, contact information Almost always wrong if the domain name is registered by a criminal Assume nothing about geography thecommonwealth.org = 213.160.116.205 25

Domain Name Queries Who is thecommonwealth.org? 213.160.116.205 ISP DOMAIN NAME SYSTEM 26

Getting There From networks to the Internet Locating a place on the Internet Applications that let people use the Internet 27

How People Use the Internet WEB PAGE MOVIE E-MAIL MESSAGE VOICE DATA PACKETS SOFTWARE APPLICATIONS 28

Internet Use Applications E-mail Web browser Peer-to-peer (P2P) Instant messaging (IM) Internet relay chat (IRC) File transfer protocol (FTP) 29

Internet Use Applications E-mail Web browser Peer-to-peer (P2P) Instant messaging (IM) Internet relay chat (IRC) File transfer protocol (FTP) 30

E-Mail Basics E-mail travels from sender to recipient s host, where it resides on a MAIL SERVER until the recipient retrieves it SENDER S ISP RECIPIENT S ISP INTERNET 31

Evidence of Past Activity Content Copies of a previously sent e-mail message may be stored on the sender s system recipient s mail server (even after addressee has read it) recipient s own machine SENDER S ISP RECIPIENT S ISP INTERNET 32

Evidence of Past Activity Traffic Data A record of the e-mail transmission (date, time, source, destination) usually resides in the MAIL LOGS of the sender s system recipient s mail server SENDER S ISP RECIPIENT S ISP INTERNET 33

Prospective Evidence Content Interception, wiretap Creates a cloned account SUBJECT S COMPUTER SUBJECT S ISP INTERNET LAW ENFORCEMENT COMPUTER Wiretap Order 34

Prospective Evidence Traffic Data Install a pen/trap at user s ISP to find out the e-mail addresses the user corresponds with SUBJECT S COMPUTER SUBJECT S ISP INTERNET LAW ENFORCEMENT Pen/Trap Order 35

Internet Use Applications E-mail Web browser Peer-to-peer (P2P) Instant messaging (IM) Internet relay chat (IRC) File transfer protocol (FTP) 36

What is a web site? Three components Domain name (or other address) A web hosting server Files sitting on the web hosting server eac.int 37

A Twist: Virtual Hosting One server hosts hundreds of web sites All web sites share a single IP address Think carefully before you seize or search an entire server 38

Web Addresses Uniform Resource Locators (URL) http://www.thecommonwealth.org/internal/163207/151537/148540/podcast/ Computer File http://www.eac.int/index.php/secretariat.html Computer File 39

Browsing the Web: Client-Server Interaction User types a URL or clicks on link User s computer looks up IP address www.eac.int INTERNET 41.220.130.18 DOMAIN NAME SYSTEM USER ISP 40

Browsing the Web: Client-Server Interaction User s CLIENT PROGRAM sends a request to the WEB SERVER at the specified IP address The web server transmits a copy of the requested document (the web page) to the user s computer 41.220.130.18 INTERNET USER ISP WEB SERVER 41

Browsing the Web: Client-Server Interaction The client program displays the transmitted document on the user s screen 42

Evidence of Web Query: On User s Computer Cache directory Copies of recently viewed web pages History file List of recently visited pages INTERNET USER ISP WEB SERVER 43

Evidence of Web Query: On Web Server Detailed logs of each request for any page Date, time Number of bytes IP address of the system that requested the data INTERNET USER ISP WEB SERVER 44

Example Web Server Log 10.143.28.198 - - [11/Feb/2007:22:45:17-0500] "GET /tank.htm HTTP/1.1" 401 - "-" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-us; rv:1.8.1.1) Gecko/20061204 Firefox/2.0.0.1 10.143.28.198 - visitor [11/Feb/2007:22:45:23-0500] "GET /images/lolita.png" 200 3788 "http://www.eruditorium.org/" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-us; rv:1.8.1.1) Gecko/20061204 Firefox/2.0.0.1 10.143.28.198 - visitor [11/Feb/2007:22:46:11-0500] "POST /dynamic/ HTTP/1.1" 200 413 "http://www.eruditorium.org/" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-us; rv:1.8.1.1) Gecko/20061204 Firefox/2.0.0.1" 45

See a theme? To do anything on the Internet, a computer communicates with another computer using an IP address Hopefully, that other computer will log what the suspect has done With that in mind 46

Other Internet Use Applications Peer-to-peer (P2P) Instant messaging (IM) Internet relay chat (IRC) File transfer protocol (FTP) 47

In Closing The Internet is a packet-switched network Systems keep many records about their interactions with the rest of the network Those records often help us locate and identify criminal actors, or at least to bolster the other evidence against them 48

Michael J. Stawasz Senior Counsel, michael.stawasz@usdoj.gov (202) 514-1026 49