Information Technologies and Fraud



Similar documents
Digital Forensic Techniques

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner

e-discovery Forensics Incident Response

How To Get A Computer Hacking Program

Digital Forensics Services

CERTIFIED DIGITAL FORENSICS EXAMINER

An overview of IT Security Forensics

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

EMC SourceOne Management and ediscovery Overview

Sensitive Incident Investigations. Digital Risk Management. Forensics Testing.

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Design and Implementation of Digital Forensics Labs:

Case Study: Smart Phone Deleted Data Recovery

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

Digital Forensics for Attorneys Overview of Digital Forensics

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

InfoSec Academy Forensics Track

How To Be A Computer Forensics Examiner

EC-Council Ethical Hacking and Countermeasures

Case Study: Mobile Device Forensics in Texting and Driving Cases

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

Modalities for Forensic Review of Computer Related Frauds

Digital Forensics & e-discovery Services

INCIDENT RESPONSE CHECKLIST

An enterprise grade information security & forensic technical team

Preservation and Production of Electronic Records

Symantec Enterprise Vault for Lotus Domino

The FBI and the Internet

To Catch a Thief: Computer Forensics in the Classroom

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

CSI Crime Scene Investigations

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Big Data Challenges to E-Discovery

State of Michigan Department of Technology, Management & Budget. Acceptable Use of Information Technology (former Ad Guide 1460.

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Solving.PST Management Problems in Microsoft Exchange Environments

Guide to Computer Forensics and Investigations, Second Edition

COMPUTER FORENSICS (EFFECTIVE ) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE CATE STUDENT REPORTING PROCEDURES MANUAL)

How To Answer A Question About Your Organization'S History Of Esi

LOUISA MUSCATINE COMMUNITY SCHOOLS POLICY REGARDING APPROPRIATE USE OF COMPUTERS, COMPUTER NETWORK SYSTEMS, AND THE INTERNET

Nuix Forensic Focus 2014 Webinar Accelerating investigations using advanced ediscovery techniques 6 th March 2014


Electronic evidence: More than just a hard drive. March 2015 Publication No

Computer Forensics Preparation

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

FALSE ALARM? Incident Management Case Study. Carlos Villalba

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

A Survey on Mobile Forensic for Android Smartphones

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

EnCase Enterprise For Corporations

AN INVESTIGATION INTO THE METHODS USED FOR TRAFFICKING OF CHILD ABUSE MATERIAL

Technology Department 1350 Main Street Cambria, CA 93428

C. All responses should reflect an inquiry into actual employee practices, and not just the organization s policies.

Design and Implementation of a Live-analysis Digital Forensic System

Measures Regarding Litigation Holds and Preservation of Electronically Stored Information (ESI)

Acceptable Use Policy

ACQUISITION AND ANALYSIS OF IOS DEVICES MATTIA EPIFANI SANS FORENSICS PRAGUE PRAGUE, 10 OCTOBER 2013

MSc Computer Security and Forensics. Examinations for / Semester 1

Why you need Cryoserver for your Office 365 cloud service

Computer Forensics in Investigations and in Court

COEN 152 / 252 Lab Exercise 1. Imaging, Hex Editors & File Types

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Computer Forensics as an Integral Component of the Information Security Enterprise

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

IBM Software Top tips for securing big data environments

Regional Computer Forensic Laboratory & Digital Forensics. Presented By: D. Justin Price FBI - Philadelphia Computer Analysis Response Team

Mimecast Unified Management

Smartphone Forensics Analysis: A Case Study

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

RightsWATCH. Data-centric Security.

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Hands-On How-To Computer Forensics Training

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

DIOCESE OF DALLAS. Computer Internet Policy

Transcription:

Information Technologies and Fraud Florin Gogoasa CISA, CFE, CGEIT, CRISC ACFE Romania - Founder and Board member Managing Partner Blue Lab Consulting

Information Technologies for Fraud investigation A. Intelligence and e-discovery B. Digital forensics AGENDA

TECHNOLOGIES More and more Information Technologies are used to deal with: Fraud prevention Fraud investigation / examination Forensics

E-DISCOVERY VS. DIGITAL FORENSICS Digital forensics, also called cyber forensics, and e-discovery are two different disciplines used to target computer based evidence in a legal investigation. Digital forensics = recovery and investigation of material found in digital devices, often in relation to computer crime. E-discovery = electronic discovery (or e- discovery or ediscovery) refers to discovery in civil litigation which deals with the exchange of information in electronic format.

FRAUD RECOVERY STATISTICS

INTELLIGENCE There are many ways to research for information related to suspect activities and/or employees: Internet: Google and other search engines Job sites, social networks Company information systems Databases Mobile devices tracing and logging Access control / video monitoring systems Recording, tracking, key logging, HDD copy Specialized computers monitoring software

INTELLIGENCE There are many data sources to help with intelligence activities in Company information systems: Audit trails and security logs SIEM application Information Leakage Prevention (ILP / DLP) applications Transactions databases Archives Data warehouses Email systems

INTELLIGENCE Mobile devices tracking and logging: SMS / Chat Company centralized phone logs GSM Provider activity logs GPS tracking GSM network location Voice recording??

Access control / video monitoring systems Access control logs INTELLIGENCE Video surveillance images Tracking, key logging, HDD copy, and recording? HW / SW key loggers HDD forensic image Specialized computers monitoring software.

INTELLIGENCE ANALYSIS Fraud case intelligence tools are rich, data-centric visual analysis environment. A combination of data storage, analysis tools, visualization, and dissemination capabilities Addresses the analyst's and investigator's multitiered challenge of discovering networks, patterns and trends across increasing volumes of structured and unstructured data.

INTELLIGENCE ANALYSIS Dedicated data and chart management in a single datacentric analysis environment. Rich visualization and analysis underpinned by a local repository improving the detection rate of key information across all existing data. Search and discovery across collated data supporting identification of connections across seemingly unrelated data. Integrated data management interface to speed data ingestion and sharing. Simplify the communication of complex data to enable timely and accurate operational decision-making.

INTELLIGENCE ANALYSIS EXAMPLE

INTELLIGENCE ANALYSIS EXAMPLE

INTELLIGENCE ANALYSIS EXAMPLE

INTELLIGENCE ANALYSIS EXAMPLE

FORENSICS Forensic accounting: Forensic accounting or financial forensics is the specialty practice area of accountancy that describes engagements that result from actual or anticipated disputes or litigation. "Forensic" means "suitable for use in a court of law" Digital Forensics: is the practice of collecting, analyzing and reporting on digital information in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally.

DEFINITION Forensics 1. The art or study of formal debate; argumentation. 2. The use of science and technology to investigate and establish facts in criminal or civil courts of law. In application it involves the following steps: Collection Examination Analysis Report or Statement Presentation of Computer Evidence / Report

COMPUTER FORENSICS 93% of all information produced is digital (Source: UC Berkeley Study) Normal tools and processes immediately taint the evidence Normal tools are not able to access all potential evidence Ability to easily link associated pieces of evidence to provide a chronological history of activity Point in time snap shot ability which has minimal impact on operations Computer Forensics is now a requirement!!

CONSIDERATIONS Computer Forensics produces facts, it is an objective view of what has occurred. Computer Forensics can only report what user ID or e- mail address carried out a task, it cannot state that a certain individual carried out a task. Analysis can be completed exhaustively BUT this may be deemed illegal or inappropriate activity if out of scope. Specific keywords and actions should be sought for instead and hence defined in a scope letter. Evidence on a shared server is difficult to present.

Principle 1 METHODOLOGY No action taken by the Police or their agents should change the data held on a computer or other media. Where possible computer data must be copied and that version examined. Principle 2 In exceptional circumstances it maybe necessary to access the original data held on a target computer. However it is imperative that the person doing so is competent and can account for their actions.

METHODOLOGY Principle 3 An audit trail must exist to show all the processes undertaken when examining computer data. Principle 4 The responsibility rests with the person in charge of the case to show that a computer has been correctly examined in accordance with the law and accepted practice.

Regulatory breaches Counterfeiting / fraud Extortion Industrial Espionage WHY COMPUTER FORENSICS? Wrongful Termination / Contractual disputes Mishandling and theft of IP Harassment Possession of Inappropriate material Pornography, Illegal Software Illegal music and video Matrimonial disputes Computer misuse (spam, illegal trading, viruses, denial of service attacks)

IT FORENSIC TOOLS Disk Analysis Tools Hard Drive Firmware and Diagnostics Tools Linux-based Tools Macintosh-based Tools Windows-based Tools Open Source Tools Enterprise Tools (Proactive Forensics) Forensics Live CDs Personal Digital Device Tools GPS Forensics PDA Forensics Cell Phone Forensics SIM Card Forensics

Name Platform Description SANS Investigative Forensics Toolkit - SIFT Ubuntu Multi-purpose forensic operating system EnCase Windows Multi-purpose forensic tool FTK Windows Multi-purpose tool, commonly used to index acquired media. Digital Forensics Framework MANY DFF is both a digital investigation tool and a development platform The Coroner's Toolkit Unix-like A suite of programs for Unix analysis COFEE Windows A suite of tools for Windows developed by Microsoft, only available to law enforcement The Sleuth Kit Unix-like/Windows A library of tools for both Unix and Windows mailboxes of popular email clients, social network remnants, Belkasoft Evidence Center Windows instant messenger logs, internet browser histories, peer-to-peer data, multi-player game chats, office documents, pictures and videos. Paraben Windows General purpose forensic tool Open Computer Forensics Architecture Linux Computer forensics framework for CF-Lab environment SafeBack N/a Digital media (evidence) acquisition and backup Windows To Go n/a Bootable operating system Forensic Assistant Windows User activity analyzer(e-mail, IM, Docs, Browsers), plus set of forensics tools OSForensics Windows General purpose forensic tool for E-mail, Files, Images & browsers. X-Way Forensics Windows General purpose forensic tool based on WinHex hex editor.

FORENSICS DEMONSTRATION EXAMPLE References to specific companies (e.g. rival company) Presence of encrypted files Presence of credit card numbers Use of non-corporate email, chat rooms, social networks Presence of deleted files (documents, pictures, ) Files that have deliberately had their file extensions masked Specific files artefacts

MOBILE FORENSICS TOOLS EXAMPLE Paraben Device Seizure Cellebrite UFED Mobile Forensics Radio Tactics Aceso MicroSystemation XRY/XACT[4] Oxygen Forensic Suite MOBILedit! Forensic Elcomsoft ios Forensic Toolkit SAFT Mobile Forensics (Android)

THANK YOU! Florin Gogoasa CISA, CFE, CGEIT, CRISC Managing Partner Blue Lab Consulting Mobile: 0720058531 florin@bluelab.com.ro Bd. Magheru nr. 7, sector 1, Bucuresti, Romania