Digital Forensics: Current and Future Needs



Similar documents
BIG DATA & Forensics. Katrin Franke, PhD Norwegian Information Security Laboratory, Gjøvik, Norway

Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy

Workshop on Building international cooperation WG2 : Network Information Security / cyber security

DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM

EXPERIENCED PROFESSIONAL CERTIFICATE IN Forensic Science

The College of Forensic Sciences at NAUSS: The pioneer of Forensics in the Arab world

How To Understand Forensic Science

CRIME SCENE FORENSICS

The Netherlands Forensic Institute. Strengthening the rule of law together

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Dudesville: A crime scene under the microscope. QUT Extreme Science

Supported by. A seven part series exploring the fantastic world of science.

Security and Law Enforcement Community of Interest 1811-Criminal Investigating Career Road Map

(FHEQ) level 7] MSc Postgraduate Diploma Postgraduate Certificate. June 2015

Microsoft s cybersecurity commitment

Forensics in Nuclear Security. by the Netherlands Forensic Institute

Psychology, Social Work and Human Sciences

Forensic Science Curriculum

CyberSecurity Solutions. Delivering

In 2009, the nation s 411 publicly funded crime

Rules and Procedures. Rule 312 August 23, Rule CRIME LABORATORY - EVIDENCE AND CRIME SCENES

Research Topics in the National Cyber Security Research Agenda

Evidence Technician s School

CRIME SCENE INVESTIGATION

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

How To Become A Forensic Scientist

Analyzing Huge Data Sets in Forensic Investigations

Dealing with disasters with the Netherlands Forensic Institute. NFI Forensic response to disasters

How To Become A Data Scientist

This Symposium brought to you by

Forensic Science : Course Syllabus Forensic Science : Secrets of the Dead

Forensic Science: Crime Scene Basics. T. Trimpe

Computer Forensics Preparation

Center for Dynamic Data Analytics (CDDA) An NSF Supported Industry / University Cooperative Research Center (I/UCRC) Vision and Mission

How To Be A Forensic Investigator

Cyber Risks in Italian market

TIETS34 Seminar: Data Mining on Biometric identification

Fighting Identity Fraud with Data Mining. Groundbreaking means to prevent fraud in identity management solutions

Cyber DTU. Lars Ramkilde Knudsen

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Georgia Perimeter College Common Course Outline

Republic of Latvia State Police Forensic Service Department

Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

POLICE SCENE TECHNICIAN I POLICE SCENE TECHNICIAN II

Faculty of Organizational Sciences

The UK cyber security strategy: Landscape review. Cross-government

Forensic Science. Distance Learning Presentation For King Drew Magnet High School of Medicine and Science March 14, 2007

FORENSIC SCIENTIST MICHIGAN CIVIL SERVICE COMMISSION JOB SPECIFICATION

Should you wish to contact me: o Barry Fisher o (213) o bajfisher@earthlink.net

Nottingham Trent University Course Specification

ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION FORENSIC SCIENTIST SERIES

Survey on Different Phases of Digital Forensics Investigation Models

SAULT COLLEGE SAULT STE. MARIE, ONTARIO COURSE OUTLINE

Data Mining Applications in Higher Education

FORENSIC SCIENCE COURSE DESCRIPTION

WYNYARD ADVANCED CRIME ANALYTICS POWERFUL SOFTWARE TO PREVENT AND SOLVE CRIME

The Nature of Evidence

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Introduction to Forensic Science. So what is Forensic Science? Major Contributors. Chapter 1: Intro to FS

Criminal Justice II, August 2013, Page 1 of 5

How To Create An Insight Analysis For Cyber Security

How To Understand The Basics Of Forensic Science

RUAG Cyber Security. More security for your data

School of Psychology, Social Work and Human Sciences

Promoting a cyber security culture and demand compliance with minimum security standards;

Master of Science in Forensics

How To Become A State Pol Forensic Tech Leader

TUSKEGEE CYBER SECURITY PATH FORWARD

National Cyber Crime Unit

Big Data Strategies Creating Customer Value In Utilities

Exploring Big Data in Social Networks

INF 3510 INFORMATION SECURITY Guest on Digital Forensics April André Årnes, PhD

What Can I Do With a Degree in ForSci?

Strengthening Forensic Science in the United States: A Path Forward

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Into the cybersecurity breach

Intrusion Detection via Machine Learning for SCADA System Protection

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

Information Visualization WS 2013/14 11 Visual Analytics

Fight fire with fire when protecting sensitive data

BAA Course: Forensic Science 11

MASTER COURSE OUTLINE

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Software Development Training Camp 1 (0-3) Prerequisite : Program development skill enhancement camp, at least 48 person-hours.

Mobile App Reputation

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Transcription:

Digital Forensics: Current and Future Needs Katrin Franke Norwegian Information Security Laboratory (NISlab) Gjøvik University College www.nislab.no 1

Crime in the Modern World Massive amount of data: 247 billion email per day 234 million websites 5 billion mobile-phone users ICT Infrastructures: Complex, rapidly growing Dynamically changing Hostile, adversary environment Cybercrime: One million victims daily Expected losses 297 billion Euro Crowd sourcing -> Crime sourcing Flash mobs -> Flash robs Proactive, Ultra-large scale Forensic Investigations, : Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Rule-of-Law: Culture, social behaviours Legal & privacy aspects Cross-jurisdiction cooperation European / International cyberlaw Law as framework for ICT Law as contents of ICT, Automation, programming of legal rules 2

Forensic Science Forensic methods consist of multi-disciplinary approaches to perform the following tasks: Investigate and to Reconstruct a crime scene Forensic experts study a broad area of objects, substances (blood, body fluids, drugs), chemicals (paint, fibers, explosives, toxins), tissue traces (hair, skin), impression evidence (shoe or finger print, tool or bite marks), electronic data and devices (network traffic, e-mail, images). Some further objects to be studied are fire debris, vehicles, questioned documents, physiological and behavioral patterns. or a scene of an accident, Collect and Analyze trace evidence found, Identify, Classify, Quantify, Individualize persons, objects, processes, Establish linkages, associations and reconstructions, and Use those findings in the prosecution or the defense in a court of law. So far, mostly dealt with previously committed crime, greater focus is now to prevent future crime. 3

Crime in the Modern World cont. Digital devices are used everywhere: Computers, mobile phones, PDAs, cameras, copy machines, printers, videogame consoles Used to plan/conducted physical and cyber crimes Digital evidence: 4 System registry, Event logs, Print spool, Swap files, Recycle bin Mobile phone SMS messages, Contacts, Connections etc. Threatening emails or chats messages Documents (e.g., in places they shouldn t be) Suicide notes Bomb-making diagrams Malicious Software, Viruses, Worms, Botnet Child pornography

Types of Computer Crime 6 Alkaabi, A., G. M. Mohay, A. J. McCullagh and A. N. Chantler (2010). "Dealing with the problem of cybercrime", Conference Proceedings of 2nd International ICST Conference on Digital Forensics & Cyber Crime, 46 October 2010, Abu Dhabi.

Computer Crime Offences & Costs Report of the Belgian Economic and Financial Crimes Division (DJF) Online crime complaints and dollar loss in the United States (IC3, 2010) German Annual Federal Criminal Police Office Situation Report on Cybercrime 2009 and 2010 7

European Status European Commission, Directorate- General Home Affairs, Directorate Internal Security Unit A.2: Organised Crime RAND Corporation, Feasibility Study for a European Cybercrime Centre, Technical Report 1218," 2012. Prepared for the EC 8

Strengthening Forensic Science in the United States: A Path Forward Committee on Identifying the Needs of the Forensic Sciences Community, National Research Council ISBN: 0-309-13131-6, 352 pages, 6 x 9, (2009) This PDF is available from the National Academies Press at: http://www.nap.edu/catalog/12589.html 9

US Department of Defense Strategy for Operating in Cyberspace, July 2011 I. New collaborative approaches and partnerships with private and research sector II. Active support and investment in cutting-edge research and development III. Adoption of research results, development of investigative tools and methods, and further advancement of ICT in police work 10

Interpool Global-Complex Singapore Mission Enhance capability to tackle the crime threats of the 21st century Strengthen international policing worldwide Strategic Initiatives Innovative research and development to enhance forensics and database capabilities (incl. identification of crimes and criminals, biometrics, database technologies) Addressing the demand for technology and innovation based capacity building and training (e.g. training in advanced investigation techniques) Enhancing capacity to provide 24/7 operational support to police across time zones and distances with greater mobility 11

Crime in the Modern World Massive amount of data: 247 billion email per day 234 million websites 5 billion mobile-phone users ICT Infrastructures: Complex, rapidly growing Dynamically changing Hostile, adversary environment Cybercrime: One million victims daily Expected losses 297 billion Euro Crowd sourcing -> Crime sourcing Flash mobs -> Flash robs Proactive, Ultra-large scale Forensic Investigations, : Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Rule-of-Law: Culture, social behaviours Legal & privacy aspects Cross-jurisdiction cooperation European / International cyberlaw Law as framework for ICT Law as contents of ICT, Automation, programming of legal rules 12

Challenges and Demands in Forensic Science Challenges: Tiny Pieces of Evidence are hidden in a mostly Chaotic Environment, Trace Study to reveal Specific Properties, Traces found will be Never Identical, Reasoning and Deduction have to be performed on the basis of - Partial Knowledge, - Approximations, - Uncertainties and 13 - Conjectures. Demands: Objective Measurement and Classification, Robustness and Reproducibility of the Results, Secure against Falsifications.

Current Forensic Practice Evidence becoming increasingly data intensive and widely distributed Common practice to seize all data carriers; amounts to many terabytes of data Enrich with data available on the Internet, Social networks, etc. Huge amounts of Paper Documents 14

Testimon-Research Agenda Research in the area of large-scale investigations; automatic search through terabytes of electronic data storage within closed systems and the Internet, Research and development for the rapid acquisition, correlation and analysis of Internet-related evidence, Technologies for cross-media search and data integration to access diverse sources of information, in particular data enrichment from Internet sources, Algorithms for the analysis of encrypted evidence and cryptographic credentials, Design of advanced computing technologies to achieve more objective evidence analysis and final decision making by implementing computational intelligence, Develop of methods and tools for digital penetrator attribution and profiling, visualization of serious criminal relationships and associations, and geographical mapping of digital and physical evidence. 15

Computational Foreniscs Study and development of computational intelligence methods to Assist in basic and applied research, e.g. to establish or prove the scientific basis of a particular investigative procedure, Support the forensic examiner in their daily casework. Modern crime investigation shall profit from the hybrid-intelligence of humans and machines. 16

Computational Methods Signal / Image Processing : one-dimensional signals and two-dimensional images are transformed for better human or machine processing, Computer Vision : images are automatically recognized to identify objects, Computer Graphics / Data Visualization : two-dimensional images or three-dimensional scenes are synthesized from multi-dimensional data for better human understanding, Statistical Pattern Recognition : abstract measurements are classified as belonging to one or more classes, e.g., whether a sample belongs to a known class and with what probability, Machine Learning : a mathematical model is learnt from examples. Data Mining : large volumes of data are processed to discover nuggets of information, e.g., presence of associations, number of clusters, outliers, etc. Robotics : human movements are replicated by a machine. 17

Definition It is understood as the hypothesis-driven investigation of a specific forensic problem using computers, with the primary goal of discovery and advancement of forensic knowledge. CF works towards: 1) In-depth Understanding of a forensic discipline, 2) Evaluation of a particular scientific method basis and 3) Systematic Approach to forensic sciences by applying techniques of computer science, applied mathematics and statistics. It involves Modeling and computer Simulation (Synthesis) and/or computer-based Analysis and Recognition 18

Example: Ongoing Research Malware and Botnet Detection Number of Selected Indicators Achieved Recognition Performance Nyugen, Franke, et all www.nislab.no 19

Admission of 1. Need of Automatization, Standardization, and Benchmarking 2. Need of Education, Joint Research, and Development by Forensic and Computer Scientist 3. Need of Legal Framework 20

Automatization, Standardization, and Benchmarking Increase Efficiency and Effectiveness Perform Method / Tool Testing regarding their Strengths/Weaknesses and their Likelihood Ratio (Error Rate) Gather, manage and extrapolate data, and to synthesize new Data Sets on demand. Establish and implement Standards for data, work procedures and journal processes Fulfillmenthttp://en.wikipedia.org/wiki/Daubert_Standard of Daubert Criteria 21

Joint Research & Development: Forensic and Computer Scientist Education and training, 22 Revealing the state-of-the art in *each* domain Sources of information on events, activities and financing opportunities International forum to peer-review and exchange, e.g., IWCF workshops Performance evaluation, benchmarking, proof and standardization of algorithms Resources in forms of data sets, software tools, and specifications e.g. data formats New Insights on problem description and procedures

Legal Framework?! Questions on methods for dimensionality reduction loss of relevant information Questions on extracted numerical parameters loss of information due to inappropriate features Questions on the reliability of applied computational method / tool Questions on the final conclusion due to wrong computational results 23

Crime in the Modern World Massive amount of data: 247 billion email per day 234 million websites 5 billion mobile-phone users ICT Infrastructures: Complex, rapidly growing Dynamically changing Hostile, adversary environment Cybercrime: One million victims daily Expected losses 297 billion Euro Crowd sourcing -> Crime sourcing Flash mobs -> Flash robs Proactive, Ultra-large scale Forensic Investigations, : Situation-aware methods Quantified, measurable indicators Adaptive, self-organizing models Distributed, cooperative, autonomous Rule-of-Law: Culture, social behaviours Legal & privacy aspects Cross-jurisdiction cooperation European / International cyberlaw Law as framework for ICT Law as contents of ICT, Automation, programming of legal rules 24

Open Forensic Discussion 1. Need of Automatization, Standardization, and Benchmarking 2. Need of Education, Joint Research, and Development 3. Need of Legal Framework 4. Stakeholders & PP-Partnerships 25

Thank you for your consideration of comments! Getting in touch WWW: kyfranke.com Email: kyfranke@ieee.org Skype/gTalk: kyfranke 26

Katrin Franke, PhD, Professor Professor of Computer Science, 2010 PhD in Artificial Intelligence, 2005 MSc in Electrical Engineering, 1994 Industrial Research and Development (15+ years) Financial Services and Law Enforcement Agencies Courses, Tutorials and post-graduate Training: Police, BSc, MSc, PhD Chair IAPR/TC6 IAPR Young Investigator Award, 2009 International Association of Pattern Recognition 27 kyfranke.com