08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Network Monitoring<br />

Some data as we have mentioned before is volatile. Some data such as<br />

the commands a hacker might issue from a remote location will be lost if the<br />

investigator does not capture the activity in progress. The stored digital data<br />

may show the result, but what transpired and how it was done may best be<br />

answered using a network monitoring program. There are many types of<br />

network monitoring programs such as commercial, shareware, and freeware for<br />

different types of operating systems. There are even post processing programs<br />

that interpret the captured data back into a playback session which can show<br />

what the hacker typed, how fast he typed it, and even his spelling mistakes. The<br />

network monitoring program used by the FBI is Carnivore or FBI DCS 1000—<br />

an intercept program that captures network traffic and has post processors that<br />

tie the packets back into network sessions, such as Simple Mail Transfer<br />

Protocols (SMTP, sometimes called port 25 traffic) back to an email session.<br />

3. Link Analysis<br />

With so many kinds of data to analyze in a networking case, it may be<br />

useful to use some tools to view and grasp the whole picture of what transpired<br />

on a network and the locations that data has traversed. These tools assist in that<br />

type of analysis:<br />

1. Starlight—a form of link analysis using Extensible Markup Language<br />

(XML) tags so that different types of records can be compared to one<br />

another, such as the comparison of phone records to computer logs.<br />

2. Spire—a visual analysis program that searches text-based files for<br />

correlation of data. This includes log files, email, and IRC logs.<br />

3. Intrusion Detection Systems (IDS)—located on networks that have<br />

been attacked. Data from the IDS can include transaction logs of the<br />

attacker’s activity that may include the source of the attack. It may<br />

contain content data that will help investigators determine the type of<br />

attack.<br />

There are many difficulties in investigating a cybercrime whether it be<br />

digital forensics or network forensics. The examples above demonstrate a few<br />

that law enforcement officials face. Because of these difficulties, other<br />

traditional law enforcement methods may need to be employed. These include<br />

nontechnical means, such as physical surveillance, online sources, sting<br />

operations, and criminal intelligence.<br />

Receiving a Complaint about a Cybercrime<br />

How does a cybercrime come to the attention of law enforcement<br />

officials? Sometimes it is because law enforcement officials take the initiative<br />

and educate corporations on cybercrime prevention. In the United States, the<br />

326

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!