08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

servers, immediate disaster recovery steps are taken to get the system back<br />

online. This may or may not affect the subsequent investigation into what<br />

happened, who did it, and why. If the decision is made by management to bring<br />

in law enforcement, it will be necessary to present the data collected so far and<br />

to conduct interviews of all involved. Another parallel process should involve<br />

an ongoing damage assessment to include what it will cost the company to<br />

repair the damage and to support the investigation. Law enforcement officials<br />

will take similar steps. They will gather data via a forensic process to protect<br />

data of informational or evidentiary value and document the steps.<br />

Legal Processes in a Cybercrime Investigation<br />

Cybercrime investigations involve several legal steps and processes<br />

that must be accomplished in order to expand the search. Some of the elements<br />

that assist law enforcement authorities are explained below:<br />

• Consensual Searches – The first questions to answer are who<br />

conducts the search and what is to be looked at. Initial investigative<br />

steps for an intrusion are to collect data about who, what, when,<br />

where, why, and how an intrusion occurred. The data collection<br />

begins when a complaint is received. Immediate attention must be<br />

given to data that is volatile and can readily be deleted or changed.<br />

In most instances, the company with a complaint may have already<br />

backed up the data and taken action to return the system to<br />

operational status. Law enforcement realizes that a company cannot<br />

usually afford to have a system tied up as evidence for long periods<br />

of time. Getting all the pertinent information about the system, the<br />

network, the access controls, the hardware and software<br />

configuration of the affected system, the protection measures of the<br />

network, and information from any other system that could<br />

potentially hold data of value is extremely important to the<br />

investigation. A parallel track for law enforcement is to preserve<br />

the account transaction records that the network provider or the ISP<br />

may have.<br />

• Use of Banners – Banners at the entry or initial connection to a<br />

computer are much like the sign at the gate of a military<br />

installation. Those signs basically say that if you enter, you are<br />

giving consent to search. These banners have been reviewed by<br />

many legal experts and can give a company much leeway in what<br />

they decide to monitor regarding the usage of the company’s<br />

network or computers.<br />

328

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!