11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introduction to Computer Forensics: Digital Intelligence and<br />

Investigation<br />

In <strong>the</strong> early days <strong>of</strong> <strong>the</strong> internet, protection against cyber attacks was not a high priority for <strong>the</strong> researchers<br />

using it. Cybersecurity became more important with <strong>the</strong> expansion into commercial and<br />

international internet use. At <strong>the</strong> same time, attacks became more sophisticated and <strong>the</strong> demand<br />

for cyber forensics experts increased. In <strong>the</strong> 1980s and 1990s, computers were <strong>the</strong> objects <strong>of</strong><br />

crimes, and investigative procedures were straightforward. Techniques and policies focused on<br />

computer drives, which investigators inspected in <strong>the</strong>ir entirety. Some commercial tools were<br />

available to facilitate <strong>the</strong>ir work. Investigators were self-taught as formal training had not yet been<br />

developed.<br />

A series <strong>of</strong> changes rendered this early approach ineffective. Ra<strong>the</strong>r than being <strong>the</strong> objects <strong>of</strong><br />

crimes, computers were used to facilitate crimes. The technology itself changed; computers were<br />

able to store massive amounts <strong>of</strong> data, and some technology did not even exist in <strong>the</strong> 1990s—<br />

cloud computing, for example. Crimes were committed by entities such as nation-states and not<br />

just individuals. Criminals were <strong>of</strong>ten sophisticated technical experts; for example, individuals<br />

with PhDs in computer science “gone rogue.” Many attacks were so complex and large in scope<br />

that <strong>the</strong> commercial tools became ineffective. As both dependence on <strong>the</strong> internet and <strong>the</strong> sophistication<br />

<strong>of</strong> attackers grew, law enforcement investigators faced many challenges, including a huge<br />

backlog <strong>of</strong> computers waiting for analysis, a growing volume <strong>of</strong> digital evidence, and attackers’<br />

use <strong>of</strong> encryption. The investigators needed highly technical training and more effective tools and<br />

techniques.<br />

<strong>SEI</strong> Entry into Digital Intelligence and Investigation<br />

The <strong>SEI</strong> became involved in forensics in response to <strong>the</strong> August 2003 U.S. Nor<strong>the</strong>ast blackout<br />

and, subsequently, expanded its operational support for investigations into cyber attacks. With <strong>the</strong><br />

hiring <strong>of</strong> a former law enforcement pr<strong>of</strong>essional, <strong>the</strong> <strong>SEI</strong> established a separate team, with <strong>the</strong> former<br />

law enforcement agent as <strong>the</strong> team lead.<br />

The <strong>SEI</strong> was in a good position to provide support to law enforcement investigators and help <strong>the</strong>m<br />

meet <strong>the</strong>ir challenges. Through <strong>the</strong> CERT/CC, <strong>SEI</strong> researchers had experience with responding to<br />

computer security compromises, with vulnerabilities and ways <strong>the</strong>y could be exploited, and with<br />

malicious code. Through <strong>the</strong> malicious code work, in particular, <strong>the</strong> <strong>SEI</strong> had well-established,<br />

trusted relationships with law enforcement agencies.<br />

Evolution <strong>of</strong> <strong>the</strong> <strong>SEI</strong> Approach<br />

The <strong>SEI</strong> continued to gain operational experience by assisting federal law enforcement agents<br />

with <strong>the</strong>ir cases. One example is <strong>the</strong> Iceman case. A former computer security consultant, Max<br />

Ray Butler (also known as <strong>the</strong> Iceman), attacked computers at financial institutions and credit<br />

card processing centers, stealing account information and selling <strong>the</strong> data to o<strong>the</strong>rs. Federal law<br />

enforcement agents enlisted <strong>the</strong> <strong>SEI</strong>’s assistance in acquiring and decrypting <strong>the</strong> Iceman’s data,<br />

thus providing critical evidence for <strong>the</strong> case that resulted in a three-year sentence for wire fraud<br />

and identity <strong>the</strong>ft, plus five years <strong>of</strong> supervised release and $27.5 million in restitution payments<br />

to victims [Mills 2009, McMillan 2010].<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 273<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!