11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In supporting law enforcement cases, <strong>the</strong> <strong>SEI</strong> identified gap areas not addressed by commercial<br />

tools or commonly used techniques. With <strong>the</strong> goal <strong>of</strong> preserving evidence and presenting it in a<br />

way that leads to <strong>the</strong> apprehension <strong>of</strong> <strong>the</strong> criminals, <strong>the</strong> <strong>SEI</strong> developed tools, analysis methods,<br />

and processes that enable comprehensive and efficient analysis <strong>of</strong> evidence for use in cybercrime<br />

cases.<br />

Cases involve large amounts <strong>of</strong> data and important volatile data. As a first step toward addressing<br />

<strong>the</strong> need to extract and understand <strong>the</strong> data quickly, <strong>the</strong> <strong>SEI</strong> developed <strong>the</strong> CERT LiveView tool. 63<br />

To deal with <strong>the</strong> increasing use <strong>of</strong> strong encryption <strong>of</strong> data on seized computers, <strong>the</strong> <strong>SEI</strong> is developing<br />

ways to adapt <strong>the</strong> data acquisition process and recover encrypted data. <strong>SEI</strong>-developed technologies,<br />

tools, and practices have resulted in previously unattainable results for national and international<br />

cybercrime investigations. As a major advance, <strong>the</strong> Department <strong>of</strong> Justice influenced<br />

<strong>the</strong> federal government to accept evidence from <strong>SEI</strong> technology as being admissible in court<br />

cases.<br />

By continuing to provide operational support to high-pr<strong>of</strong>ile intrusion, identity <strong>the</strong>ft, and general<br />

computer crime investigations, <strong>the</strong> <strong>SEI</strong> is able to see <strong>the</strong> changing limitations <strong>of</strong> computer forensics<br />

and incident response in <strong>the</strong> field first-hand. Combining this applied research with <strong>the</strong> talents,<br />

operational experience, research capabilities, and <strong>the</strong> extensive knowledge base <strong>of</strong> Carnegie<br />

Mellon University, <strong>the</strong> <strong>SEI</strong> will remain unmatched in its ability to develop new tools and methods<br />

to address cybersecurity limitations and critical gaps.<br />

Influence on <strong>the</strong> State <strong>of</strong> <strong>the</strong> Practice<br />

The continuing <strong>SEI</strong> digital intelligence and investigation advances are used primarily by law enforcement.<br />

In addition, <strong>the</strong> <strong>SEI</strong> makes some tools available to system administrators through <strong>the</strong><br />

web. 64 With <strong>the</strong> <strong>SEI</strong> tools and techniques, system administrators can identify malicious activity and<br />

establish a chain <strong>of</strong> evidence. As a result, criminals may be stopped before <strong>the</strong>y cause more damage.<br />

To increase <strong>the</strong> government’s capability to deal with attacks, <strong>the</strong> <strong>SEI</strong> provides training to federal,<br />

state, local, and international law enforcement agencies in <strong>the</strong> use <strong>of</strong> its tools and techniques. The<br />

staff also teaches an <strong>SEI</strong> course on forensic response and analysis 65 and presents courses in <strong>the</strong><br />

Cyber Forensics and Digital Response track at Carnegie Mellon’s Information Networking Institute<br />

(INI), which <strong>of</strong>fers certification in digital forensics. 66 The CERT STEPfwd training environment includes<br />

demonstrations that show how to use some <strong>of</strong> <strong>the</strong> <strong>SEI</strong>-developed digital investigation tools.<br />

Keeping Up with Changes in Cybercrime<br />

Now <strong>the</strong> <strong>SEI</strong> assists in <strong>the</strong> pursuit <strong>of</strong> cybercriminals and develops tools and methods that both<br />

prevent and combat cybercrime. Future research and development will enable <strong>the</strong> <strong>SEI</strong> to keep up<br />

with changing technology, risks, attacks, and federal law enforcement and incident responders’<br />

needs. Operational support will help ensure that <strong>the</strong> <strong>SEI</strong> is focusing on essential gap areas. The<br />

63 See http://liveview.sourceforge.net<br />

64 See http://www.sei.cmu.edu/digitalintelligence/tools<br />

65 A course description can be found at http://www.sei.cmu.edu/training/P103.cfm<br />

66 For information about INI, and its Pittsburgh programs in particular, see http://www.ini.cmu.edu<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 274<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!