11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Operational Support for Digital Intelligence and Investigation<br />

The Challenge: Catching and Convicting Perpetrators <strong>of</strong> Cyber Attacks<br />

Attacks on internet-connected systems put government, business, and consumers at risk. The nature<br />

<strong>of</strong> <strong>the</strong> internet makes <strong>the</strong>ir networked systems and <strong>the</strong> information on <strong>the</strong>m vulnerable to<br />

compromise. At first, computers were <strong>the</strong> objects <strong>of</strong> attacks. Law enforcement investigators could<br />

examine all <strong>the</strong> data on a hard drive and had commercial tools to assist <strong>the</strong>m. Now computers are<br />

used to facilitate crime, and <strong>the</strong> traditional tools and methods cannot keep up with <strong>the</strong> velocity <strong>of</strong><br />

investigations, preventing law enforcement agents from establishing timely leads. The attackers<br />

are sophisticated and <strong>the</strong> attacks are complex. Their targets include <strong>the</strong> Department <strong>of</strong> Defense<br />

and o<strong>the</strong>r federal computers, commercial organizations, educational institutions, and critical U.S.<br />

infrastructure. Huge volumes <strong>of</strong> data are involved, more data than an investigator could examine<br />

in its entirety even with <strong>the</strong> commercially available tools. Complicating <strong>the</strong> investigation are volatile<br />

data and criminals’ use <strong>of</strong> encryption. Law enforcement investigators need tools, techniques,<br />

and training that enable <strong>the</strong>m to extract important data, analyze it, and catch <strong>the</strong> perpetrators. Administrators<br />

<strong>of</strong> attacked systems need to be able to identify intrusions and recover from attacks<br />

while preserving <strong>the</strong> chain <strong>of</strong> evidence that leads to <strong>the</strong> attackers’ arrest and conviction.<br />

A Solution: Tools and Techniques for Digital Investigations<br />

The <strong>SEI</strong> became involved in forensics in response to <strong>the</strong> August 2003 U.S. Nor<strong>the</strong>ast blackout<br />

and, subsequently, expanded its operational support for investigations into cyber attacks. From <strong>the</strong><br />

start, <strong>SEI</strong> experts have focused on how to preserve evidence and present it in a way that leads to<br />

<strong>the</strong> apprehension <strong>of</strong> <strong>the</strong> criminals, and <strong>the</strong>ir approach has included comprehensive and efficient<br />

analysis <strong>of</strong> evidence, supported by technology and tools. The <strong>SEI</strong> continues to identify gap areas<br />

to address while supporting law enforcement operations such as <strong>the</strong>se:<br />

<br />

<br />

The <strong>SEI</strong> assisted an investigation <strong>of</strong> <strong>the</strong> <strong>the</strong>ft <strong>of</strong> more than 90 million credit and<br />

debit card numbers from T.J. Maxx, Marshall’s, Barnes & Noble, OfficeMax, and<br />

o<strong>the</strong>r major retailers [Houser 2008]. Referred to as <strong>the</strong> TJX case, <strong>the</strong> <strong>the</strong>ft occurred<br />

in 2005 and constituted one <strong>of</strong> <strong>the</strong> largest instances <strong>of</strong> credit card fraud and identity<br />

<strong>the</strong>ft in history [Moore 2010]. While assisting with law enforcement’s analysis, <strong>the</strong><br />

<strong>SEI</strong> developed a new tool for recovering and organizing credit card numbers from<br />

digital evidence. Two <strong>SEI</strong> staff members received <strong>the</strong> U.S. Secret Service Director’s<br />

Recognition Award for <strong>the</strong>ir contributions to <strong>the</strong> TJX case. U.S. representatives also<br />

recognized <strong>the</strong> team’s efforts during a visit to Carnegie Mellon University<br />

[FedNews 2008]. Eleven individuals were indicted in 2008 for <strong>the</strong> data breach, including<br />

<strong>the</strong> leader, Albert Gonzales. The government claimed in its sentencing<br />

memo that companies, banks, and insurers lost close to $200 million and that Gonzalez’s<br />

credit and debit card <strong>the</strong>fts “victimized a group <strong>of</strong> people whose population<br />

exceeded that <strong>of</strong> many major cities and some states” [Zetter 2010].<br />

A similar attack by <strong>the</strong> same perpetrators occurred in <strong>the</strong> Heartland case [Barrett<br />

2009]. The <strong>SEI</strong> assisted <strong>the</strong> U.S. Secret Service with investigation into intrusions<br />

and credit and debit card <strong>the</strong>ft at Heartland, Hannaford Bros., 7-Eleven, and three<br />

o<strong>the</strong>r retailers. The leader, Albert Gonzales, and two Russian accomplices were indicted<br />

in August 2009. Gonzales, who led both major attacks, received two 20-year<br />

sentences and was required to make restitution to victims.<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 276<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!