Darwinism via Forensics People Make Dumb Decisions With Todays - - PowerPoint PPT Presentation

darwinism via forensics
SMART_READER_LITE
LIVE PREVIEW

Darwinism via Forensics People Make Dumb Decisions With Todays - - PowerPoint PPT Presentation

Darwinism via Forensics People Make Dumb Decisions With Todays Technology Bill Dean, CCE Senior Manager, LBMC Information Security February 7, 2017 Todays Agenda Digital Forensics Basics How Does it work? Applicable Case Studies


slide-1
SLIDE 1

Darwinism via Forensics

Bill Dean, CCE Senior Manager, LBMC Information Security

February 7, 2017

People Make Dumb Decisions With Today’s Technology

slide-2
SLIDE 2

2

Today’s Agenda

Digital Forensics Basics

  • How Does it work?

Applicable Case Studies

  • They Really did that?

“Pro” Tips Along the Way This Will Not Be Boring

slide-3
SLIDE 3

3

Digital Forensics Basics

 Recovering/Analyzing Deleted Information  Keyword Searching  Digital Communications  Internet Activities  Pictures/Movies  File Activity  External Storage Usage  Metadata/EXIF Data  Application Execution Histories  Anti-Forensics Efforts

slide-4
SLIDE 4

4

Technologies We Analyze

Computers Servers Memory Mobile Devices Cloud Storage Removable Media GPS Devices Watches/FitBits

slide-5
SLIDE 5

5

Deleted Information

slide-6
SLIDE 6

6

Deleted Information

slide-7
SLIDE 7

7

Keyword Searching

Valuable..But Boring Very Flexible

  • Operators (and, or, not)
  • Proximity (plum w/5 pear)

Stemming Fuzzy Synonym

slide-8
SLIDE 8

8

Communications

Conventional Email Webmail (Gmail, Hotmail, etc.) Associated Attachments Social Network Communications We will discuss TXT messaging later

slide-9
SLIDE 9

9

Internet Histories

Tells a Story We Know What You Are Thinking Google Keeps Your Search Histories (and more) We Recover Deleted Internet Histories We Don’t Care Which Browser You Use

slide-10
SLIDE 10

10

Facebook Chats

Suspected Affair Suspect Learned About Investigation

  • Cleared All Chat Histories
  • Deleted Internet Histories

Didn’t Matter 282 Facebook Chat Messages Recovered Exactly What Was Suspected

slide-11
SLIDE 11

11

Employment Matter

Workplace Injury “Diminished Quality of Life” Internet Research

  • Condition Symptoms
  • Workers’ Compensation Calculators
  • Computer Forensics

Personal Pictures

  • Vacations
  • Orange/White Game
  • Lake Activities
slide-12
SLIDE 12

12

File activity

Creation Modification Accessed Deleted Opened

  • From Where
slide-13
SLIDE 13

13

External Storage Usage

We Know Every USB Device Used

  • USB Storage
  • Mobile Phones
  • GPS Devices
  • Anything Else

First and Last Times Used

  • Sometimes Each time
  • And How Long

Model and Serial Number

slide-14
SLIDE 14

14

slide-15
SLIDE 15

15

slide-16
SLIDE 16

16

Intellectual Property Theft

12/22 – Employee Resigned from Company 12/02 – Google Search for “Is ____ a good company to work

for?”

12/10 – Copied “Projects” Folder to Desktop Folder Contained 5000+ Proprietary Designs

slide-17
SLIDE 17

17

Intellectual Property Theft

12/22 @ 1:10AM – Laptop was powered on 12/02 @ 1:11AM – Laptop recognized USB drive 12/22 @ 1:13 – The “Projects” folder was moved to USB 12/22 @ 2:03 – Laptop was powered off

slide-18
SLIDE 18

18

Application Executions

We know the first execution date/time We know the last execution date/time We know how many executions We know what user executed the application

slide-19
SLIDE 19

19

“Easy” Trade Secret Theft

Employee Resigned on May 6, 2011 Google Query “How do I link another email account to Gmail

if that other account uses IMAP?”

Copied sensitive information to USB DropBox installed March 3, 2011 DropBox uninstalled May 6, 2011

slide-20
SLIDE 20

20

“Easy” Trade Secret Theft

slide-21
SLIDE 21

21

“Easy” Trade Secret Theft

slide-22
SLIDE 22

22

“Easy” Trade Secret Theft

slide-23
SLIDE 23

23

DropBox ≠ “Easy” Trade Secret Theft

Analysis of home machine Business secrets “synchronized” Copied sensitive information to USB Copied to USB drive on May 7, 2011 DropBox uninstalled May 6, 2011

slide-24
SLIDE 24

24

MetaData/EXIF Data

“Information about Information”

  • Dates of Creation or Access
  • Authors
  • Prior Histories
  • Editing Histories
  • Printing

Email Spreadsheets Office Documents Pictures

slide-25
SLIDE 25

25

MetaData Case Study #1

slide-26
SLIDE 26

26

MetaData Case Study #1

slide-27
SLIDE 27

27

MetaData Case Study #2

slide-28
SLIDE 28

28

Anti-Forensics Efforts

Effort to Conceal/Destroy Most Often Noticeable Special Programs System Utilities

slide-29
SLIDE 29

29

Anti-Forensics Case Study

slide-30
SLIDE 30

30

slide-31
SLIDE 31

31

Klumb v. Goan

Young Attorney Marries Established Businessman We Need to “Monitor” the Children Speculation of a “Plan”

slide-32
SLIDE 32

32

http://www.goklg.com/2012/08/01/ex-spouse-hit-with-20k-in-damages-for-email- eavesdropping-klumb-v-goan/

slide-33
SLIDE 33

33

Divorce Grand Scheme

All Computers Involved Hundreds of YahooMail! Emails Recovered Discrepancies of Emails Produced in Discovery “I don’t have a USB drive” Conflicting Antenuptual Agreements

http://cyb3rcrim3.blogspot.com/2012/08/eblaster-wiretapping-and-prenup.html

slide-34
SLIDE 34

34

Ruthless Business Partner

Company Ownership Split Competing Company Knew “Everything” Thought Offices Were Bugged

slide-35
SLIDE 35

35

Triple Crown Winner

11/10 – Employee Dismissed (All Access Not Removed) 1/24 – Someone Connected and “Cracked” Passwords 1/25 – Someone Installed Remote Control Software

  • Began Accessing Sensitive Computers
  • Began Accessing CCTV Systems
  • Accessed Sensitive Information
slide-36
SLIDE 36

36

Triple Crown Winner

2/20 – Connected to Computer

  • Recovered Passwords
  • Accessed Email of

–IT Director –Purchasing Manager

 Placed Online Orders  Searched for More Credit Card Info

slide-37
SLIDE 37

Nation State Espionage

  • “I Have Not Been to China”
slide-38
SLIDE 38

Nation State Espionage

  • “OK.. Maybe Once or Twice”
slide-39
SLIDE 39

39

iMessage Sync = $ Divorce

Suspected Affair iMessage Communications Borrowed Son’s iPad Entire Conversation Synced

slide-40
SLIDE 40

Bill Dean, CCE bdean@lbmc.com (865) 862-3051