document life cycle management john mallery managing consultant bkd, llp [email protected]

70
Document Life Cycle Management John Mallery Managing Consultant BKD, LLP [email protected]

Upload: alban-fox

Post on 19-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Document Life Cycle Management

John MalleryManaging Consultant

BKD, [email protected]

Page 2: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Agenda

• Discuss how widely disseminated data can be

• It is now to the point where it is difficult to control

IMPOSSIBLE

• Address mechanisms that exist to control document “behavior”• Not finding copies of documents when you need them

Page 3: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

PDA’s

HomeUsers

Cell Phones

Business Partnerships

Road Warriors

Page 4: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Online storage sites

• Files Anywhere - http://www.filesanywhere.com/• BestSharing - http://www.bestsharing.com• BigUpload – http://www.bigupload.com• bigVault – http://www.bigvault.com• biscu.com – http://www.biscu.com• DropSend – http://www.dropsend.com• ecPocket.com – http://www.ecpocket.com• Elephant Drive – http://www.elephantdrive.com• MyFileHut – http://www.myfilehut.com• Putfwd.com – http://www.putfwd.com• Savefile – http://www.savefile.com• Xdrive – http://www.xdrive.com• Global Data Vault – http://www.globaldatavault.com• Online Storage Solutions – http://www.onlinestoragesolution.com• Box.net – http://www.box.net

Page 5: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

GSpace

Firefox Plugin

Page 6: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

GSpace

Page 7: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

USB Mass Storage Devices

Page 8: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

What will they think of next?

USB Mass Storage Devices

Page 9: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

USB Mass Storage Devices

Page 10: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Amazing!

What about human fingernail?

Page 11: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Too Cool!

Page 12: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Privacy software for USB Devices

• PI Protector Mobility Suite http://www.imaginelan.com/winboot/Internet Explorer, Outlook and File Sync – all files stored on USB drive

• Migo USB Deviceshttp://www.4migo.com

Page 13: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

U3 USB

• Allows any application to run on a USB device.

• USB devices now “parasites” on host computers

Page 14: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

USB SyncBox

Can transfer data between USB devices without a computer.

Page 15: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Preventing USB Data Transfers

• Fill USB Ports with Epoxy• Modify BIOS• Create Group Policy Object removing

permissions to usbstor.dll for all except System and possibly Admins. Still allows use of non-storage related USB devices

• Modify registry to make USB devices read only (see next slide)

Page 16: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Thanks to Mark Minasi

• “It's a simple Registry change.  First, create a whole new key: HKLM\System\CurrentControlSet\Control \ StorageDevicePolicies.  Then create a REG_DWORD entry in it called WriteProtect.  Set it to 1 and you'll be able to read from USB drives but not write to them.”

• XP – SP2• www.minasi.com

Page 17: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

USB Hacksaw

“The USB Hacksaw is an evolution of the popular USB Switchblade that uses a modified version of USBDumper, Blat, Stunnel, and Gmail to automatically infect Windows PCs with a payload that will retrieve documents from USB drives plugged into the target machine and securely transmit them to an email account.”

From http://www.hak5.org/wiki/USB_Hacksaw

Page 18: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Don’t forget paper…

3 Accused In Theft Of Coke SecretsInformation Offered To Pepsi, FBI Says

“A company surveillance camera caught Coca-Cola employee Joya Williams at her desk looking through files and "stuffing documents into bags," Nahmias and FBI officials said. Then in June, an undercover FBI agent met at the Atlanta airport with another of the defendants, handing him $30,000 in a yellow Girl Scout Cookie box in exchange for an Armani bag containing confidential Coca-Cola documents and a sample of a product the company was developing, officials said.”

Washingtonpost.comKathleen DayJuly 6, 2006 http://tinyurl.com/ppwh6

Page 19: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Regaining Control

End User and Enterprise Tools

Page 20: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Enterprise P.D.S.D. Control

• Device Wall - www.devicewall.com• DeviceLock: http://www.protect-me.com/dl/

• Sanctuary Device Control: http://www.securewave.com/sanctuary_DC.jsp

Page 21: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Old Ways

• File Rights Management• Essentially controlling who has access to

which documents• Helpful if properly implemented• Still not implemented properly• Easier to allow everyone access to

everything• Still Exists!

Page 22: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Document Life Cycle Management – End User Tools

• Tools like Net-It Now and Adobe Acrobat provide the ability to add some control

• These tools require users to determine what rights to apply

Page 23: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Net-It Now

“Net-It® Now is a free print driver that renders your files to CSF (content secure format), a compressed encrypted format thatallows you to add Visual Rights™, including password protection, an expiration date, and feature restrictions, to your files(settings). Files are viewable with the free Brava! Reader (views TIFF, PDF and CSF files)”.

http://www.net-it.com/nin.htm

Page 24: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Example

View file in Hex Editor

Page 25: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Adobe Acrobat

Page 26: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Document Lifecycle Management – Enterprise Tools

• Microsoft Office IRM – Information Rights Management

• Liquid Machines• Authentica• Adobe Life Cycle Policy Server

Page 27: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Microsoft IRM

• Information Rights Management• Available for Microsoft Office 2003• Requires the following

– Microsoft Windows Rights Management Services for Windows Server 2003 (http://www.microsoft.com/rms)

– Active Directory– IIS– Database such as MS SQL– Office 2003 Professional

Page 28: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Office IRM

Allow users with earlier versions of Office to read with browsers supporting Information Rights Management. (Increases file size)

Page 29: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Liquid Machines

“Liquid Machines Document Control™ uses its patented Policy Droplet™ control to provide an intuitive, consistent user interface across more than 65 applications and file formats, including Microsoft Office, Visio, Sharepoint® and Adobe Acrobat, to persistently control access to and usage of electronic information throughout its lifecycle.”

Page 30: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Authentica

• Provides complete after-delivery protection and control; prevents sensitive documents from being forwarded

• Lets content owners define access privileges (copy/paste, print) and expire access to documents at any time

• Lets content owners insert a custom watermark into a document to deter authorized viewers from printing and distributing the document

From http://www.authentica.com/products/securedocs.aspx

Page 31: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Authentica

• Provides a detailed audit trail so that organizations can actively track document activity (what pages were viewed, by whom, when, from where, for how long, and whether they were printed)

• Leverages a company's existing authentication systems and LDAP user directories for creating document policies, thereby reducing administrator involvement

Page 32: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Investigating Theft of Documents

Privacy vs. Investigations

(Anti-forensics)

Page 33: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Privacy Concerns

• Plastic Surgeon story• “Deleted Files” being used in litigation• Increased awareness of computer

forensics capabilities

Page 34: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Agenda

• Configuration settings – methods used to cover tracks using “supplied” tools and configuration settings

• Third party tools – wiping, properties changers, registry cleaners, steganography/encryption, etc.

• Tools and methods designed specifically to fool computer forensics programs.

Page 35: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Simple

• “Shift+Delete” to bypass Recycle Bin

• Recycle Bin – configured to delete immediately

• defrag

Page 36: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

OS/Application Supplied

Empty Temporary Internet Files folder when browser

is closed.

Page 37: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

OS/Application Supplied

Shutdown: Clear virtual memory pagefile Enabled

XP- Control Panel | Administrative Tools | Local Security Policy | Local Policies | Security Options | Shutdown: Clear virtual memory Page File | Select Enabled

Page 38: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Clear Page File

Configured? Check following registry key:

Hive: HKEY_LOCAL_MACHINE\SYSTEM

Key: CurrentControlSet\Control\Session Manager\Memory Management

Name: ClearPageFileAtShutdown

Type: REG_DWORD

Value: 1

Slows down shutdown process

Page 39: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

OS/Application Supplied

CIPHER - “Displays or alters the encryption of directories[files] on NTFS partitions”

CIPHER /W:directory

(XP)

Page 40: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

OS/Application Supplied

Disk Cleanup

Page 41: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

OS/Application Supplied

• Word (Excel)– Hidden font– White on White– Small font

• Plug ins– Remove hidden data tool– Redaction tool– Payne scrambling tool

Page 42: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Hidden Font

Hidden font

Page 43: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Redaction tool

http://tinyurl.com/dgokp(Word 2003)

“OverviewRedaction is the careful editing of a document to remove confidential information.

The Microsoft Office Word 2003 Redaction Add-in makes it easy for you to mark sections of a document for redaction. You can then redact the document so that the sections you specified are blacked out. You can either print the redacted document or use it electronically. In the redacted version of the document, the redacted text is replaced with a black bar and cannot be converted back to text or retrieved.”

Page 44: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Remove Hidden Data(metadata)

http://tinyurl.com/5bams

Page 45: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Scramble Assistant

http://www.payneconsulting.com/products/scramword_free/

For Word&

Excel

Page 46: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Advantages of OS Supplied Tools

• Appear less “nefarious” than commercial tools (Evidence Eliminator).

• Free

Page 47: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Third Party Tools

Fun for the Whole Family

Page 48: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Registry Cleaner

Page 49: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Merge Streams/Glue

• Hides Excel file within a Word Document (vice versa)• .doc – see Word file• .xls – see Excel file• Won’t fool forensics examiner – may confuse them• Word – “Recover Text from any file”

Page 50: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Merge Streams/Glue

Page 51: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Merge Streams/Glue

• Demo• http://www.ntkernel.com/w&p.php?id=23

Page 52: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

File Properties Changer

www.segobit.com

Page 53: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Wiping Tools

• Gazillions of them• Eraser (comes with DBAN)• Sdelete – www.sysinternals.com• Evidence Eliminator • BC Wipe• Cyberscrub• Etc.• Do they perform as promised? PGP does it

really wipe slack space?• Are they used frequently?

Page 54: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Removing Residual Data

• Tools exist to remove residual data

• But do not use them in response to litigation

• See - Kucala Enterprises, Ltd. v. Auto Wax Co., Inc., 2003 WL 21230605 (N.D.Ill.), May 27, 2003 - "Any reasonable person can deduce, if not from the name of the product itself, then by reading the website, that Evidence Eliminator is a product used to circumvent discovery.”

• Anderson v. Crossroads Capital Partners

Page 55: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

SoftwareHKEY_CURRENT_USER\Software\

[Manufacturer Name]\[Tool]

Page 56: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Encryption

• Cryptext – free and easy to use, a shell extension (http://tinyurl.com/do2qs )

• EFS• OTFE – Encrypted partitions

www.truecrypt.org• USB Thumb Drives – new ones include

encrypted partitions • Encrypted file stored on an encrypted partition…

• Locknote - http://locknote.steganos.com/

Page 57: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Steganography

• Includes encryption• Free tools• Complex method of hiding data• But easy to do…• Can you detect it?• “Duplicate Colors?”• Wetstone Technologies• stegdetect

Page 58: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

stools

DEMO

Page 59: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Metasploit Project

• Timestomp – modifies MAC times so EnCase can’t read them.

http://www.metasploit.com/projects/antiforensics/

Page 60: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Timestomp

Page 61: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Timestomp

Page 62: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Timestomp

Page 63: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Good News/Bad News

• First the Bad News• Using a combination of these tools on a

regular basis can defeat a computer forensics examination

• Now the Good News• Very few users know about “all” of these

tools and methods• Not all tools perform as promised

Page 64: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Last thoughts

• Determining whether these tools have been used can be just as important as finding evidence.

• Finding these tools can counter the “I’m not sophisticated enough” argument.

• Found in illegal movie and music distribution cases.

Page 65: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

MAC OS X – the shape of things to come

FileVault – Encrypted Home Folder

Secure Virtual Memory

Page 66: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

MAC OSX – the shape of things to come

Page 67: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Mac OS X - Safari

Page 68: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

IE7

Page 69: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

Questions/Comments

John MalleryManaging Consultant

BKD, LLP816 221-6300

[email protected]

Page 70: Document Life Cycle Management John Mallery Managing Consultant BKD, LLP jmallery@bkd.com

http://www.eweek.com/article2/0,1895,1830962,00.asp