investigating computer system abuse power point final

25
Investigating Computer System Abuse Help for Human Resources Dan Michaluk and Kathryn Bird HRPA 2011 February 2, 2011

Upload: dan-michaluk

Post on 28-Jan-2015

109 views

Category:

Documents


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Investigating computer system abuse power point final

Investigating Computer System AbuseHelp for Human Resources

Dan Michaluk and Kathryn BirdHRPA 2011February 2, 2011

Page 2: Investigating computer system abuse power point final

Investigating Computer System Abuse

Outline

• Investigation basics

• Sources of digital evidence

• Why digital evidence is different

• Preservation best practices

• Interview tips

• Managing the investigation record

Page 3: Investigating computer system abuse power point final

Investigating Computer System Abuse

Page 4: Investigating computer system abuse power point final

Investigating Computer System Abuse

Investigation Basics

• Your objectives

• To gather relevant evidence

• To weigh the reliability of the evidence

• To draw one or more reliable conclusions of fact

• To appear neutral throughout

Page 5: Investigating computer system abuse power point final

Investigating Computer System Abuse

Investigation Basics

• Process flow

• Receive complaint or identify problem

• Define questions of fact

• Investigate covertly (identify, gather and preserve)

• Interview respondent employee

• Investigate response as necessary

• Draw conclusions

Page 6: Investigating computer system abuse power point final

Investigating Computer System Abuse

Investigation Basics

• Employer access to employer systems

• Generally okay with a “no expectation of privacy”

policy, but personal use is changing expectations

• But a policy that sets out an audit right and an

investigation right is good practice

• Identify how investigations are authorized

• Treat information gathered with a view to scrutiny

Page 7: Investigating computer system abuse power point final

Investigating Computer System Abuse

Sources of Digital Evidence

• Your pre-confrontation sources

• Your servers• E-mail• Voice mail• Mobile messaging

Page 8: Investigating computer system abuse power point final

Investigating Computer System Abuse

Sources of Digital Evidence

• Your pre-confrontation sources

• Your network “clients”• Stored information• Specially captured information*

*Beware: highly intrusive

Page 9: Investigating computer system abuse power point final

Investigating Computer System Abuse

Sources of Digital Evidence

• Your post-confrontation sources

• Thumb drives, cameras and other peripherals

• Media cards on mobile devices

• Peer to peer mobile communications• Messaging applications• Transfers through other applications

• Home computers

Page 10: Investigating computer system abuse power point final

Investigating Computer System Abuse

Sources of Digital Evidence

• Third-party sources

• Internet service providers

• Telecommunications carriers

Page 11: Investigating computer system abuse power point final

Investigating Computer System Abuse

Why Digital Evidence is Different

• Proving authenticity can be very difficult

• Can be readily altered

• Alternations may not be testable

Page 12: Investigating computer system abuse power point final

Investigating Computer System Abuse

Why Digital Evidence is Different

• People think it’s private

• Conversations are now stored

• E-mail is bad, chat is worse

• Chat is becoming more prevalent

• E-mail and chat are producible

Page 13: Investigating computer system abuse power point final

Investigating Computer System Abuse

Preservation of Digital Evidence

• Preservation through collection

• Decide who will collect• Is it a forensics case?• What’s at stake?• Is your IT staff qualified?• Will the person collecting be available?• Will the person collecting be a good witness?

• Preserve a copy before you review!

Page 14: Investigating computer system abuse power point final

Investigating Computer System Abuse

Preservation of Digital Evidence

• Record the chain of custody

• Identify where the copy came from

• Identify the physical object by description

• Record the time and date

• Sign it

• Secure it

Page 15: Investigating computer system abuse power point final

Investigating Computer System Abuse

Preservation of Digital Evidence

• Preserving web pages

• Difficult to do a true forensic capture

• There are services and software tools, but they need

to be applied with care

• If it is about words on the screen periodically printing

and signing or taking a screen capture may suffice

• But otherwise, get help

Page 16: Investigating computer system abuse power point final

Investigating Computer System Abuse

Preservation of Digital Evidence

• Exit procedures are important

• Computers should be held for a cooling off period

• Mobile devices can be remotely wiped

• Routine preservation may often be warranted

Page 17: Investigating computer system abuse power point final

Investigating Computer System Abuse

Interview tips

• Basic tips

• Build rapport and stress neutrality

• Sit face to face, not behind a desk

• Take notes, don’t tape

• Save the interrogation for interview #2

Page 18: Investigating computer system abuse power point final

Investigating Computer System Abuse

Interview Tips

• Show the witness the records

Page 19: Investigating computer system abuse power point final

Investigating Computer System Abuse

Interview Tips

• How to handle, “Someone must have accessed my computer!”

• Who knew your password?

• Who had access to your office?

• Where were you? Were you with someone else?

• Consider circumstantial evidence (e.g. content of

communication, timing of e-mails)

• Go through every event

Page 20: Investigating computer system abuse power point final

Investigating Computer System Abuse

Interview Tips

• Turn logs into usable evidence

• Probe at…

• …time period

• …frequency

• …volume

• …and other contextual facts shown by logs

Page 21: Investigating computer system abuse power point final

Investigating Computer System Abuse

Interview Tips

• Turn logs into usable evidence

• This shows sixty downloads in the month of May.

Does that accurately represent your activity over

that period?

• You mostly downloaded from a site called “BT

Junkie” correct?

Page 22: Investigating computer system abuse power point final

Investigating Computer System Abuse

Managing the Investigation Record

• Records produced in the course of an investigation will not be privileged except in the most extraordinary circumstances

• So everything you create may be producible

Page 23: Investigating computer system abuse power point final

Investigating Computer System Abuse

Managing the Investigation Record

• Tips for keeping a “tight” record

• Don’t conclude before you conclude

• Interview notes have factual observations only

• Don’t think over e-mail

• Don’t send draft reports by e-mail

Page 24: Investigating computer system abuse power point final

Investigating Computer System Abuse

Managing the Investigation Record

• The logic of the written report

• Conclusions and recommendations

• Facts

• Evidence• What’s relevant• What’s reliable• What’s compelling

Page 25: Investigating computer system abuse power point final

Investigating Computer System AbuseHelp for Human Resources

Dan Michaluk and Kathryn BirdHRPA 2011February 2, 2011