Educause Security Discussion mailing list archives
Re: Role of Campus Police. Was: number of IT security staff
From: Steven Alexander <alexander.s () MCCD EDU>
Date: Mon, 31 Jan 2005 11:44:07 -0800
Several years back, I was involved with the High Technology Crime Investigation Association (HTCIA). HTCIA is a group that consists of law enforcement and IT personnel from private businesses and some governmental (mostly local) IT people as well. We covered some forensic issues in out sessions, incident response and a little bit of security. One of the recommendations from law enforcement was that you know who handles computer crime in your area. If you simply call the police, they are going to send out a uniformed officer to take a report and that is all he is going to do. Instead, you should contact the detective in your police or sheriff's department who handles these cases and has the requisite training. There are more police with some forensic training than you would expect. Most of the cases that they handle aren't actually cybercrime but other crimes that involve a computer somehow. These cases include identity theft, harassment, stalking, child porn and even murder. Sometimes, the investigation is as simple as looking through a suspects email to help determine what relationship that suspect had with the victim in the case or what possible motive he might have had for the crime. It would a good idea to contact your local law enforcement ahead of time and find out what they want you to do when responding to a security incident. The forensics that most detectives are able to do are fairly minor. Mostly, they are trained to confiscate the computers, image the drives and use some sort of forensic software such as Encase. They are not trained to handle the investigation of a complex security incident. Also, most of them do not have significant Unix training, if any. If you ask the police to take over from the beginning, they will probably want to take your computers so that they can perform drive duplication in their labs. The police will call in outside experts if necessary. The better option is to have a disk with the tools necessary to list all current network connections, open files, running processes, logged in users, etc. Document every step. Document the chain of custody for the drive images and the information dumped off of the running server. You may be asked to verify in court that everything was stored safely and could not have been tampered with. Use the aforementioned tools and dump all pertinent information to a floppy disk or network drive. Shut down the server. Image the drives. Make a detailed description of the affected computers including hardware, BIOS version, drive information and OS. Prepare the server to be brought back up (with an OS reinstall or whatever other measures you deem necessary). The images that you make should not be modified, ever. These original forensic copies must be preserved. You can make additional copies and perform whatever investigation you need to. The police are usually very busy. The more you do before handing the case to them, the easier it is for them to work with you (find out what they want first). Investigate as much as you can. If you can determine what happened on your computer and where the intrusion came from, the police will be better equipped to take over. If the attack came from another organization, the police may be able to gain cooperation (possibly with a search warrant) to further trace the attacker. If the attack came from inside your organization, handle it as you would any other crime. Local law enforcement do not have a large amount of resources. They will probably be more interested in the case if your organization can do the analysis and package it nicely. Again, consult them ahead of time and find out what they want. You do not want to find out that they won't take the case or that you blew the chain of custody for the evidence or that there is some other problem after you've invested your time in this. If the appropriate law enforcement agencies are not interested, you can move on, contact your legal counsel and/or image the affected machines so that there is evidence available if the agencies can be persuaded later (perhaps after greater financial losses or information theft come to light). The FBI tends to get involved only in cases where a lot of financial loss is involved. A number of companies offer incident response services, it would probably be best to scout these out before hand if you think you will need them. I think my local police got some of their training from the state (CA). I'm not sure though. Various companies offer incident response and forensic training. One such company is foundstone: http://www.foundstone.com/ I have not had their training and cannot vouch for it. I hope that I've written everything as accurately as possible. It has been about 4 years or so since I was involved in HTCIA and I haven't had to work with law enforcement on any sort of incident since then. Cheers, Steven -----Original Message----- From: Theresa M Rowe [mailto:rowe () OAKLAND EDU] Sent: Monday, January 31, 2005 10:38 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: Re: [SECURITY] Role of Campus Police. Was: number of IT security staff I think this is an interesting thread. I was surprised to learn, after a significant hack, that our police department was not prepared to do any type of network or systems forensics. When we asked what we should do to protect any evidence, they did not have an answer (and haven't answered). There are several steps to a "cyber crime". 1) Recognizing that there has been a crime. This is still the IT area's responsiblity in many cases - agreed? 2) Mitigating the results of the crime - IT's responsibility. 3) Gathering and analyzing the evidence of the crime - whose responsibility? 4) Tracking down the perpetrator and executing an arrest - the responsibilty of the police So for me, the question is: Is there a body of knowledge on cybersecurity crime forensics? Where does one (either in IT or in the police department) get that training? Theresa Rowe Assistant Vice President University Technology Services www.oakland.edu/uts - the latest news from University Technology Services ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/groups/. ______________________________________________________________________ This email has been scanned by the MessageLabs Email Security System. For more information please visit http://www.messagelabs.com/email ______________________________________________________________________ ********** Participation and subscription information for this EDUCAUSE Discussion Group discussion list can be found at http://www.educause.edu/groups/.
Current thread:
- Re: Role of Campus Police. Was: number of IT security staff Antonio Quesada (Jan 31)
- <Possible follow-ups>
- Re: Role of Campus Police. Was: number of IT security staff Theresa M Rowe (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Sadler, Connie (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Samuel Liles (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Piscitello, Frank (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Jon E. Mitchiner (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Tracy Mitrano (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Steven Alexander (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Penn, Blake (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Brian Kaye (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Jon E. Mitchiner (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Penn, Blake (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Alec Yasinsac (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff James Riden (Jan 31)
- Re: Role of Campus Police. Was: number of IT security staff Rodney Petersen (Feb 01)
- Re: Role of Campus Police. Was: number of IT security staff Georgia T. Killcrece (Feb 02)
- Re: Role of Campus Police. Was: number of IT security staff John Lupton (Feb 04)
- Re: Role of Campus Police. Was: number of IT security staff Kay Sommers (Feb 04)
