SlideShare a Scribd company logo
Investigating Computer System Abuse Help for Human Resources Dan Michaluk and Kathryn Bird HRPA 2011 February 2, 2011
Outline Investigation basics Sources of digital evidence Why digital evidence is different Preservation best practices Interview tips Managing the investigation record
 
Investigation Basics Your objectives To gather relevant evidence To weigh the reliability of the evidence To draw one or more  reliable  conclusions of fact To appear neutral throughout
Investigation Basics Process flow Receive complaint or identify problem Define questions of fact Investigate covertly (identify, gather and preserve) Interview respondent employee Investigate response as necessary Draw conclusions
Investigation Basics Employer access to employer systems Generally okay with a “no expectation of privacy” policy, but personal use is changing expectations But a policy that sets out an audit right and an investigation right is good practice Identify how investigations are authorized Treat information gathered with a view to scrutiny
Sources of Digital Evidence Your pre-confrontation sources Your servers E-mail Voice mail Mobile messaging
Sources of Digital Evidence Your pre-confrontation sources Your network “clients” Stored information Specially captured information* *Beware: highly intrusive
Sources of Digital Evidence Your post-confrontation sources Thumb drives, cameras and other peripherals Media cards on mobile devices Peer to peer mobile communications Messaging applications Transfers through other applications Home computers
Sources of Digital Evidence Third-party sources Internet service providers Telecommunications carriers
Why Digital Evidence is Different Proving authenticity can be very difficult Can be readily altered Alternations may not be testable
Why Digital Evidence is Different People think it’s private Conversations are now stored E-mail is bad, chat is worse Chat is becoming more prevalent E-mail and chat are producible
Preservation of Digital Evidence Preservation through collection Decide who will collect Is it a forensics case? What’s at stake? Is your IT staff qualified? Will the person collecting be available? Will the person collecting be a good witness? Preserve a copy before you review!
Preservation of Digital Evidence Record the chain of custody Identify where the copy came from Identify the physical object by description Record the time and date Sign it Secure it
Preservation of Digital Evidence Preserving web pages Difficult to do a true forensic capture There are services and software tools, but they need to be applied with care If it is about words on the screen periodically printing and signing or taking a screen capture may suffice But otherwise, get help
Preservation of Digital Evidence Exit procedures are important Computers should be held for a cooling off period Mobile devices can be remotely wiped Routine preservation may often be warranted
Interview tips Basic tips Build rapport and stress neutrality Sit face to face, not behind a desk Take notes, don’t tape Save the interrogation for interview #2
Interview Tips Show the witness the records
Interview Tips How to handle, “Someone must have accessed my computer!” Who knew your password? Who had access to your office? Where were you? Were you with someone else? Consider circumstantial evidence (e.g. content of communication, timing of e-mails) Go through every event
Interview Tips Turn logs into usable evidence Probe at… … time period … frequency … volume … and other contextual facts shown by logs
Interview Tips Turn logs into usable evidence This shows sixty downloads in the month of May. Does that accurately represent your activity over that period? You mostly downloaded from a site called “BT Junkie” correct?
Managing the Investigation Record Records produced in the course of an investigation will not be privileged except in the most extraordinary circumstances So everything you create may be producible
Managing the Investigation Record Tips for keeping a “tight” record Don’t conclude before you conclude Interview notes have factual observations only Don’t think over e-mail Don’t send draft reports by e-mail
Managing the Investigation Record The logic of the written report Conclusions and recommendations Facts Evidence What’s relevant What’s reliable What’s compelling
Investigating Computer System Abuse Help for Human Resources Dan Michaluk and Kathryn Bird HRPA 2011 February 2, 2011

More Related Content

PPTX
Digital evidence and the information security manager
PPT
Teaching Computer Forensics Using Student Developed Evidence Files
PPT
Internal investigation traps
PDF
Why i hate digital forensics - draft
PPTX
Draft current state of digital forensic and data science
PPTX
Technical Challenges in Cyber Forensics
PPTX
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
PPT
Forensic Lab Development
Digital evidence and the information security manager
Teaching Computer Forensics Using Student Developed Evidence Files
Internal investigation traps
Why i hate digital forensics - draft
Draft current state of digital forensic and data science
Technical Challenges in Cyber Forensics
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Forensic Lab Development

What's hot (17)

PPT
Digital Evidence - the defence, prosecution, & the court
PPTX
Securitarian
PDF
6528 opensource intelligence as the new introduction in the graduate cybersec...
PPTX
Digital Forensics best practices with the use of open source tools and admiss...
PDF
Sued or Suing: Introduction to Digital Forensics
PPTX
Role of encryption in security vs privacy debate
PPTX
Digital forensics ahmed emam
PDF
I spy. The world of info Security from the known to the unknown.
PPTX
Digital investigation
PPTX
Digital forensics research: The next 10 years
PPTX
Digital Forensics Workshop
PPT
Computer Forensic
PPTX
Cyber forensics 02 mit-2014
ODP
Itet2 its anatomy
PDF
The Future of Digital Forensics
PPTX
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
PDF
Digital Evidence in Computer Forensic Investigations
Digital Evidence - the defence, prosecution, & the court
Securitarian
6528 opensource intelligence as the new introduction in the graduate cybersec...
Digital Forensics best practices with the use of open source tools and admiss...
Sued or Suing: Introduction to Digital Forensics
Role of encryption in security vs privacy debate
Digital forensics ahmed emam
I spy. The world of info Security from the known to the unknown.
Digital investigation
Digital forensics research: The next 10 years
Digital Forensics Workshop
Computer Forensic
Cyber forensics 02 mit-2014
Itet2 its anatomy
The Future of Digital Forensics
Digital forensics and Cyber Crime: Yesterday, Today & Tomorrow
Digital Evidence in Computer Forensic Investigations
Ad

Similar to Investigating computer system abuse power point final (20)

PPTX
Cyber
PDF
3 Best Practices for eDiscovery Custodian Interviews
 
PPTX
Awareness Training on Information Security
PDF
Who's Afraid of eDiscovery?
PPTX
Don't Get Stung - Student Data Security
PPTX
Digital Evidence by Raghu Khimani
PPTX
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
PPT
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
PPTX
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
PPTX
Union Bank Digital Forensic Evidence Extraction Prof Oyedokun.pptx
PPT
E-Mail as Evidence
PPTX
Cyber evidence at crime scene
PPTX
Theres No Crying In Baseball...Or In E Discovery 04.30.10
PPTX
Cyber-Forensics and Introduction to computer forensics
PPT
Understand Risk in Communications and Data Breach
PDF
A brief Intro to Digital Forensics
PPT
It security in healthcare
PPTX
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
PPT
Lecture2 Introduction to Digital Forensics.ppt
PPT
Small Law Office Management for the Legal Professional
Cyber
3 Best Practices for eDiscovery Custodian Interviews
 
Awareness Training on Information Security
Who's Afraid of eDiscovery?
Don't Get Stung - Student Data Security
Digital Evidence by Raghu Khimani
Lecture Eleven-Cyber Crime Related Evidence (1).pptx
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
The challenges of digital evidence in ‘formal proceedings’ from Accuracy
Union Bank Digital Forensic Evidence Extraction Prof Oyedokun.pptx
E-Mail as Evidence
Cyber evidence at crime scene
Theres No Crying In Baseball...Or In E Discovery 04.30.10
Cyber-Forensics and Introduction to computer forensics
Understand Risk in Communications and Data Breach
A brief Intro to Digital Forensics
It security in healthcare
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Lecture2 Introduction to Digital Forensics.ppt
Small Law Office Management for the Legal Professional
Ad

More from Dan Michaluk (20)

PPTX
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
PPTX
Critical Issues in School Board Cyber Security
PPTX
Introduction to FOI law (the law of information)
PPTX
Higher Education Sexual Violence Presentation
PPTX
Cyber class action claims at an inflection point
PPTX
The pandemic and privacy
PPTX
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
PPTX
Union access to information
PPTX
Cybersecurity Risk Governance
PPTX
Cyber Incident Response - When it happens, will you be ready?
PPTX
The Current State of FOI
PPTX
Cyber, secrecy and the public body
PPTX
The privacy and security implications of AI, big data and predictive analytics
PPTX
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
PPTX
Privacy, Data Security and Anti-Spam Compliance
PPTX
Cyber Insurance and Incident Response Practice
PPTX
Role of a breach coach
PPTX
PHIPA for school boards
PPTX
Privacy, Data Security and Anti-Spam Compliance
PPTX
Finding internet evidence
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Critical Issues in School Board Cyber Security
Introduction to FOI law (the law of information)
Higher Education Sexual Violence Presentation
Cyber class action claims at an inflection point
The pandemic and privacy
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Union access to information
Cybersecurity Risk Governance
Cyber Incident Response - When it happens, will you be ready?
The Current State of FOI
Cyber, secrecy and the public body
The privacy and security implications of AI, big data and predictive analytics
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Privacy, Data Security and Anti-Spam Compliance
Cyber Insurance and Incident Response Practice
Role of a breach coach
PHIPA for school boards
Privacy, Data Security and Anti-Spam Compliance
Finding internet evidence

Investigating computer system abuse power point final

  • 1. Investigating Computer System Abuse Help for Human Resources Dan Michaluk and Kathryn Bird HRPA 2011 February 2, 2011
  • 2. Outline Investigation basics Sources of digital evidence Why digital evidence is different Preservation best practices Interview tips Managing the investigation record
  • 3.  
  • 4. Investigation Basics Your objectives To gather relevant evidence To weigh the reliability of the evidence To draw one or more reliable conclusions of fact To appear neutral throughout
  • 5. Investigation Basics Process flow Receive complaint or identify problem Define questions of fact Investigate covertly (identify, gather and preserve) Interview respondent employee Investigate response as necessary Draw conclusions
  • 6. Investigation Basics Employer access to employer systems Generally okay with a “no expectation of privacy” policy, but personal use is changing expectations But a policy that sets out an audit right and an investigation right is good practice Identify how investigations are authorized Treat information gathered with a view to scrutiny
  • 7. Sources of Digital Evidence Your pre-confrontation sources Your servers E-mail Voice mail Mobile messaging
  • 8. Sources of Digital Evidence Your pre-confrontation sources Your network “clients” Stored information Specially captured information* *Beware: highly intrusive
  • 9. Sources of Digital Evidence Your post-confrontation sources Thumb drives, cameras and other peripherals Media cards on mobile devices Peer to peer mobile communications Messaging applications Transfers through other applications Home computers
  • 10. Sources of Digital Evidence Third-party sources Internet service providers Telecommunications carriers
  • 11. Why Digital Evidence is Different Proving authenticity can be very difficult Can be readily altered Alternations may not be testable
  • 12. Why Digital Evidence is Different People think it’s private Conversations are now stored E-mail is bad, chat is worse Chat is becoming more prevalent E-mail and chat are producible
  • 13. Preservation of Digital Evidence Preservation through collection Decide who will collect Is it a forensics case? What’s at stake? Is your IT staff qualified? Will the person collecting be available? Will the person collecting be a good witness? Preserve a copy before you review!
  • 14. Preservation of Digital Evidence Record the chain of custody Identify where the copy came from Identify the physical object by description Record the time and date Sign it Secure it
  • 15. Preservation of Digital Evidence Preserving web pages Difficult to do a true forensic capture There are services and software tools, but they need to be applied with care If it is about words on the screen periodically printing and signing or taking a screen capture may suffice But otherwise, get help
  • 16. Preservation of Digital Evidence Exit procedures are important Computers should be held for a cooling off period Mobile devices can be remotely wiped Routine preservation may often be warranted
  • 17. Interview tips Basic tips Build rapport and stress neutrality Sit face to face, not behind a desk Take notes, don’t tape Save the interrogation for interview #2
  • 18. Interview Tips Show the witness the records
  • 19. Interview Tips How to handle, “Someone must have accessed my computer!” Who knew your password? Who had access to your office? Where were you? Were you with someone else? Consider circumstantial evidence (e.g. content of communication, timing of e-mails) Go through every event
  • 20. Interview Tips Turn logs into usable evidence Probe at… … time period … frequency … volume … and other contextual facts shown by logs
  • 21. Interview Tips Turn logs into usable evidence This shows sixty downloads in the month of May. Does that accurately represent your activity over that period? You mostly downloaded from a site called “BT Junkie” correct?
  • 22. Managing the Investigation Record Records produced in the course of an investigation will not be privileged except in the most extraordinary circumstances So everything you create may be producible
  • 23. Managing the Investigation Record Tips for keeping a “tight” record Don’t conclude before you conclude Interview notes have factual observations only Don’t think over e-mail Don’t send draft reports by e-mail
  • 24. Managing the Investigation Record The logic of the written report Conclusions and recommendations Facts Evidence What’s relevant What’s reliable What’s compelling
  • 25. Investigating Computer System Abuse Help for Human Resources Dan Michaluk and Kathryn Bird HRPA 2011 February 2, 2011

Editor's Notes

  • #3: KJB
  • #4: KJB -can’t stress knowing limits enough -ideal – legal and IT forensics guidance -call us though – we can judge limits.. we can put you in touch or get quick guidance for you
  • #5: Next two slides are basics – helps to step back though Defined by mandate Who stole the cookies from the cookie jar? Did Hugo steal the cookies from the cookie jar? If yes, does his conduct in the investigation demonstrate understanding of his responsibility? Gather evidence Piece of information that supports a conclusion Mom saw one cookie in the cookie jar at 3:00 pm Mom saw the cookie was gone by 4:00 pm Hugo came home from school at 3:30 pm Different reliability Hugo says he saw Penny with cookie crumbs on her shirt at 3:40 Conclusions The cookie was taken between 3:30 and 4:00 Hugo did take the cookie He has accepted responsibility. (Goes to penalty.)
  • #6: Process flow is here Key ideas -Spend time planning -What’s the scope -What do you need to figure our -Usually a covert phase (preserve evidence, prevent fabrication) -Esp. with computer abuse, best source of evidence -If you are more prepared you are more likely to get admissions -Don’t dawdle… legal prejudice in some cases -If there are risks and the investigation will take time, issue a non-disciplinary suspension -Consider whether there are reasonable grounds to suspect -I usually recommend with pay -Efficiency through preparation -Avoid looping inquiries
  • #7: So you must have access to stored communications Preconditions -Notice that personal use does not come with an expectation of privacy -Be explicit, “If you don’t want personal communications viewed by us, don’t send them on our system.” -Reserve the rights you need in express terms -Routine monitoring (exceptional… is it justified by cost? more risky from ER and legal perspective) -Routine audits (should be standard) -Investigations based on “reasonable suspicion” More and more employers are implementing controls (good thing in my view) -Audits follow this protocol -Investigations only authorized by director of IT security or delegate -And so on
  • #8: KJB
  • #9: KJB
  • #10: Advising is associated with a risk of destruction of evidence So have a plan Key risk – corporate blackberry -SMS will go from the device to the carrier (may or may not be retained) to the device -Understand SMS logging is possible but not ideal -More and more apps will put information on the device -Very important source of information -So secure the device – take it, stick it in an envelope, sign over, store it -I’m wary about taking Micro SD card only without forensic advice -Also understand ways of deleting information post seizure – Faraday bag -Get advice on that type of file
  • #11: Scenario – anonymous postings… suspect it is an employee Most common approach – send a preservation letter and (expeditiously) consider alternative sources Consider local sources of evidence first -Usually will recommend contact with IT forensic person to assess sources Consider you whether you can identify by circumstantial evidence first -Time of post (though be wary of electronic time stamps) -Content of post (he knew something, only he had an interest) Ultimately there are legal remedies to identify wrongdoers Downside of even engaging a 3P -expensive -may only lead to circumstantial evidence of identification -may have a policy to notify client Test -bona fide claim, 3P involved in acts complained of, 3P only practicable source, indemnification of costs, interests of justice
  • #12: KJB
  • #13: KJB
  • #14: Investigations are about collecting evidence Must preserve what you collect Electronic evidence requires very careful handling Esp. e-mails, text message logs, internet log files (changed easily) So think about preservation Who is the first question -person getting called may need to prove the authenticity of the document -very important for lengthy log files, which can’t be identified by inspection -if the process is at all fancy, need a technical expert -alternative… IT working under the written direction and guidance of a forensic expert -I got this guidance… I followed all the steps I like physical preservation solutions -put it on a read once disk and sign and secure the disk… simple -also mathematical means… hashing files… do under guidance of expert Preserve a copy before you review -do not review the evidence itself -leave you open to attack
  • #15: Take a hard drive out of a machine Create a log Next person who takes does the same
  • #16: Most important advice – do it quickly first… then do it better later Seen it disappear in 10 minutes Second most important advice Do it periodically Evidence of duration is often relevant Websites evolve Method -try to capture how the page looked… printouts distort -try to capture links, which may be relevant context -printouts of screen captures may be okay in many cases (sign and date) -can use adobe acrobat to capture websites -important thing to do is keep a physical log when dealing with electronics -be sceptical of “black box” solutions
  • #17: This is a common risk we see -keep these things as a matter of policy -simple but important message Two options -one uniform preservation rule -discretion – preserve for short period in all cases, longer period in certain kinds of terminations
  • #20: Very common IT security problem -having and enforcing password change policy helps -generates circumstantial evidence… last time changed password was three days before! -may be better alternatives (biometrics authentication, biographical quiz authentication), but passwords are the reality These are the kind of questions you have -get facts from the person -gather evidence form others
  • #21: May get long log files… internet log files Hard to authenticate Also don’t present well Do some synthesis in advance Also identify the key parts of the log in advance Use them to extract admissions Much more “usable” evidence