Computer Incident Investigations: e-forensic Insights on Evidence Acquisition

The growing incidence and risk of inappropriate, illegal and/or criminal computer behaviours has increased the need to build bridges between technical and legal areas of expertise in order to produce more effective defensive and offensive responses. Although there is already a large volume of literature on organizational, technical and legal issues pertaining to computer misuse and e-crime there have until recently been only limited explorations of the interrelationships between these issues. This has been partly because of the lack of a conceptual framework within which to position these different approaches and partly because of the complexity of the specific sets of legal and technical challenges faced (Broucek & Turner, 2001a, 2001b; Hannan, Frings, Broucek, & Turner, 2003; Hannan, Turner, & Broucek, 2003). While at one level conventional approaches to social misconduct (including deterrence, security and education) retain their relevance in cyber-space, the variety of ways that individuals and/or groups can now use digital technologies to engage in computer misuse and e-crime does present unique challenges. As with other types of investigation when an incident occurs or behaviour is detected there is need to formally investigate and assess its extent and effect. There is also a need to gather evidence and proof that may be used as the basis for responses. Significantly, in the case of computer misuse and e-crime, it is these evidence acquisition activities that from an e-forensics perspective present the most difficult technical and legal challenges. On the technical side, problems remain in relation to the processes for detecting, identifying and logging these behaviours. On the legal side, numerous challenging legal considerations exist regarding types of evidence acquisition (“forensic”) activity and the legal admissibility of the digital evidence that these activities produce. To address these challenges is particularly difficult because most technical e-security solutions are not currently designed to support such e-forensic data acquisition and most organisations are unfamiliar with the admissibility requirements for digital evidence collection, collation and presentation (Broucek & Turner, 2002a, 2003c; Sommer, 1998). This research paper provides a forensic computing perspective on these issues through a discussion of a recent legal case against three Australian Universities involving MP3 piracy. The paper also explores the recently developed European CTOSE (Cyber Tools On-line Search for Evidence) methodology (Frings, Stanisic-Petrovic, & Urry, 2003; Leroux & Perez Asinari, 2003; Urry & Mitchison, 2003) and presents some basic key principles for approaching digital evidence handling. Key findings of the paper include: • “Best” practice for digital evidence handling involves deploying the highest investigative standards at all stages in the identification, analysis and presentation of digital data; • Targeted training and education of network administrators and end-users in the key principles of digital evidence handling is urgently required; Authors: Broucek, V. & Turner, P. EICAR 2004 Conference CD-rom: Best Paper Proceedings EICAR 2004 Conference CD-rom Editor: Urs E. Gattiker ISBN: 87-987271-6-8 Copyright © 2004 by EICAR e.V. 4 • Opportunities exist for the further refinement of e-forensic methodologies and processes such as those developed by CTOSE; • Enhancing e-forensic professionalism through the rapid development of processes for e-forensic computing competences and certification will lead to improved outcomes in the investigation and prosecution of computer misuse and e-crime.

[1]  Paul Turner,et al.  Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse , 2003, Australian Computer, Network & Information Forensics Conference.

[2]  Broucek,et al.  Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare , 2001 .

[3]  Paul Turner,et al.  A forensic computing perspective on the need for improved user education for information systems security management , 2002 .

[4]  Paul Turner,et al.  The Federal Court, the Music Industry and the Universities , 2003, Australian Computer, Network & Information Forensics Conference.

[5]  Julie Clacy,et al.  In line. , 1988, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[6]  Paul Turner,et al.  Risks and Solutions to Problems Arising from Illegal or Inappropriate On-line Behaviours: Two Core Debates Within Forensic Computing , 2002 .

[7]  Paul Turner,et al.  Intrusion detection: Forensic computing insights arising from a case study on SNORT , 2003 .

[8]  Broucek,et al.  Developing a Conceptual Approach for an Emerging Academic Discipline , 2001 .

[9]  Paul Turner,et al.  Refining the Taxonomy of Forensic Computing in the era of E Crime: Insights from a survey of Australian Forensic Computing investigation (FCI) teams , 2003 .

[10]  Peter Sommer,et al.  Intrusion detection systems as evidence , 1999, Comput. Networks.

[11]  V. Broucek,et al.  Bridging the Divide : Rising Awareness of Forensic Issues amongst Systems Administrators , 2002 .

[12]  Inès Leroy Facultés universitaires Notre-Dame de la Paix. Cent septante-cinquième anniversaire (1831-2006) , 2006 .