Friday, December 6, 2013

Cybersecurity: Who Is Winning?


Choman Saleem


         
The Advancement of Computing Technologies and Cybercrime

    Every day, unprecedented steps in computing technology continue to positively transform our world  and help push the boundaries of information sharing. During the 20
th century, inventions such as electricity, telephone,  automobile, and airplane have improved millions of lives meanwhile changing the landscape of our economy and society. When Motorola‘s communication systems manager, Martin Cooper, introduced the Dyna-Tac, the world’s first commercially available cellphone, Motorola helped millions of people connect together and drastically changed the landscape of communication. With the immergence of affordable cellphones to a wider populace, cellphones also improved the fortunes of criminals by giving them the opportunity to communicate on the go, which allowed them to carry out crimes more quickly and effectively. Advances in technology have positively impacted society throughout history. However, criminals have found ways to exploit this technology and will continue to do so with each new technological development. Because of the misuse of computing technology, the government and the industry both take measures to combat cybercrime.
    The technology of the contemporary Internet has come a long way from its initial infancy. The rudimentary prototype of the Internet we use today was the Advanced Research Project Agency Network (ARPANET), used by universities, research laboratories, and the U.S. Department of Defense. As more non-military computers connected to the network, the military decided it was no longer safe (Weber). At the time, the idea of millions of personal computers being connected to a global network seemed completely outlandish. Fortunately, the military proactively predicted the fulminating future trend of cybercrime and created a separate network, the MILnet. The monumental component of the Internet that took the globe by storm was researcher Tim Berners-Lee’s World Wide Web during the late 1980’s at the European Center for Nuclear Research (CERN). The World Wide Web simplified using the Internet and opened the door for the non-technical  population to begin taking part. The Internet has brought millions of people closer together and has changed the way we live and work.
    Since then, the rapid advances in computer technology have ushered in a new wave of crime. The problem does not stem from the unprecedented abilities of computers, but from the ancient abuse of capabilities by unscrupulous people looking for an advantage over others. The threat from cybercrime is not just a concern for governments, but everyone in society,  including citizens and businesses. Looking back at the history of cybercrime, one of the most notorious cases occurred at New York’s Union Dime Savings Bank. The chief teller, Jerome Kerviel, had extensive knowledge of the system and issued numerous “error corrections” to hundreds of accounts. When the time came for interest calculations, he would adjust the values and pocket the money from the “corrected” accounts into a separate account set up for himself. From 1970 to 1973, Kerviel’s simple scheme netted him US $1.5 million.  Since then, there are measures set in place to prevent similar crimes from happening.The digital underground is extremely sophisticated and self-sufficient, criminal activities can be broken down into spam, piracy, hacking (spreading malicious code, stealing information), cyber-terrorism, child pornography, intrusion for money, denial of service attacks, and more. Researchers at the Center for Strategic and International Studies have estimated that the economy of the United States alone may lose an estimated total of $100 billion annually due to cybercrime. While cybercriminals are gaining massive amounts of money and attention, the government and private organizations are taking steps to relentlessly fight back and keep attackers at bay.
    As more businesses and people connect to the Internet, the security concern will continue to be paramount issue. Because of publicized stories of cybercrime, the Internet is often times given the same reputation as the “Wild West”. The judicial system, law enforcement community, and private organizations have done their best to enforce criminal laws and cyber-security. As the trend of cybercrime increased and showed no signs of slowing down, multiple organizations formed to fight cybercrime and help keep the integrity of the Internet. The Federal Bureau of Investigation is the biggest player in stopping and solving cybercrime. The Federal Bureau of Investigation saw the growing number of cybercrime cases and created the Computer Analysis Response Team (CART). CART is responsible for providing digital forensic services to not just the national government, but also local, state, and other federal agencies.  In addition to CART, the Internet Crime Complaint Center (IC3) provides a means for reporting crimes.  The IC3 operates with the FBI, the Bureau of Justice Assistance (BJA), and the National White Collar Crime Center (NW3C). Once a victim submits a report, the IC3 forwards the cybercrime report to the appropriate local, state, national, or international agency. More so, the Department of Homeland Security also has 93 Electronic Crimes Task Forces (ECTFs), which deal with cases pertaining to cyber intrusions, bank fraud, data breaches, and other computer crimes. To keep pace with cybercriminals, the government also has the National Computer Forensics Institute, which gives law enforcement information and training to combat cybercrime.
    Powerful smartphones and tablets have flooded the market and serve as personal data repositories for communicating, social networking, entertainment, and more. Often times, criminals also use this technology to help facilitate illegal acts, such as drug dealers with a list of customers or a child predator exchanging sexual multimedia of children with others  in a child pornography community.  As more local and state cases involved digital media, the Department of Justice issued the Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations document.  The government continues to update the manual to help investigators solve cases as new methods of cybercrimes develop.
    Defending against cybercrime is not only the sole responsibility of the government; there are numerous organizations which battle cybercrime and will continue to do so in the future. InfraGard is an information sharing organization with 86 chapters made up of local communities such as businesses and universities. In exchange for giving information to the government, they receive vital intelligence that will help them protect their own networks.
According to a report by the Homeland Security’s Computer Emergency Readiness Team, the number of security breaches of American and private-computer networks doubled from an estimated 37,000 in 2007 to 72,000 in 2008.  Multiple private companies have stepped up to defend cyberspace and provide resources, such as Lockheed Martin, Boeing, Raytheon and ManTech International Corporation.
    When looking at the raw facts and numbers pertaining to cyber security and the advancement of computing technologies, it’s alarming to see that the amount of cybercrime committed is much higher than the defenses in place to stop it. The battle between the rest of the world and cybercriminals is a continuous struggle, but there is still more we can do. In order to fortify cyberspace and slow down those who exploit the advancements in computing technology, more work is needed between the government and the private sector. When creating software and products, businesses need to design products with increased security in mind. While a great deal of advancements have been made in that regard, there is still a long way to go. As computing technologies continue to advance in the years to come, new security challenges will inevitably emerge. Stronger threats will blur the distinction between cyber and physical attacks. To conclude, the balance of cybercrime will surely be shaken up with quantum computing imminent.


           
       

Kill The Password: Article Response


Choman Saleem

                                                Kill The Password Article Response


            Moore’s Law states that for every 16 months, the computation power of central processing units will double. While Moore’s Law ultimately enriches the landscape of computer systems by advancing our technology, there is also a dramatic downside to it. Mat Honan does a fine job specifying how the use of passwords in the computer industry has significantly been sugarcoated. Using a brute force algorithm to crack a password 3 decades ago would have taken an extremely long and unviable time. With contemporary processing power, a hacker can crack simple passwords in a matter of processing cycles.
            There are a number of things that most people do in regards to passwords that I definitely don’t agree with, and Honan goes into detail about similar actions. Password reuse is the act of using the same password for multiple accounts. The consequence to this is that if one account gets compromised, the attack of other accounts with the same password is surely inevitable. There is solid data to show that password reuse is quite dangerous.
            There are many threats against the traditional way passwords are used., but that doesn’t spell the end of passwords. There are password cracking programs like John the Ripper to crack passwords. Despite the numerous ways to get into unauthorized accounts, I don’t think the password will be going away any time soon. While Mat Honan does a fine job giving numerous reasons why passwords fail, he doesn’t suggest a strong alternative. The general consensus about passwords is that they’re now vulnerable to getting cracked. However, I believe with strong multifactor authentication such as Google’s, passwords can still remain strong and provide defense for our accounts. I have personally never gotten hacked or gotten damaging malware. I may be one of the lucky ones, but at the same time, I have educated myself about passwords and security; I have taken the steps to protect my systems and accounts.  While Mat Honan makes valid arguments, I believe the traditional password is still the best practical line of defense we have for our accounts. Until a more practical solution surfaces, passwords will still remain as the dominant method for protecting our accounts.

Article Link:
http://www.wired.com/gadgetlab/2012/11/ff-mat-honan-password-hacker/all/

Guidance Software EnCase Forensics

Choman Saleem
                  Guidance Software EnCase Forensics v 7.0

            Every day, unprecedented steps in computing technology continue to transform our world  and help push the boundaries of information sharing. During the 20th century, computing technology has improved millions of lives meanwhile changing the landscape of our economy and society. However, criminals often misuse digital devices and use them to aid their nefarious activities. The field of digital forensics grew exponentially with the personal computing revolution of the late 1980’s. Since then, numerous laws, government agencies, and private organizations have stepped up to provide resources and improve the landscape of digital forensics. Additionally, a variety of digital forensics software has been released to aid the preservation, identification, extraction, interpretation, and documentation of digital evidence.  One of the leading streamlined products in the ever-growing field of digital forensics is Guidance Software’s EnCase Forensics V7.0.
            Computer forensics currently does not have a lot of standardization across the industry because it’s still at it’s infancy, compared to other forms of forensics. However, EnCase Forensics has been highly regarded as a top software suite time and time again and has become the unofficial standard in digital investigation technology. The software allows users to create images and examine data from an array of sources such as hard disks, removable media such as CD’s and USB’s, RAIDS, RAM, and even Personal Digital Assistants (PDA’s).  (Digital Intelligence) Smartphones and tablets have flooded the market and serve as personal data repositories. EnCase Forensics also allows investigators to acquire data from Androids, iPhones, and most popular smartphones and tablets. The flexibility of EnCase Forensics is one of its reasons for global success. EnCase can be used to complete the most mundane tasks or perform extremely sophisticated operations. Among it’s features are it’s multiple acquisition modes, powerful searches, automatic reports, unmatched support, bookmark features, Internet and Email investigations, and multiple views. Additionally, EnCase Forensics comes with automation tools and lets investigators write custom scripts with EnScript. (http://www.digitalintelligence.com/software/guidancesoftware/encase7/)
            Every digital forensics software comes with search capabilities. Encase Forensic can uncover critical evidence on physical and logical media which would be irretrievable with other tools. The search options include proximity search ,Unicode index search, binary search, , case sensitive, right to left reading, Big Endian/Little Endian, UTF-8/UTF-7, and the ability to search file slack and unallocated space. Users can also install active code pages which can be used for finding keywords in numerous languages. EnCase Forensic can search all allocated files, other  forensic utilities often times can not logically search across data clusters.
            When beginning an investigation and going along the acquisition process, EnCase gives investigators an array of options. Investigators can create a bitstream image that gets verified by Cyclical Redundancy Checksum (CRC) blocks followed by multiple hashing validation checks. Additionally, If a user needs to interrupt a target acquisition on a large drive, EnCase has the ability to pause the process and continue at a later time without any problems. After the acquisition, users get a wealth of additional information, such as file name, file extension, last accessed , file creation date, last written, entry modified, logical size, physical size, Message Digest 5 (MD5) hash value, permissions, starting extend and original path of the file.  
            Successful software is often available on multiple platforms, EnCase Forensics does not fall short of that feature. EnCase Forensics supports Windows 95/98/NT/2000/XP/2003 Server, Linux Kernel 2.4 +, Solaris 8/9, AIX, and Apple OSX. EnCase also supports multiple file systems, such as FAT12/16/32, NTFS, EXT2/3 (Linux), UFS, AIX Journaling File System, LVM8, FFS, NetBSD/FreeBSD, Palm, HFS, HFS+, CDFS, DVD, CDFS, ISO 9660, UDF, and TiVo 1 and 2. EnCase Forensics supports corporate environments by uniquely supporting the imaging and analysis of RAID arrays, Windows Servers, and virtual environments like VMware and Microsoft Virtual PC.
            Being able to analyze and search a vast collection of data is paramount for forensics and analysis tools. Once evidence is collected and archived, EnCase Forensics offers powerful, analytical functions. Automated Analysis uses SweepCase which gives investigators the ability to perform different types of analysis without having to use different tools. Investigators can sort files by 30 different fields, including file names, file signatures, hash value, permissions, time stamps,  extensions, and file paths.  There are more than 150 filters provided with EnCase,such as deleted files to password protected and encrypted files (“Guidance Software – Transforming Your Investigations” ).Other analytical functions include a variety of queries, international language support, encrypted volumes and hard drive encryption, link file examination, active directory information extractor, hardware analysis, recover folders, log and even files, symbolic links, compound documents, and even has a build-in registry viewer. Reporting and documenting is an integral part of a digital investigator’s job. EnCase Forensic has a number of automatic reports that can be created with ease. The reports also contain bookmarks, timeline of files, intellitype,  and time zone settings.
            EnCase Forensics has been a key player in the world of digital forensic products and it is here to stay (“SC Magazine”).  Amongst the users are law enforcement, government agencies, private businesses, and corporations. EnCase Forensics is a crucial tool in handling evidence in a format that courts can trust.  There are more than 50,000 digital investigation professionals who have been trained by experts at Guidance Software Training centers. Amongst those are law-enforcement agents and legal associates. December of 2012, the United States Department of Treasury publically recognized EnCase as the only suite that could meet all of it’s needs when it comes to internal investigations and forensically sound, court-validated discovery (“David”). While EnCase Forensics holds a dominant corner of the digital evidence investigation market, Guidance Software does have competitors. Amongst the competitors are AccessData Group, E-Fense, F-Response, and MANDIANT. While these other competitors offer great products, none of them come with the polish, support, and flexibility of EnCase Forensics. One of the weaknesses of EnCase Forensics is the hefty price tag that it comes with. The latest version, version v7.0 is $2,995.00 USD. While EnCase has a proprietary file format that is very widely accepted, it is able to work with other common file types. Their scripting language, EnScript, is also a proprietary language. Finally, EnCase Forensics does not target amateurs and students who want to tinker with forensics tools, but well established,  serious digital investigators and law enforcement agents who are already in the field.

                                             References

Digital Intelligence, . N.p.. Web. 15 Nov 2013. <http://www.digitalintelligence.com/software/guidancesoftware/encase7/>.

"SC Magazine." Guidance Software EnCase Forensic v7. SC Magazine, 01 05 2013. Web. 15 Nov 2013. <http://www.scmagazine.com/guidance-software-encase-forensic-v7/review/3872/>.


Bennit, David. " The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations." Forensic Focus. 20 08 2011. Web. 09 Nov 2013. http://articles.forensicfocus.com/2011/08/22/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations/.


           "Guidance Software Forensics- Transform Your Investigations." Guidance Software. Guidance Software. Web. 15 Nov 2013. <http://www.cits.co.za/uploads/3/0/5/1/3051645/encase_forensic_features.pdf.>.

Tuesday, November 27, 2012

FBI Deals With Malware and Viruses


Choman Saleem



              FBI Deals With Malware and Viruses

     The Internet is used by millions of people. Some of those people are hackers who want to disturb and cripple other user’s computers using malware and viruses. In the middle of July, 2012, the FBI warned people that they could be on of the hundred thousands who will be losing their Internet connection. The root problem is a malware known as DNSChanger, which was initially discovered in 2007 and has infected millions of users throughout the world.
     The DNSChanger is targeted towards Windows and Mac systems. The malware infects people and changes the computer’s settings and automatically directs the user to a server set by the hackers. The users get directed to ads and other sites unintentionally, increasing the flow of traffic and making millions of dollars. The malware was engineered by six hackers and the FBI was able to track and criminalize them. The FBI created a website which detected and helped you remove the malware.  



Source:
http://techland.time.com/2012/04/23/dnschanger-fbi-warns-infected-computers-will-lose-web-email-

The Wild West: The Internet and Piracy


Choman Saleem


         The Wild West: The Internet and Piracy

     The Old west is always depicted as wild and dangerous, a frontier where only the ruthless flourished. The Wild West we see in moves is often shown as a place people could find opportunity, utilize natural resources, and develop yourself. Often times the Internet is compared directly to the Wild West. Even though the Internet is used by a wide population of people across the world, there’s still a lot of room for growth and development. As the Internet becomes more developed and explored, it will eventually need to be more mature and regulated, just like the current West today. Recently many governments have tried to do just that.
     The  US government has tried to step in and censor the Internet with a number of bills. Stop Online Piracy Act (SOPA) was introduced to give the United States law enforcement means to fight online piracy and basically give U.S. a strong grip over the Internet. The bill would criminalize Internet users for streaming copyrighted content and implement a maximum penalty of five years in prison. SOPA was backed by a legislation stating the need to “protect intellectual-property”.
Although plenty of copyrighted content such as music, videos, and games get downloaded illegally, passing such a bill would interfere with a large number of Internet users and businesses worldwide. Such  bills would end a variety of online communities, such as YouTube and online blogs. Old business models cannot be compared to new models based on the Internet economy. The lawmakers are stepping into a game which they have little to know idea of how to play.


Source:
http://www.smartplanet.com/blog/science-scope/internet-censorship-bill-may-kill-american-innovation-jobs/11413

Cloud Storage



Choman Saleem


              Cloud Storage For Everyone

     Wouldn’t the ability to access your computer files from almost anywhere be practical? There has to be a better file management system out there other than emailing files to yourself, or carrying around a flash drive. Dropbox was created in 2008 to address that desire. Dropbox is a fairly simple online virtual storage program that gives you the ability to access your files anywhere. Dropbox lets you create a folder on your computer that is synced directly to the Dropbox server and updated continuously. The user is able to treat the folder like any other folder. Anything you save to the folder is accessible on the web using your private Dropbox account.
     The uses of Dropbox are limitless. Dropbox lets you securely share files and even lets you share individual folders with others using a shared folder. A team of people working together can continuously update a project and upload different files needed. Dropbox is perfect for any group who needs collaboration with others, such as graphic designers, musicians, programmers, and students. Dropbox offers 2 gigabytes of storage for free. If 2GB is not large enough for you, a user can purchase a bigger account for a reasonable price. The final advantage of the utility is it’s support for a wide variety of platforms. Dropbox is compatible with Windows, Mac, Linux, and even some smart phones. 

 
Source:
http://www.pcmag.com/article2/0,2817,2343852,00.asp

The Beauty of Virtualization



Choman Saleem


                   The Beauty of Virtualization

One of the newest computer technologies is virtualization. Virtualization is a technology with an  endless number of uses. Virtualization allows a single machine to act as if it were many machines.  You are able to create a virtual version of an operating system, server, website, or even a specific computer environment for training purposes. Organizations are able to reduce power consumption, air conditioning needs, costs, and actual physical space. The rapid changing business demands can be simplified using virtualization. Applying applications and updates increases the response time for rapidly changing business demands. Many new operating systems and hardware have built in support.
Virtualization’s flexibility is a trait which makes it very appealing to a wide demographic. The technology allows multiple operating systems on one system. For example, if a user on a Macbook needs to run a program only compatible with Windows, they are able to install a virtual Windows environment and access the program that way. A business can train their employees on a exact production environment without the fear of irreversibly damaging something. Virtualization is a technology that can be implemented in an array of ways, it’s here to stay. 

--> Source:
http://software.intel.com/en-us/articles/the-advantages-of-using-virtualization-technology-in-the-enterprise