17
©2013 ONLINE INVESTIGATIONS As the use of the Internet and mobile technologies, including smartphones, has grown rapidly in recent years, so has the opportunity for computer-related crime. Unlawful activity can be committed or facilitated online with criminals trading and sharing information, masking their identity, gathering information on victims, and communicating with co-conspirators. Websites, email, chat rooms, and social networks can all provide vital evidence in an investigation of computer-related crime, and this session assists investigators in their efforts to curb such crime. DR. STEPHEN HILL, PH.D., CIIP, ICTP Managing Director Snowdrop Consulting Ltd Essex, United Kingdom Dr. Stephen Hill is the Managing Director of Snowdrop Consulting Ltd, a company with the aim of providing education and consultancy to the private and public sector in fraud risk management, prevention/awareness, online investigations, and data security, including ISO27001 and the Data Protection Act. Stephen spent 11 years working for a top 25 firm of accountants, heading the Fraud and Forensic Group and leading an expert body advising clients on prevention, detection, and recovery of fraudulent assets, working closely with the police, HMRC, and private sector. He is a Trustee Director of the Fraud Advisory Panel, a registered charity that works to raise awareness of fraud and financial crime and how to protect against it. Stephen chairs the Fraud Advisory Panels Cybercrime Working Group with colleagues from the public, private, and third sectors, and previously led its charity fraud research project that resulted in the report A Breach of Trust. He is also an Associate Member of the Association of Certified Fraud Examiners and an honorary member on the steering committee of the London Fraud Forum. Stephen specialises in e-crime and fraud awareness with over twelve yearsexperience in focusing on counter fraud, cyber fraud, not-for-profit fraud, and risk management. He is a certified practitioner (CIIP) for IS027001, and has worked on a number of guides to fraud detection data security and prevention for many small to medium enterprises (SMEs) and charities.

ONLINE INVESTIGATIONS - Association of Certified Fraud ... · ONLINE INVESTIGATIONS ... and social networks can all provide vital evidence in an investigation of computer-related

  • Upload
    hahanh

  • View
    216

  • Download
    2

Embed Size (px)

Citation preview

©2013

ONLINE INVESTIGATIONS

As the use of the Internet and mobile technologies, including smartphones, has grown rapidly in

recent years, so has the opportunity for computer-related crime. Unlawful activity can be

committed or facilitated online with criminals trading and sharing information, masking their

identity, gathering information on victims, and communicating with co-conspirators. Websites,

email, chat rooms, and social networks can all provide vital evidence in an investigation of

computer-related crime, and this session assists investigators in their efforts to curb such crime.

DR. STEPHEN HILL, PH.D., CIIP, ICTP

Managing Director

Snowdrop Consulting Ltd

Essex, United Kingdom

Dr. Stephen Hill is the Managing Director of Snowdrop Consulting Ltd, a company with the

aim of providing education and consultancy to the private and public sector in fraud risk

management, prevention/awareness, online investigations, and data security, including ISO27001

and the Data Protection Act.

Stephen spent 11 years working for a top 25 firm of accountants, heading the Fraud and

Forensic Group and leading an expert body advising clients on prevention, detection, and

recovery of fraudulent assets, working closely with the police, HMRC, and private sector.

He is a Trustee Director of the Fraud Advisory Panel, a registered charity that works to raise

awareness of fraud and financial crime and how to protect against it. Stephen chairs the Fraud

Advisory Panel’s Cybercrime Working Group with colleagues from the public, private, and third

sectors, and previously led its charity fraud research project that resulted in the report A Breach

of Trust.

He is also an Associate Member of the Association of Certified Fraud Examiners and an

honorary member on the steering committee of the London Fraud Forum.

Stephen specialises in e-crime and fraud awareness with over twelve years’ experience in

focusing on counter fraud, cyber fraud, not-for-profit fraud, and risk management. He is a

certified practitioner (CIIP) for IS027001, and has worked on a number of guides to fraud

detection data security and prevention for many small to medium enterprises (SMEs) and

charities.

©2013

He has developed and delivered a series of fraud prevention, data security, e-fraud, and

Internet Investigations and OSINT courses aimed at training UK police forces (including

Operation Podium in the buildup to the 2012 Olympics), private-sector fraud units, not-for-profit

organisations, and major world banks.

Stephen has written a book, Corporate Fraud: Prevention & Detection, published by

Bloomsbury Professional, with practical advice on all aspects of fraud and how to prevent it,

with the royalties going to the charity Victim Support.

He has also written for several well-known publications, including The Sunday Times,

“Accountancy Magazine,” “FS Focus,” “Third Sector,” “Charity Finance,” and “Solicitors

Journal,” and commented on Radio 5 and the BBC’s Real Story. Stephen has contributed to

many fraud and risk management publications, including CIMA’s Fraud Risk Management: A

Guide to Good Practice.

With a recent appointment as a Volunteer to the City of London Police Economic Crime

Directive, Stephen assists fraud investigators with online investigations.

“Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the

ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of

this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without

the prior consent of the author.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 1

NOTES The use of the Internet and mobile technologies, including

smartphones, has grown rapidly in recent years, as has the

opportunity for computer-related crime. Unlawful activity

can be committed or facilitated online with criminals

trading and sharing information, masking their identities,

gathering information on victims, and communicating with

co-conspirators.

However, the Internet also provides opportunities to fraud

investigators and their acquiring of vital digital intelligence.

The Internet by design is “public” with incredible amounts

of data available to anyone with a computer and a browser.

Today, fraud examiners have access to new and evolving

search engines, databases, open source tools, chat rooms,

blogs, online gaming communities, and social networks in

their efforts to curb crime.

The Internet and World Wide Web

The rise of the Internet offers new possibilities for fraud

examiners globally. The emergence of information

technology (e.g., portable devices, including tablets and

smartphones) has provided fraud examiners access to

information at a rate never before experienced in real time.

With over two billion Internet users worldwide, the level of

online activity is staggering and increasing exponentially,

especially in light of the social media revolution.

The Internet is a vast “interconnection of computer

networks” that spans the globe. It is comprised of millions

of computing devices that trade volumes of information.

Desktop computers, mainframes, tablets, smartphones,

video game consoles, and even the “smart” televisions are

connected to the Internet.

The Internet has had a relatively brief, but explosive,

history thus far. It grew out of an experiment begun in the

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 2

NOTES 1960s by the U.S. Department of Defense. The DOD

wanted to create a computer network that would continue

to function in the event of a disaster, such as a nuclear war.

If part of the network were damaged or destroyed, the rest

of the system still had to work. That network was

ARPANET, which linked U.S. scientific and academic

researchers, and is the forerunner of today’s Internet.

The Internet houses many layers of information, with each

layer dedicated to a different kind of documentation. These

different layers are called protocols. The most popular

protocols are the World Wide Web, FTP, Telnet,

Gopherspace, instant messaging, and email.

How Does the Web Work?

The World Wide Web, or WWW, is the name given in

1990 by Tim Berners-Lee of CERN to his proposal for

an Internet-based hypertext system. He wrote the first

WWW client and WWW server, and defined standards

such as URL, HTML, and HTTP while working at

CERN. This would link together behind a single, easy-

to-use interface the various information resources

spread around the Internet, and accessed using many

different systems and protocols.

In 1965, Ted Nelson devised the invention that brings

everything into a single Web using the now familiar

tool known as hypertext. In hypertext, any word can be

associated with a link that points to a specific piece of

information. To be able to display hypertext, Tim

Berners-Lee developed a description language called

Hypertext Markup Language, or HTML for short. The

basic idea behind HTML is to describe the structure of

a document, for example, by saying which part of the

text is a heading, emphasise words or a quotation, and

allow for the way these are finally displayed.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 3

NOTES The World Wide Web is the most popular portion of the

Internet. The Web is viewed through Web browser

software such as Internet Explorer, Firefox, and Safari,

which allows access to Web pages stored on servers

around the globe.

Understanding the Web Addresses (URL)

The World Wide Web has been described as a network

of electronic files stored on computers (servers) all

around the world. Hypertext links these resources

together. Uniform Resource Locators, or URLs, are the

addresses used to locate these files. The information

contained in a URL gives the ability to jump from one

location on the Web to another. Most Web browsers

allow you to type in a URL to access a particular

document or service. When you click on a hypertext

link in an HTML document, your Web browser is

actually sending a request to download a file stored on a

remote computer (server).

What Does a Typical URL Look Like?

Here are some examples:

http://www.acfe.com—The homepage for the

ACFE

https://www.paypal.com/uk/webapps/mpp/home—

A secure version of http using SSL

ftp://rtfm.mit.edu/pub—A directory of files

available for downloading

http://blogs.reuters.com/soccer—A blog or weblog

from the Reuters news agency

The first part of a URL (before the two slashes) tells

you the type of resource or method of access at that

address. For example:

http—hypertext document or directory

gopher—gopher document or menu

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 4

NOTES ftp—file available for downloading or a directory of

such files

news—newsgroup

telnet—computer system that you can log into over

the Internet

WAIS—database or document in a Wide Area

Information Search database

file—file located on a local drive (hard drive)

The second part of a URL is typically the address of the

computer where the data or service is located.

Additional parts may specify the names of files, the port

to connect to, or the text to search for in a database.

Most of the URLs start with http, which stands for

Hypertext Transfer Protocol. Http is the method by

which HTML files are transferred over the Web. Here

are some other important things to know about URLs:

A URL usually has no spaces.

A URL always uses forward slashes.

If you enter a URL incorrectly, your browser will

not be able to locate the site or resource you want.

You can find the URL behind any link by passing

your mouse cursor over the link. The pointer will

turn into a hand and the URL will appear in the

browser’s status bar, usually located at the bottom

of your screen.

Tools for Effective Searching

The first step to Internet research is to have a thorough

understanding of the search protocols offered by the

various Internet search engines.

Google, Yahoo, and Bing are only three of the several free

search engines available for investigative Internet research;

however, fraud examiners should not rely exclusively on

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 5

NOTES one search engine. For best results, experts recommend

using multiple search engines, as each search engine only

retrieves those pages to which it is indexed, and no Internet

search engine is indexed to all available information. Fraud

examiners may wish to choose a “metasearch” site, which

allows queries to be submitted to multiple search engines

simultaneously. Alternatively it is worth considering setting

up an automated search such as Google Alerts.

Search Engines (Index)

Databases used by search engines are made by “robots”

or “spiders” that automatically map the Web by

following the links between sites. These robots or

spiders read the Web pages and put the text (or parts of

the text) into a large database or index that you can then

access. None of them cover the whole Internet; Google,

the world’s largest index of the Internet, only

catalogues 8 percent of the World Wide Web. Other big

search engines include Bing, Ask, and DuckDuckGo.

Search Directories

Search directories are hierarchical databases with

references to websites.

The websites that are included are hand-picked by

humans and classified according to the rules of that

particular search service. Yahoo is the leader of search

directories. About and Alive are also very popular.

Pandia Plus Directory (Pandia PowerSearch) is based

on the Open Directory, a catalogue made by enthusiasts

from all over the world.

Directories are very useful when you only have a

general notion of what you are looking for. The first

page normally gives you the most general categories

(e.g., Government or Education).

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 6

NOTES Click your way down the hierarchy to the right

category, select the website you find most interesting,

and start researching!

Metasearch

Metasearch engines are search engine tools that pass

queries on to many other search engines or directories,

and then summarise all the results in one handy

interface.

A metasearch engine, such as Dogpile, collects and

sorts the hits, takes out duplicates, and presents the end

result in a simple format.

Popular metasearch websites include Scour, IXQuick,

and Browsys.

Deep Web

The Deep Web, or Invisible Web, is the set of

information resources on the World Wide Web not

reported by normal search engines.

Deep Web content includes information in private

databases that are accessible over the Internet but not

intended to be crawled by search engines. For example,

some universities, government agencies, and other

organisations maintain databases of information that

were not created for general public access. Other sites

may restrict database access to members or subscribers.

The term Deep Web was coined by BrightPlanet, an

Internet search technology company that specialises in

searching deep Web content. Although some of the

content is not open to the general public, BrightPlanet

estimates that 95 percent of the Deep Web can be

accessed through specialised search.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 7

NOTES Deep Web search engines include CompletePlanet,

Surfwax, and Pipl.

Specialist Search Tools

There are other tools available to fraud examiners, and

it depends upon what it is they are looking for as to

which site to use. Here is a selection of useful links to

add to your Internet investigation toolbox:

Silo Breaker: www.silobreaker.com

KGB People: www.kgbpeople.com

Spokeo: www.spokeo.com

Verify Email Address: verify-email.org

YouTube: www.youtube.com

Flickr: www.flickr.co.uk

Yippy: yippy.com

The Wayback Machine: www.archive.org

Social Media Search Tools

Social media has opened up numerous opportunities to

the fraud examiner and is a key component to profiling

the subject of an investigation. The pool of information

about each individual can form a distinctive social

signature.

Twitter, Facebook, and LinkedIn, to name but a few,

have embedded themselves in people’s lives. Posting to

walls, tweets, and video and image updates is emerging

as a new trove of intelligence for the fraud examiner.

Useful links for social media intelligence gathering

include:

www.socialmention.com

whostalkin.com

www.kurrently.com

fbsearch.us

tweetalarm.com

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 8

NOTES tweetcharts.com

www.weknowwhatyouredoing.com

www.tweetdeck.com/desktop

www.twitscoop.com

www.facesaerch.com

monitter.com

Note: There are limitations to the information you can

access on a social network due to privacy settings, and

anonymity and legal advice may be required before

using social media evidence against an individual.

Open Source Intelligence

Open source intelligence (OSINT) is a form of

intelligence collection management that involves

finding, selecting, and acquiring information from

publicly available sources and analysing it to produce

actionable intelligence.

In the intelligence community (IC), the term open refers

to overt, publicly available sources (as opposed to

covert or classified sources).

OSINT includes a wide variety of information and

sources:

Media

Government sources

Academic and professional sources

Web-based communities

Useful Links

osint.deepwebtech.com/categories.html

www.intelligencesearch.com

www.onstrat.com/osint

www.osint.org.uk

opendatasearch.org

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 9

NOTES publicdata.eu

www.eurosint.eu/

rr.reuser.biz/

How to Trace an Email Address

Learn How to Trace an Email Address

Trace an email address in the most popular programs

such as Microsoft Outlook, Hotmail, Yahoo, Gmail,

and AOL by finding the header.

What is an Email Header?

Each email you receive comes with headers. The

headers contain information about the routing of the

message and the originating Internet Protocol address

of the message. Not all electronic messages you receive

will allow you to track them back to the originating

point and, depending on how you send messages,

determines whether they can trace an email address

back to you. The headers do not contain any personal

information.

At most, the results of the trace will show you the

origination IP and the computer name that sent the

email. After viewing the trace information, the

initiating IP can be looked up to determine from where

the message was sent. IP address location information

DOES NOT contain your street name, house number, or

phone number. The trace will most likely determine the

city and the ISP the sender used.

How Do I Get the Header to Start the Trace Email

Process?

Each electronic messaging program will vary as to how

you get to the message options. I will cover the basics

to start the trace … the rest is up to you.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 10

NOTES Outlook—Right-click the message while it is in the

inbox and choose Message Options. A window will

open with the headers in the bottom of the window.

Windows Live—Right-click the correspondence

while it is in the inbox, choose Properties, then click

the Details tab.

GMail—Open the correspondence. In the upper

right corner of the email, you will see the word

Reply with a little down arrow to the right. Click the

down arrow and choose Show Original.

Hotmail—Right-click the message and select View

Message Source.

Yahoo!—Click the Actions dropdown menu and

select View Full Header.

AOL—Click Action, then View Message Source.

You can see that no matter the program, the headers are

usually just a right-click away.

I Have the Header, Now How Do I Start the Trace?

The next step to trace an email address is to find the

originating IP listed in the header. An easy way to read

the header of an email is to use the email header tool on

www.whatismyipaddress.com.

Simply copy the header information from the email and

paste it into the relevant box on the “what is my IP

address?” email header Web page.

Tracing an Internet Address to a Source

Just as every house has an address, every computer

connected to the Internet has an address. This is referred to

as an Internet Protocol (IP) address.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 11

NOTES Identifying the Owner of a Website

There are a number of domain lookup tools available,

and in this example we are going to use

whois.domaintools.com.

Once on the website, enter in the domain name and

click on “Lookup.”

Once the Lookup search has been entered, you will be

able to identify who is registered as the owner of the

website.

The registration details lists a number of important

things—the registrant (can be an individual or a

company), the registrant’s address, who they registered

the website with (Registrar), and dates indicating

registration, renewal, and last updated.

Identifying the Hosting Provider of a Website

It is important to also identify the hosting provider (i.e.,

who runs the Web server where the website you are

investigating resides).

At the top of the page you are currently on, you will see

a series of tabs, including “Server Stats.”

Click on the Server Stats tab and you will see an IP

Address of the Hosting Provider. Click on the IP

Address to be able to identify the details of the Hosting

Provider, including key contacts.

Identifying Which Bodies Could Also Be Contacted

IANA (WWW.IANA.ORG)

The Internet Assigned Numbers Authority (IANA)

is a department of ICANN responsible for

coordinating some of the key elements that keep the

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 12

NOTES Internet running smoothly. Whilst the Internet is

renowned for being a worldwide network free from

central coordination, there is a technical need for

some key parts of the Internet to be globally

coordinated—and this coordination role is

undertaken by IANA.

Specifically, IANA allocates and maintains unique

codes and numbering systems that are used in the

technical standards (protocols) that drive the

Internet.

ICANN (WWW.ICANN.ORG)

To reach another person on the Internet, you have to

type an address into your computer—a name or a

number. That address has to be unique so computers

know where to find each other. ICANN coordinates

these unique identifiers across the world. Without

that coordination, we would not have one global

Internet.

ICANN was formed in 1998. It is a not-for-profit

partnership of people from all over the world

dedicated to keeping the Internet secure, stable, and

interoperable. It promotes competition and develops

policy on the Internet’s unique identifiers.

ICANN does not control content on the Internet. It

cannot stop spam and it does not deal with access to

the Internet. But, through its coordination role of the

Internet’s naming system, it does have an important

impact on the expansion and evolution of the

Internet.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 13

NOTES Regional Bodies

The Internet is split into 5 regions—Africa, North

America, Asia-Pacific, Latin America/Caribbean, and

Europe/Middle East/Central Asia. Each region has a

regional internet registry (RIR) that has responsibilities

in regards to the Internet.

These RIRs and their contact email addresses are:

AfriNIC: [email protected]

ARIN: [email protected]

APNIC: [email protected]

LACNIC: [email protected]

RIPE NCC: [email protected]

Typically, these bodies are reluctant to get involved;

however, they can be a useful last course of action.

What to Look Out for in Terms of More Suspicious

Setups

Key indicators to look out for are:

Websites registered in one country but hosted in

another. This becomes more suspicious when the

registrant is in the UK but is hosted in Russia,

Eastern Europe, or Africa. Also, look out for typical

havens, such as Switzerland and Andorra.

Websites operating in the UK, aimed at a UK

market, but where the registered owner is based

outside of the UK.

Websites registered by a third-party company, and

therefore masking the real owner. Again, typically,

these third parties will be located in havens.

Websites with details that are obviously incorrect or

misleading.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 14

NOTES Following the Money—Who Registered/Paid for the

Domain Registration?

Domain names are typically registered for a two-year

period and can only be renewed within a couple of

months of the expiry date. Some other domains can be

registered for longer periods, and are typically offered

at a discounted rate registered for five or ten years at a

time. Understanding how a domain registration has

been paid for could help the investigation.

Remember, hosting services and domain registration

requires a fee, so follow the money. In the domain

name entry, when you view the details of a domain

name entry in the list of your domain names, the User

ID of the billing contact will be shown. Click on the

domain name to see the details.

In some cases, the website you are investigating will

need to be maintained and updated, so the server log

maintained by the registrar will indicate how the “Web

Manager” accesses the site, providing you with more

vital digital evidence.

Protecting Your Privacy

Every time you surf the Internet, your IP address is publicly

visible to everyone on target network resources.

There are numerous Internet proxy servers offering

anonymous Web browsing capability (e.g.,

www.hidemyass.com and www.torprojectorg).

Accessing websites via these proxies hides your public IP

address from Web servers, helping to protect your identity

online. Remember, when using a proxy server, you give

them your ID.

ONLINE INVESTIGATIONS

2013 ACFE European Fraud Conference ©2013 15

NOTES Other Things to Consider When Protecting Yourself

Online

Browse the Internet safely by using a secure Web

browser such as Firefox, and always run the updates

when released.

Turn on your browser’s private mode, usually found

under Preferences, Tools, or Settings.

Use the privacy settings on social networks such as

Facebook, and use a strong password.

Clear out temporary Internet files, cache, and

history files (also monitor third-party cookies).

Use a search engine such as DuckDuckGo, which

distinguishes itself with a “We do not track”

feature.

Secure wireless networks, as unprotected Wi-Fi

(wireless) networks are vulnerable.

Do not broadcast your SSID (Service Set

IDentifier).

Enable WPA2 (Wi-Fi Protected Access).

Restrict access by MAC address (filtering) when

using a Wi-Fi network.

Do not auto-connect to open Wi-Fi networks.

Be careful which Wi-Fi hotspots you connect to.

Install firewalls onto your IT systems to prevent

outside parties from gaining access to information.

Keep anti-virus and anti-spyware software up-to-

date, and download the latest security updates.

Use strong passwords for online login, and always

ensure you are on a secure site (i.e., https) before

leaving any sensitive information.

Use encryption to protect information contained in

emails or stored on laptops or other portable devices

such as memory sticks.