Personal Privacy, Ethics, Crime, and Legal Issues Icove, D Computer Crime O'Reilly, 1996 Rothfeder, J Privacy For Sale: How Computerization has made everyone's private life an open secret Rothfeder, 1992 Hoffman, L Building in Big Brother: The Cryptographic Policy Debate Springer-Verlag, 1995 Bloombecker, J.Introduction to Computer Crime National Center for Computer Crime Data, 1988 Cavazos, E and Morin, G Cyberspace and the Law: Your Rights and Duties in the OnLine World MIT Press, 1994 Cunningham, W et al Private Security Trends 1970-2000 The Hallcrest Report II Hallcrest, 1990 Johnson, D Computer Ethics Prentice-Hall, 1994 (2nd edition) Forester, T and Morrison, P.Computer Ethics MIT Press, 1994 (2nd edition) Computer Forensics The Honeynet Project's Forensic Challenge Basic Steps in Forensic Analysis of Unix Systems, David Dittrich (Pasos BАsicos en AnАlisis Forense de Sistemas GNU/Linux, Unix, modified, updated and translated to Spanish by Ervin S Odishoo) Course notes for Black Hat '00 Unix forensics class, Dominique Brezinski and David Dittrich The Coroner's Toolkit Dan Farmer & Wietse Venema's class on computer forensic analysis [ forensics.tar.gz contains the slides in 6-up portrait PostScript format for printing on just 25 double-sided pages] Forensic Computer Analysis: An Introduction Reconstructing past events, By Dan Farmer and Wietse Venema, Dr Dobb's Journal, September 2000 What Are MACtimes?: Powerful tools for digital databases, By Dan Farmer, Dr Dobb's Journal, October 2000 Strangers In the Night: Finding the purpose of an unknown program, by Wietse Venema, Dr Dobb's Journal, November 2000 Computer Forensics Column, Errata The Law Enforcement and Forensic Examiners Introduction to Linux, a Beginner's Guide, Barry J Grundy, NASA Office of the Inspector General Brian Carrier's Sleuthkit (formerly TASK, formerly TCT-Utils) Sleuthkit Autopsy Browser Sleuthkit Informer Notes on updating Red Hat Linux 7.1 to support >2GB images with TCT, TCTUTILS & Autopsy (see also Large File Support in Linux) Forensic Analysis of a Compaq RAID-1 Array and Using dd with EnCase v3, by Keith J Jones Forensic Analysis Using FreeBSD - Part by Keith J Jones Organizations/conferences International Organisation on Computer Evidence European Network of Forensic Science Institutes Forensic information technology Working group International Association of Computer Investigative Specialists (IACIS) Law and Legal Process Judicial Gatekeeping in Texas, by Thomas F Allen, Jr and Robert Rogers, Harvard Law School '99 (Daubert) Admissibility of Scientific Evidence Under Daubert Frye v United States 293 F 1013 (D.C Cir 1923) Rules of Evidence, Harvard School of Law Digital Timestamping Stamper digital timestamping service Internet X.509 Public Key Infrastructure Time Stamp Protocol (TSP) What is digital timestamping?, RSA Cryptography FAQ section 7.11 Secure Time/Date Stamping in a Public Key Infrastructure, Surety.com White Paper (PDF) Time Stamp Protocol, by Byun, Jung-Soo Time is of the Essense: Electronic documents will only stand up in court if the who, what, and when they represent are unassailable, by Charles R Merrill, CIO.com, March 15, 2000 How to Time-Stamp a Digital Document (PostScript), by Stuart Haber and W Scott Stornetta, Journal of Cryptology, Vol 3, No 2, pp 99-111 (1991) Improving the Efficiency and Reliability of Digital Time-Stamping (PostScript), by Dave Bayer, Stuart Haber, and W Scott Stornetta, in Sequences II: Methods in Communication, Security, and Computer Science, eds R Capocelli, A DeSantis, and U Vaccaro, pp 329334, (Springer-Verlag, 1993) Secure Names for Bit-Strings (PostScript), by Stuart Haber and W Scott Stornetta, in Proceedings of the 4th ACM Conference on Computer and Communication Security, (ACM, 1997) Guidelines and standards Electronic Crime Scene Investigation: A Guide for First Responders, National Institute of Justice, NCJ 187736, 2001 Forensic Examination of Digital Evidence: A Guide for Law Enforcement, National Institute of Justice, NCJ 199408, 2004 U.S Department of Energy Computer Forensic Laboratory's First Responder's Manual (PDF) Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries (CSIRT Project Survey) Federal Guidelines for Searching and Seizing Computers, U.S Deptarment of Justice Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section, Criminal Division, United States Department of Justice, January 2001 (PDF Version) Field Guidance on New Authorities (Redacted), enacted in the 2001 Anti-terrorism Legislation ("USA Patriot Act"), issued by the Department of Justice How the FBI Investigates Computer Crime, CERT Coordination Center Evidence Examinations Computer Examinations, Handbook of Forensic Services, U.S Department of Justice, FBI Digital Evidence: Standards and Principles, Forensic Science Communications, US DoJ, April 2000, Volume 2, Number Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, US DoJ, October 2000, Volume 2, Number RFC 3227: Guidelines for Evidence Collection and Archiving, by Dominique Brezinski and Tom Killalea An Introduction to the Field Guide for Investigating Computer Crime, by Timothy E Wright (Security Focus Incident Handling focus) The Field Guide for Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics, by Timothy E Wright (Security Focus Incident Handling focus) The Field Guide for Investigating Computer Crime: Search and Seizure Basics, by Timothy Wright (Security Focus Incident Handling focus) Recovering from an Intrusion, by /dev/null Interviews Info.sec.radio segment on forensics (@15:45.0), July 10, 2000 SecurityFocus interview with Jennifer Grannick SecurityFocus interview with Chad Davis Books List of books on forensics compiled by Jeimy J Cano, Universidad de los Andes Articles/Journals International Responses to Cyber Crime International Journal of Digital Evidence Sleuthkit Informer Open Source Digital Forensic Tools: The Legal Argument, by Brian Carrier, @stake Computer forensics specialists in demand as hacking grows, by Suzanne Monson, Special to The Seattle Times, September 8, 2002 Electronic Data Discovery Primer, by Albert Barsocchini, Law Technology News, August 28, 2002 Solving the Perfect Computer Crime, by Jay Lyman, www.NewsFactor.com, February 27, 2002 NT Incident Response Investigations and Analysis, by Harlan Carvey, Information Security Bulletin, June 2001 "A harder day in court for fingerprint, writing experts: US judge limits testimony of forensic analysts, in a ruling that might alter how evidence is presented at trial," by Seth Stern, Christian Science Monitor, January 16, 2002 Cybersleuthing solves the case (and related stories) by Deborah Radcliff, Computerworld, January 14, 2002 Digital sleuthing uncovers hacking costs, by Robert Lemos, Special to CNET News.com, March 22, 2001 "Intrusion Detection Systems as Evidence", by Peter Sommer, Computer Security Research Centre, London School of Economics & Political Science Advancing Crime Scene Computer Forensic Techniques, by Chet Hosmer, John Feldman, and Joe Giordano Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, FBI, October 2000 Analysis: The forensics of Internet security, by Carole Fennely, SunWorld (via CNN), July 26, 2000 September 2000 Market Survey Computer Forensics, by James Holley, SC Magazine (ranks Linux dd a Best Buy! ;) Cybercops Need Better Tools Law enforcement agencies are falling behind hackers, says exec of CIA tech incubator, by Matthew Schwartz, Computerworld, July 31, 2000 Crime Seen (Cover story on digital forensics), by Bill Betts, Information Security Magazine, March, 2000 Disk Shows Love Bug-Like Virus, by Dirk Beveridge, AP, May 16 2000 Computer Forensics: Investigators Focus on Foiling Cybercriminals, by Illena Armstrong, SC Magazine (cover story), April 2000 CD Universe evidence compromised Failure to protect computer data renders it suspect in court, by Mike Brunker and Bob Sullivan, MSNBC, June 7, 2000 Crime & Clues The Art and Science of Criminal Investigation FBI Forensic Science Communications Reverse engineering Reverse Engineering Malware, by Lenny Zeltser, May 2001 The Honeynet Project's Reverse [engineering] Challenge Fenris, by Michal Zalewski, BINDVIEW Other open source reverse engineering tools listed by Michal Zalewski Using fenris on the Honeynet Project Reverse Challenge binary Using fenris on burneye protected binaries Linux tools for Reverse Engineering at Packet Storm LinuxAssembly.org resources Linux Assembly HOWTO, by Konstantin Boldyshev and FranГois-RenИ Rideau Programmer's Tools Decompiler/Dissassembler page Linux Kernel Internals (especially the "How System Calls Are Implemented on i386 Architecture chapter) The Decompilation Page at the University of Queensland IDA Pro Disassembler (commercial product, multi-platform/OS) [older freeware version] GDB tutorial Gnu GDB docs Cornell Theory Center Totorial on GDB Norm Matloff's Debugging Tutorial UNIX Kernel Stack Overflows, SunSolve Online Infodoc The Solaris Memory System: Sizing, Tools and Architecture (PDF) SE Toolkit (Sun memory management tuning utility) Anti-Forensics (Note: Use these on an isolated analysis system) SecuriTeam.com TESO Burneye Unwrapper Advanced in ELF Runtime Binary Encryption - Shiva, by Neil Mehta, Blackhat USA 2003 (PDF) Unpackers/decrypters/unprotectors (Generic/universal unpackers/deprotectors/dumpers) Packer and Unpackers EXEStealth executable protection Generic ExeStealth Unpacker v1.0 Encryption/Stegonography www.Decryption.info Steganalysis - Attacks against Steganography and Watermarking - Countermeasures - , by Neil F Johnson Defeating Statistical Steganalysis, CITI, University of Michigan Forensic analysis tools and related software Fingerprint databases The Solaris Fingerprint Database known goods The NIST National Software Reference Library (NSRL) Rootkit identification utilities Rootkit Hunter chkrootkit File system integrity checking tools Osiris AIDE FTimes and HashDig FLAG (Forensic Log Analysis GUI), from the Australian Defence Signals Division Time Zone Converter Knoppix Security Tools Distribution (STD) Penguin Sleuthkit (a remaster of Knoppix) The FIRE (formerly known as "Biatchux") bootable CD-ROM forensic toolkit Open Source Windows Forensic Tools for Windows Open Source Windows Forensic Tools for Unix chkwtmp (SunOS 4.x) chklastlog (SunOS 4.x) NT Objectives was mentioned in a DEFCON talk on forensics They produce a free toolkit (that lets you the same thing as find does for free on Unix!) NTI Information & Resource Page (Mostly Windows-specific instructions, but some general forensic guidelines) Slashdot thread on wiping hard drive contents Put A Trace On It: A Command You Can ``truss'', SunSolve Online document Signatures of Macintosh files DD'©ҐUltimate Guide to Mac OS Forensics Forensic analysis or related hardware Hard Disk Removal, Sanderson Forensics Customer Installable Parts, Apple Computer WiebeTECH (Fire Wire docking devices) FIREVue FireWire 400 / IDE Bridge Boards DK-9 Removable Hard-Drive Enclosure USB 2.0 + Firewire 1394 with Ultra Quiet Cooling Fan Forensic-Computers.com F.R.E.D.D.I.E The Image MASSter Solo Forensic system Daten Airbag (hard drive write protection) Centurion Guard AgatИ USB hard drive Partitioning/File system documentation Windows NT Boot Process and Hard Disk Constraints, Microsoft Knowledge Base Article 114841 See "Splitting the Disk" in Sleuthkit Informer #2 Sleuthkit Media Management Tools Linux Resource: Top: Kernel: File Systems Ext2fs Home Page Ext3 for the 2.2 kernel SGI's XFS Port to Linux IBM's JFS Port to Linux FAT: General Overview of On-Disk Format, Microsoft Microsoft Extensible Firmware Initiative FAT32 File System Specification, Microsoft Linux Magic Numbers JPEG File Interchange Format (JFIF) The proposed Filesystem Hierarchy Standard [PDF file] (Directories/files, their locations, and intended purposes: A good topographic map of Unix filesystems.) Journal File Systems, by Juan I Santos Florido Large File Support in Linux Destruction/Recovery of data Safe destruction of hard drives (This is good! ;) Zapping data on CDs! (NICE light show!) Unlocking a password protected harddisk (ATA Security Mode features), by the Rockbox Crew Incident costs, damage estimation, and risk analysis Project Develops Model for Analyzing Security Incident Costs in Academic Computing Environments A Study on Incident Costs and Frequencies, by Virginia Rezmierski , Adriana Carroll , and Jamie Hine Security Attribute Evaluation Method: A Cost Benefit Approach, by Shawn Butler, Carnegie Mellon University, International Conference on Software Engineering 2002 (ICSE 2002) Proceedings Multi-Attribute Risk Assessment, by Shawn Butler, Carnegie Mellon University, Proceedings from Symposium on Requirements Engineering for Information Security (SREIS 2002) Attack Trees: Modeling security threats, by Bruce Schneier, Dr Dobb's Journal, December 1999 Attack Modelling for Information Security and Survivability, Andrew P Moore, Robert J Ellison, Richard C Linger, Technical Note CMU/SEI-2001-TN-001, March 2001 A Quick Tour of Attack Tree Based Risk Analysis Using Secur/Tree, whitepaper by Amenaza.com, May 2002 Other documents/terms/legal resources Forensic Examination of a RIM (Blackberry) Wireless Device, by Micheal W Burnette, June 2002 What is RAID? Linux DTP Hardware RAID HOWTO, by Ram Samudrala, v1.6, February 20, 2002 Computer/High-Tech Crime and Related Sites Resources for High-Tech Crime Units, Officer.com What is "Bates Numbering?" Forensics Links from www.forinsect.de Certificate/Degree Programs A university in Texas is offering a cybersecurity degree program, by Sandra Swanson, Informationweek, May 3, 2002 U.T Dallas To Establish Digital Forensics And Security Institute To Help Fight Cybercrime, University of Texas, Dallas, press release, May 1, 2002 University of New Haven Forensic Computer Investigation Program Graduate Certificate Program in Computer Forensics (GCCF), University of Central Florida UCF's list of University Programs/Courses in Computer Forensics [PDF] Georgetown Institute for Information Assurance Dan J Ryan's Educational Materials Johns Hopkins University Information Security Institute Carnegie Mellon University Information Networking Institute (a C3S affiliated program) Syracuse University Information Security Management Program Dartmouth University Institute for Security Technology Studies Purdue University CERIAS Information Assurance Education Graduate Certificate Program Jobs Where to Look for Security Jobs, By Deborah Radcliff, Computerworld, June 3, 2002 High demand for tech detectives , by Bob Weinstein, Suntimes, February 4, 2001 ... Computer Crime, CERT Coordination Center Evidence Examinations Computer Examinations, Handbook of Forensic Services, U.S Department of Justice, FBI Digital Evidence: Standards and Principles,... Communication, Security, and Computer Science, eds R Capocelli, A DeSantis, and U Vaccaro, pp 329334, (Springer-Verlag, 1993) Secure Names for Bit-Strings (PostScript), by Stuart Haber and W Scott Stornetta,... Scott Stornetta, in Proceedings of the 4th ACM Conference on Computer and Communication Security, (ACM, 1997) Guidelines and standards Electronic Crime Scene Investigation: A Guide for First Responders,