Mobile Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 8 October 2013

National Computer Forensics Institute: Demystifying cybercrime!!!

Posted on 05:23 by Unknown
Knowing how to handle digital evidence and discovery correctly prevents costly mistakes. A federal facility in Birmingham, Alabama is working hard to improve that situation. 
NCFI 1.png
Birmingham, Alabama has a certain appeal for those of us living in the northern part of the country, especially this time of year when one day we could be looking at tornadoes, and the next thirty plus inches of snow.
I learned something else during my trip to Birmingham. The city has a propensity for digital crime fighting. Facebook learned this firsthand when staff and students in the university’s computer-forensic program played a significant role in determining the key players behind Koobface, a computer worm that stole millions of dollars from Facebook members.
Digital crime-fighting efforts in Birmingham do not stop there; drive south from downtown Birmingham on Highway 65 to the sprawling suburb of Hoover. Exit on Valleydale Road, and before long, a well-kept modern-looking building appears on the right.

Figure A

NCFI 2.png
Once inside, the reason we stopped at this particular location became apparent—The National Computer Forensics Institute (NCFI)—another Birmingham organization that’s making life difficult for computer savvy criminals.

Figure B
NCFI 3.png

Barry Page, NCFI Deputy Director, met our group at the institute’s imposing double doors and acted as our tour guide for the facility. “The purpose of NCFI is simple; get state and local officials from across the country up to speed on the proper handling of digital evidence, cybercrime investigations, and judicial procedures related to digital crime.”
In addition to Page's explanation, the official NCFI mandate states: “[T]o provide state and local law enforcement, legal, and judicial professionals a free, comprehensive education on current cybercrime trends, investigative methods, and prosecutorial and judicial challenges.”
Page then pointed out that the United States Secret Service’s Criminal Investigative Division and the Alabama Office of Prosecution Services jointly run NCFI—the only training facility of its kind in the United States, which has been in operation since 2008. 2600 students from more than 500 agencies have taken classes there already.

Digital evidence training for the legal profession and law enforcement

NCFI has three multipurpose classrooms, two network investigation classrooms, a mock courtroom, and an operational forensics lab dedicated to the Birmingham Electronics Crimes Task Force. NCFI offers thirteen classes under the following categories:
  • Deadbox Forensics
  • Network Intrusion
  • Mobile Device and Social Networking Examination
A member of the tour asked about equipment. Page said NCFI considers it important for agencies to standardize on equipment and methodology as a way to enhance cross communications and eliminate mistakes. To that end, each student receives a Forensic Recovery Device and notebook. Software is dependent upon the student’s class—for example, students enrolled in Deadbox Forensics would receive Encase and WriteBlocker.
Next, we moved past three packed classrooms on our way to the mock courtroom. As we entered, Page said besides being Deputy Director of NCFI, he is an Alabama state prosecutor. So, he works closely with the instructors teaching the Computer Forensics in Court classes.
The following points are addressed during the judge’s class:
  • Understand the significance of how data is stored on computers
  • Understand the base differences between popular operating systems
  • Understand the role that the Internet and networks play in computer crimes
  • Understand the entire forensic process performed by investigators
  • Better understand legal obstacles present in computer crimes
  • Understand how to better evaluate computer crime cases in court

Figure C

NCFI 4.png
Page also pointed out the mock courtroom, which is designed to accommodate digital discovery so as not to break the chain of custody, yet still guarantee a fair and impartial hearing. For that reason alone, the courtroom itself receives significant attention from people wanting to incorporate similar features into their courtrooms.
As we left the mock courtroom, I asked what defense attorneys do to stay current. Page explained that defense lawyers most often specialize. And since people accused of a crime get to pick their defense attorney, they will more than likely retain an attorney experienced in litigating cases involving digital evidence.
But, unfortunately, assigning cases involving digital evidence and or digital crime to prosecutors or judges with experience is not always an option. So, the logical approach is to provide a way similar to NCFI for prosecutors and judges to become familiar with court procedures involving digital crime and digital evidence.

Final thoughts

The university’s computer forensics team includes an archeologist and psychologist. The team has an enviable string of successes including eliminating Koobface. The NCFI promotes a similar ideology to normally non-cooperating legal entities. They also are showing positive results from their effort. I see a common thread—that of getting normally disparate groups talking and working together to solve big issues.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • EMC Defenders CTF - Week 3 - Contest 14 - Reversing
    I played the EMC defenders CTF with a few of my friends a while back. We sadly couldn't complete all the challenges. All the same it was...
  • AuthenTec co-founder discusses how Touch ID fingerprint reader evolved from early prototypes!!!
    AuthenTec co-founder F. Scott Moody recently stopped by his alma mater to deliver a  speech  about the company he helped launch. His company...
  • ASRock unveils a pair of motherboards designed specifically for Bitcoin mining!!!
    Those looking to generate some extra cash by mining for Bitcoin now have a couple of new hardware options courtesy of ASRock. The motherboar...
  • Hackers breach vBulletin support forum using zero-day vulnerability!!!
    A group of European hackers by the name of Inj3ct0r Team have taken  responsibility  for hacking the support forums of vBulletin.com and the...
  • Amazon's trio of biospheres gets two thumbs up from Seattle Design Review Board!!!
    Earlier this year Amazon  submitted a building proposal  to construct a series of massive biospheres in downtown Seattle adjacent to three o...
  • 20 Life Hacks and Tools to Boost Productivity on Your Computer!!!
    With the flood of  new technologies , websites, apps, news, work files, pictures, articles and the like, staying organized and focused is be...
  • Why and how to set up your own wiki with Dokuwiki!!!
    DokuWiki is a simple but versatile wiki. Find out how to install, configure, and begin using DokuWiki.  A couple of weeks ago, I had to set ...
  • A peek at the inside of Sony's PlayStation 4!!!
    See  what's inside the PlayStation 4 with these exclusive photos  Inside Sony headquarters, at the heart of Tokyo’s Shinagawa district, ...
  • Google Nexus 5: The geekysupport Review!!!
    It’s that time of the year again, where Google releases a new Nexus handset for those wanting a cheap yet powerful device running stock Andr...
  • Gaming Mice Roundup 2013: Corsair, Steelseries, Gigabyte, Tt eSports, Logitech and Razer Devices Tested!!!
    Shifting from a standard office mouse to something more appropriate for gaming is worthwhile if you care about your performance, but investi...

Categories

  • 100
  • 12.04
  • 2.2
  • 2013
  • 21
  • 4848
  • 8080
  • add
  • alternative
  • analysis
  • android
  • apk
  • app
  • applet
  • applets
  • appletviewer
  • application
  • appsec
  • asmx
  • assembly
  • attack
  • attacks
  • basic
  • basics
  • beginner
  • blazeds
  • blog
  • book
  • books
  • breakpoint
  • breakpoints
  • browser
  • burp
  • CALL
  • capture
  • certificate
  • chain
  • cheops
  • client side
  • code
  • conference
  • console
  • content-type
  • coverage
  • CRLF
  • cross
  • crossdomain
  • csrf
  • ctf
  • customer service
  • database
  • deblaze
  • debug
  • debugger
  • decision
  • defcon
  • delete
  • deleting
  • dll
  • dogbert
  • dom
  • dynamic
  • element
  • emulator
  • encryption
  • engineering
  • entity
  • environment
  • example
  • executable
  • external
  • firebug
  • flash
  • flex
  • FlourineFX
  • flow
  • flowchart
  • forensics
  • fs
  • fuzz
  • glassfish
  • graph
  • handbook
  • harden
  • hash
  • hints
  • hit
  • hittrace
  • howto
  • IDA
  • idapro
  • IDB
  • immunity
  • in use
  • incremental
  • inetsim
  • injection
  • install
  • introduction
  • java
  • java.policy
  • javaee
  • javascript
  • jks
  • jump
  • keyboard
  • lab
  • loaderdata
  • malware
  • management
  • mapper
  • market
  • MD Description
  • MD FAQ
  • MD Technical Support
  • MD Updates
  • MD User Guide
  • md5deep
  • mount
  • msdn
  • network
  • newbie
  • olly
  • ollydbg
  • options
  • packet
  • password
  • pbkdf
  • pcap
  • peb
  • peb_ldr_data
  • penetration
  • pentest
  • permissions
  • phone
  • pkcs12
  • policytool
  • port
  • practical
  • procedure
  • proxy
  • resign
  • resignation
  • response
  • restrict
  • reverse
  • reversing
  • review
  • salt
  • same origin
  • sample
  • scripting
  • sdk
  • secure
  • security
  • set
  • setup
  • sharif
  • shortcuts
  • SI
  • signed
  • site
  • snapshot
  • soapui
  • source
  • splitting
  • ssl
  • start
  • static
  • steps
  • stunnel
  • superblock
  • support
  • test
  • thoughts
  • thread
  • tips
  • tool
  • tools
  • tor
  • trace
  • truecrypt
  • tutorial
  • ubuntu
  • umask
  • understand
  • university
  • unsigned
  • video
  • view
  • virgin
  • virtual
  • virtual box
  • virtual machine
  • virtualbox
  • vm
  • watch
  • web
  • web application
  • web service
  • work
  • wsdl
  • xhr
  • xml
  • xss
  • xxe

Blog Archive

  • ▼  2013 (496)
    • ►  November (143)
    • ▼  October (297)
      • Samsung fined $340,000 for online smear campaign a...
      • Google is experimenting with massive banner ads fo...
      • What is your best idea for an invention?!!!
      • Take a ride in a helium balloon to near-space for ...
      • New York City to retrofit 250,000 street lamps wit...
      • Chrome used more than Firefox, Opera and Internet ...
      • Leaked documents reveal NSA spied on the phone con...
      • Self-driving cars projected to reduce injuries by ...
      • Fon makes US debut, hoping to grow the Wi-Fi shari...
      • Japanese restaurant replaces waiters with conveyor...
      • Vine update finally delivers editing and draft mod...
      • Nexus 5 expected to debut October 31 in the US!!!
      • Germany proposes locked-down national internet aft...
      • This modified Lexus paints a unique portrait of it...
      • Moto X and LG G2 now available starting at $99 on-...
      • Comcast offering 25Mbps Internet, local channels a...
      • BlackBerry denies any involvement in questionable ...
      • New Firefox add-on allows you to see how, when and...
      • Samsung turns in another record-setting quarter wi...
      • PlayStation 4 will require a Day One update to ena...
      • Batman: Arkham Origins Review!!!
      • Amazon's trio of biospheres gets two thumbs up fro...
      • Google believed to be constructing a floating data...
      • Understanding Amazon's "profitless" business model!!!
      • World's first Bitcoin ATM to open in Vancouver thi...
      • LG announces G Flex with curved 6-inch display and...
      • SoapUI - Client side cert - Burp
      • The Unthinkable Risks of the Cloud!!!
      • Yahoo Tops Google In Web Traffic Again!!!
      • Yahoo Is Now Actually Beating Google In Traffic. H...
      • The Decline of Wikipedia!!!
      • De Blasio Outlines Plans To Curb New York's iPhone...
      • Apple announces iPad Air, iPad mini with Retina di...
      • Apple refreshes MacBook Pro Retina laptops with Ha...
      • 20 Life Hacks and Tools to Boost Productivity on Y...
      • Best Tablet Computers 2013!!!
      • Gaming Mice Roundup 2013: Corsair, Steelseries, Gi...
      • Google Quantum AI team releases quantum mechanics ...
      • Research team designs and builds a disk drive that...
      • Malware Alert: Downloading the "GTA V PC torrent" ...
      • TSA now starts its security check of passengers be...
      • Apple announces iPad Air, iPad mini with Retina di...
      • Apple refreshes MacBook Pro Retina laptops with Ha...
      • Apple's OS X Mavericks goes live today as a free d...
      • Crysis developer releases free-to-play FPS browser...
      • Microsoft is working on a Google Glass competitor,...
      • BlackBerry's new BBM app sees 5 million downloads ...
      • EA preparing a high-end Battlefield game for mobil...
      • Check out this bullet-time rig that uses 130 HTC O...
      • Nvidia has a Logan-powered Shield 2 console in dev...
      • Windows RT-based Nokia Lumia 2520 to take on the S...
      • Nokia announces 6-inch Lumia 1520, Lumia 1320, and...
      • Nvidia releases GeForce 331.58 WHQL drivers!!!
      • How to recreate the iOS 7 home screen and iPhone h...
      • Digital dating: One in 10 Americans have used an o...
      • John Carmack isn't convinced that Steam Machines w...
      • At least 10 million 'innocent' files destroyed in ...
      • Twitter expected to kill music app after just six ...
      • Leaked Intel roadmap shows Broadwell-K chips to ar...
      • LG reportedly creating its first Chrome OS devices!!!
      • Netflix in position to surpass HBO in paid subscri...
      • Nokia's phablet detailed in leak as Lumia range is...
      • Microsoft pulls Windows 8.1 update for Surface RT ...
      • BlackBerry resumes rollout of BBM for Android and ...
      • Apple expected to reveal retina iPad mini at tomor...
      • Verizon website glitch potentially exposed texting...
      • When Amazon's Customer Reviews Get Ridiculous and ...
      • Dell now accepting pre-orders for Windows 8.1, Bay...
      • Worldeye is the animated globe that offers a reali...
      • When Amazon's Customer Reviews Get Ridiculous (and...
      • Microsoft pulls Windows 8.1 update for Surface RT ...
      • Is Wikipedia for sale? Ubuntu 13.10 is out, Core i...
      • Nvidia bids adieu to V-Sync limitations with G-Syn...
      • Facebook app finally arrives for Windows 8.1 along...
      • repeat post: Windows 8.1 now available through Win...
      • SpaceX Grasshopper rocket launch filmed from aeria...
      • Verizon adds 1.1 million wireless connections duri...
      • Amazon's long-rumored smartphone could arrive via ...
      • Acer's second 8-inch Windows 8 tablet sees improve...
      • Microsoft to host Windows 8.1 'Ask Me Anything' se...
      • Samsung submits proposal to European Commission in...
      • Ireland's Department of Finance considers shutting...
      • AuthenTec co-founder discusses how Touch ID finger...
      • AT&T revealed as Tesla's mobile partner for in-veh...
      • Mapbox goes up against Google Maps with $10M in fu...
      • Motorola's new migration tool can preload the Moto...
      • Nexus 5 briefly appears on Play Store, 16 GB for $...
      • Apple iPhone 5s: The Geekysupport Review!!!
      • Samsung launches free Galaxy S4 battery replacemen...
      • Nvidia GeForce GTX 760 Ti appears as rebranded GTX...
      • Deep Web drug bazaar Silk Road set to become a Hol...
      • Neowin reviews Windows 8.1!!!
      • Nvidia GameStream transforms Shield into a serious...
      • AMD turns a profit in Q3 thanks to custom PS4, Xbo...
      • Elon Musk buys James Bond 'Lotus sub', plans to ma...
      • Security research firm says Apple can read your iM...
      • IsoHunt to shut down, pay MPAA $110 million!!!
      • Sony rolling out PlayStation 4 kiosks at select re...
      • Monthly video game sales rebound thanks to Grand T...
      • Researchers in China use light bulbs as a speedy a...
    • ►  September (51)
    • ►  August (2)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (16)
    • ►  October (3)
    • ►  September (1)
    • ►  August (4)
    • ►  June (1)
    • ►  May (4)
    • ►  April (2)
    • ►  February (1)
  • ►  2011 (22)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (9)
    • ►  June (1)
    • ►  May (2)
    • ►  April (6)
  • ►  2010 (8)
    • ►  August (3)
    • ►  April (2)
    • ►  January (3)
  • ►  2009 (6)
    • ►  December (6)
Powered by Blogger.

About Me

Unknown
View my complete profile