New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online.
image
Prime Choice
· Head Lines
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 18)
· Marcia's (QA2)
· Bill G's (CO4)
· Paul's (AR 5)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 18319
Comments: 152
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image fbi: Busted!: Child Porn Gets by Filters; Feds Follow image
FBI
Child Porn Gets by Filters; Feds Follow
An employee sharing child pornography online eludes detection -- until investigators arrive.
Security Manager's Journal
by Mathias Thurman

OCTOBER 20, 2003 ( COMPUTERWORLD ) - We've had some excitement around my department over the past few weeks involving law enforcement. If you work for an Internet service provider, you are probably familiar with what is called a Section 2703(f) court order.

Title 18 U.S.C. 2703(f) of the Electronic Communications Privacy Act of 1986 contains a provision requiring Internet service providers to take the necessary steps to preserve electronic records and other evidence pending the issuance of a court order or other legal process.

The order is simply a letter from a law enforcement agency requiring a service provider to preserve logs in preparation for a subpoena or search warrant. Receiving such letters is a common occurrence at Internet service providers -- but not at my company.

Suspicions Aired

A few weeks ago, I was called to our general counsel's office, which had received such an order. The letter, typed on fancy letterhead with a three-letter agency logo on top, instructed us to preserve any logs in relation to the network activity of one of our employees.

At the initial meeting, my team and I met with the investigator. He was fairly savvy about technology, which came as a surprise.

He said our employee was using his home computer to access child pornography on the Internet. But the investigator also suspected that the employee was sending pornographic pictures, videos and Web site address information to his e-mail account at work. And the agency had reason to believe that our employee was using his company-issued workstation to access these illegal sites.

I was pretty sure that the employee couldn't use his desktop workstation to access pornography Web sites, since we use content-filtering software that blocks access to most of them. But we had to comply with the order.

Normally, if law enforcement agents want to monitor someone's network activity, they present a Title III wiretap order. That enables investigators to install network-monitoring software that can be configured so they can monitor only a particular person's network traffic.

At our company, however, we already collect network traffic data through our intrusion-detection systems, so a Title III order wasn't needed. We typically keep three months of data, which includes all network traffic going in and out of our company at specific gateway locations.

We have about 20 sensors to gather that data, so I suggested that we filter the data from our network sensors and use our three months of saved data to assemble a profile of the user's network activity.

The investigator agreed, but he cautioned us to maintain the same level of monitoring and to keep all archived data, even if the three-month time period was due to expire. We were not to conduct any additional network monitoring beyond what we do on a regular basis, or he would need to obtain a wiretap order.

Getting the Data

We began to set things up. We identified which network sensor was responsible for monitoring the traffic associated with the employee in question. We configured the port connected to that sensor so it would span the port to which the suspect's workstation was attached. By doing this, we ensured that the only network traffic we were collecting was that going to and from the employee's desktop. We didn't want to provide the law enforcement officials with extra data that might contain intellectual property or potentially sensitive information.

Next, we had to figure out how to sort out the correct archived traffic data. Like most companies, we allocate IP addresses dynamically. The IP address leases are set to expire periodically, so over a three-month period, the suspect would have logged in under dozens of addresses.

Our sensors had collected several gigabytes of data, and we wanted to provide only the necessary data related to the suspect's workstation.

Fortunately, the workstation had a unique NetBIOS network resource name based on the user's name. By knowing the NetBIOS name, we could pull the relevant data from the logs. We ended up copying the data to a CD-ROM, which we gave to the investigator when he returned with a search warrant. We are still required to keep the original data.

After that, we conducted an internal review of the user's network traffic. I was dismayed to discover that he indeed been e-mailing himself pictures and other contraband. What's more, he had used Yahoo chat groups to share his illegal materials. Our filtering software didn't block access to those groups, since the names of the groups didn't match any of the filters we had installed on our URL-filtering application. The employee had also used his desktop to e-mail pictures and video clips to others by way of a Yahoo e-mail account.

We confiscated his desktop computer and gave the hard drive to the investigator. Our human resources department is in the process of terminating this individual's employment, and I'm sure that there will be an arrest at some point.

Now that this episode is behind us, we plan to review the configuration of our filtering software and our intrusion-detection system to see what changes we can make to prevent this type of activity from recurring. In this case, the user was accessing inconspicuous chat areas. Since we aren't blocking access to Yahoo chat rooms, the challenge will be to come up with a way to minimize false positives and performance issues while still preventing unauthorized use of our resources.

What do you think?

This week's journal is written by a real security manager, Mathias Thurman, whose name and employer have been disguised for obvious reasons. Contact him at [email protected], or join the discussion in our forum. QuickLink a1590

To find a complete archive of our Security Manager's Journals, go online to

computerworld.com/secjournal.

CW
Posted on Wednesday, 22 October 2003 @ 05:25:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Intel
· HotScripts
· W3 Consortium
· More about FBI
· News by phoenix22


Most read story about FBI:
Sobig.G

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.