The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

62
The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005

Transcript of The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Page 1: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

The RCMP Tech Crime Unit

&

Information Systems SecurityPresented to:

ISSA

January 26, 2005

Page 2: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

E Div. Technological Crime Unit

• Who / What is the Tech Crime Unit anyway?– Mandate is:

• to conduct technical analysis of computer storage medium

• to conduct investigations of true computer crime (unauthorized access, mischief to data)

Page 3: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

E Div. Technological Crime Unit

• Who / What is the Tech Crime Unit anyway?– Unit created in July 2002 and subsequent

transfer of 5 members– Unit has grown to current size of 14 regular

members and two support staff

Page 4: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

E Div. Technological Crime Unit

• Who / What is the Tech Crime Unit anyway?– Approx. half of our members have undergrad

degrees– Permanent posting to the Tech Crime Unit

requires successful completion of an 18 month understudy program

– Training is always ongoing

Page 5: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

E Div. Technological Crime Unit

• Who / What is the Tech Crime Unit anyway?– Non personnel resources

• In addition to the RCMP computer equipment, we maintain our own 21 TB san to support our technical analysis work.

Page 6: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

New Laws

• Criminal Code Production Orders– These are a court order similar to a general

search warrant• They replace a search warrant in that it dose not

technically require a search.• Required to produce the records when and in the

form demanded in the production order.

• In the future you may see Preservation Orders

Page 7: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

• So…. What do you do when…

– Your data is destroyed

Page 8: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

So…. What do you do when…

– Your data is destroyed– An unauthorized user has gained access

Page 9: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

• So…. What do you do when…

– Your data is destroyed– An unauthorized user has gained access– Data has been modified

By an intentional act…

Page 10: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Priorities

• Objectives (Primary)– Maintain the function / operation of your

system

Page 11: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Priorities

• Objectives (Primary)– Maintain the function / operation of your

system

– Maintain the integrity of your system

Page 12: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Priorities

• Objectives (Primary)– Maintain the function / operation of your

system

– Maintain the integrity of your system

– Prevent further security problems

Page 13: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Priorities

• When there is a security breach, it may be too late to start logging.

– MOTO: - Have logging in place; make sure that your business can continue

Page 14: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Priorities

• When there is a security breach, it may be too late to start logging.– MOTO: - Have logging in place; make sure that

your business can continue

– Turn on all logging that is possible. Save log files (reports) from all routers possible.

Page 15: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• When do you call the police?

Page 16: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• When do you call the police?

– When you know (or believe) that you have an intentional security breach (criminal offence)

• A criminal code offence requires “intent”.

Page 17: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• What are the offences?

Page 18: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• What are the offences?

– Mischief to Data• Dual / maximum 5 years

Page 19: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• What are the offences?

– Mischief to Data• Dual / maximum 5 years

– Unauthorized Use of Computer (Access)• Dual / maximum 10 years

Page 20: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• What are the offences?– Mischief to Data

• Dual / maximum 5 years

– Unauthorized Use of Computer (Access)• Dual / maximum 10 years

– Other Criminal Code offences – but not “Theft of Information”

Page 21: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• What do police require to initiate an investigation?

Page 22: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• What do police require to initiate an investigation?

– A reason to believe that an offence has taken place.

• Obviously, the more information that can be offered, the more quickly we can investigate.

Page 23: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• When will police take action??

Page 24: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• When will police take action??

– We do not normally investigate attacks on home computers

Page 25: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• When will police take action??

– We do not normally investigate attacks on home computers

– UNLESS:• Threat of physical harm

• Threat of Damage to property

• Related to other serious matter

Page 26: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• When will police take action??

– We will investigate business related matters

• Threat to livelihood

• Loss of jobs

Page 27: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• Who do you contact??

– Contact your local police agency (911 is probably not appropriate )

Page 28: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Secondary Objective

• Who do you contact??– Contact your local police agency (911 is

probably not appropriate )

– Advise your local police agency that our unit is available to assist / investigate if they are not able to fully respond.

• We will assign a priority and respond on that basis

Page 29: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Other Considerations?

• Should you notify upstream / downstream?– That’s your call…

• What are the risks to the other system / organization?

Page 30: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Other Considerations?

What is the risk to your organization ?

If you notify…

If you don’t notify…

Page 31: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Other Considerations?

What is the risk to your organization ?

If you notify…

If you don’t notify…

What is the ethical thing to do?

Page 32: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Other Considerations?

• Share information

– This is one of the strongest defense mechanisms that is available

Page 33: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• You’ve suffered (are suffering) an attack

• You’ve notified the police

• You’ve notified related organizations for their protection / information

• NOW WHAT??

Page 34: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Secure your system (priorities)

– Ensure that your business / operation can continue.

Page 35: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

– To assist police (or civil) investigation

• Make and keep notes / chronological journal of events and actions

• Retain all backups

Page 36: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

– To assist police (or civil) investigation

• Make and keep notes / chronological journal of events and actions

• Retain all backups

• If possible remove & retain the current hard drives and restore the system on replacement hard drives.

Page 37: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

If not…

Obtain and preserve a “bit image” copy of your system at the point that you are aware of the attack.

• Linux ‘DD’ works well (Ghost would be a second choice)

• Ensure that the destination drive has been ‘wiped’, not just reformatted

Page 38: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• If an image of the system is not possible…

– Make & retain copies of all of the log files possible

Page 39: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Police investigation can take considerable time.

– Jurisdictional issues may prevent prosecution

Page 40: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• IF we go to court….

– Detailed statements from all persons will be required.

• Much better quality easier to do if notes kept from the time of the attack.

Page 41: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• IF we go to court….

– Detailed statements from all persons will be required.

• Much better quality easier to do if notes kept from the time of the attack.

– Court will likely be a year or two away and will be at least a week in duration.

Page 42: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Disclosure…

– Police and Crown Prosecutors will have to disclose ALL evidence upon which the case relies

• Exception: Confidential information

Page 43: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Confidential Information…

– This must be dealt with on a case by case basis.

Page 44: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Confidential Information…

– This must be dealt with on a case by case basis.

– Disclosure may be limited to only a portion of the confidential information

Page 45: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Confidential Information…

– This must be dealt with on a case by case basis.

– Disclosure may be limited to only a portion of the confidential information

– Disclosure may be made to a third party

Page 46: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

How does it work?

• Confidential Information…

– In a ‘worst case’ scenario a decision may have to be made to proceed or withdraw from the prosecution

Page 47: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client”

• Enough about “when you suffer an attack”

• How can you prevent “an attack”??

Page 48: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• The boring and the usual!….

Page 49: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• The boring and the usual!….

– Keep your service packs up to date

Page 50: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• The boring and the usual!….

– Keep your service packs up to date– Ensure your authentication system is current

and meets your security requirements

Page 51: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• The boring and the usual!….

– Keep your service packs (software) up to date– Ensure your authentication system is current

and meets your security requirements

– TEST YOUR BACKUP / DISASTER RECOVERY!!!

Page 52: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Do you have policy?…

Page 53: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Do you have policy?…

– Separation of Duties

Page 54: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Do you have policy?…

– Separation of Duties

– Required authentication

Page 55: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Do you have policy?…

– Separation of Duties

– Required authentication

– Employee Termination procedures• A check list might be helpful

Page 56: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Are your employees aware of your policy?

– Can they report a problem to a confidential person… and do they know who that person is?

Page 57: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Have you had an independent review of your policies / security / disaster recovery??

– A fresh look can be invaluable

Page 58: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Where’s the threat??

– A vulnerable system will eventually be hit from an external source

Page 59: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Where’s the threat??

– A vulnerable system will eventually be hit from an external source

– A secure system may also be hit from an internal source

Page 60: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• Information from my contacts in private industry as well as my experience indicates…

– You are at least as likely to be compromised from an internal threat as from an external threat.

Page 61: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

• We are happy to respond to your request for an investigation….

– We sincerely hope that you don’t have to call!!

Page 62: The RCMP Tech Crime Unit & Information Systems Security Presented to: ISSA January 26, 2005.

Don’t be a “Client

S/Sgt. Bruce ImrieRegional Coordinator

Vancouver Integrated Technological Crime Unit

ITCU Lab: 604-598-4087

Unit Pager: 604-473-2858

Email: [email protected]