Chapter 5

Online Investigations

Learning Outcomes

After reading this chapter, you will be able to understand the following:

  • How to gather personal data about a suspect from a variety of online sources;

  • Databases available to law enforcement to profile a suspect;

  • Different types of online crime and how criminal investigations are conducted online; and

  • How to capture Internet communications, video, images, and other content to add to an investigative report.

When I ask my college students about conducting an online investigation and trying to find personal information about an individual, they generally suggest using the Google search engine. However, searching for information by simply using Google will yield numerous unfocused search results. An investigator could take hours gleaning through these results to find the specific personal information about a suspect that he is trying to find. This chapter highlights how to find targeted information about an individual, how to covertly communicate with a suspect online, and, ultimately, how to comprehensively document an investigator’s findings and communications.

When we think about online investigations, it conjures up ideas of undercover detectives interacting with suspects online. However, we should also remember that companies continually conduct online investigations, especially when a company considers hiring a new employee. Moreover, there are numerous incidents involving employees who post incendiary comments about their employers online. Companies are now more vigilant about monitoring what their employees post on blogs and on social media websites. In fact, many companies have rewritten their Internet policies as a result of employees commenting about their employers online. In one example, Dawnmarie Souza was fired by her employer, American Medical Response, for derogatory comments that she posted about a coworker on Facebook. The National Labor Relations Board (NLRB) and Souza saw things differently and ended up in court. The NLRB and Souza felt that her Constitutional right to freedom of speech had been violated, especially because Souza’s comments were posted using her home computer on her own time. The NLRB believed that the company’s Internet and social media policy violated employee rights. Ultimately, there was a settlement between the company and Souza, and the company changed its blogging and Internet use policies so as not to prohibit employees from posting their personal opinions about the company online.

In another example, at Mesa Verde High School, in California, Donny Tobolski was suspended for posting rude comments about a teacher on his Facebook account. The boy posted that his biology teacher was a “fat ass who should stop eating fast food, and is a douche bag”, The American Civil Liberties Union (ACLU) argued that the school violated the student’s state and federal Constitutional rights, as well as the California Education Code.

This chapter details a number of online resources, some of which are free and some of which are paid premium services, to create an online profile while investigating criminal activity. Sometimes this fake online profile is called a “sockpuppet”. This chapter also describes databases that are regularly used by international, federal, state, and local agencies to gather and share intelligence on the general public.

Note

All online resources in this chapter were correct at the time of writing, but of course websites are subject to change without notice.

Working Undercover

An undercover investigation is the process used to acquire information without the individual or suspect knowing the true identity of the investigator. Prior to any interaction with a suspect, an investigator will perform reconnaissance on the individual. This background search involves building a profile about the suspect. The profile will include various types of personal data discussed in this chapter and will also include profiling the suspect’s behavior. It is important that the investigator performs this reconnaissance incognito. As more of our personal data, attitudes, communications, and general behaviors are captured on the Web, online reconnaissance has become extremely important. Additionally, the Internet has facilitated the growth of certain types of criminal activities. It is easier for a criminal to dupe a victim into handing over credit card information online than to steal someone’s wallet. Pedophiles have gravitated to the Internet as they have found it easier to find similar deviants online and even use the Internet to help plan their activities. However, the Internet also provides advantages for undercover detectives; it is relatively easy to convince a pedophile that a 40-year-old detective is a 14-year-old girl when chatting online. During the reconnaissance phase, a detective may gain access to the suspect’s email account or user groups or gather information from social networking websites, if the law permits.

Following a background check of the suspect, surveillance of the suspect can begin. Detectives may begin monitoring the suspect’s residence, movements, and daily routine and generally build a profile of his behavior. Similarly, online the detective will monitor the suspect’s activities in chat rooms and in user groups. During this phase of the investigation, the investigator plans how detectives will record the suspect’s activities, which can include video and audio, decide whether any warrants need to be requested, and plan how the interaction between the detective and the suspect will occur.

The next phase of an investigation involves a more formal monitoring and recording of the suspect’s activities. This step of the investigative process might include acting on court-approved warrants, whether search warrants or wiretaps.

Finally, there is a sting operation. This step of the investigation is designed to catch the criminal in the act of committing or planning to commit a crime. A detective might pose as an accessory to a criminal act, or in the case of a child endangerment investigation, the investigator might pose as a child and speak with the criminal suspect. The Internet makes the process easier now because an actual child does not have to be used as “bait” to capture the suspect. In many cases, the suspect believes that he has been able to lure a child to a parking lot, where, in reality, police have lured the suspect for a rendezvous.

Generating an Identity

When working undercover, an investigator often needs to create a sockpuppet, which is a fake online persona created to interact with a person of interest. The investigator may need to create a Gmail or Yahoo! account, and the verification process will require an established email account and telephone number. ProtonMail (protonmail.com) or Tutanota (tutanota.com) are services that will allow you to create disposable email accounts for verification. We will discuss disposable email in more detail in the next section.

Blur (abine.com) is a tool that allows you to obfuscate your email information. You can also create email accounts for use on the Dark Web, using services like Mail2Tor (mail2tor.com or mail2tor2zyjdctd.onion) or Secmail Tor (sigaintevyh2rzvw.onion). Regarding SMS verification, for new online accounts, you can use free services, like TextNow (textnow.com) or Talkatone (talkatone.com), or you could use a burner phone.

Sometimes an investigator will need to use Bitcoin in an investigation and ensure that the Bitcoin address is untraceable or close to being untraceable. Bitcoin Laundry (bitcoin-laundry.com) may be a good solution, if approved by your department. A Bitcoin ATM is another option, and these ATMs can be located at Coin ATM Radar (coinatmradar.com). Another option is to use a prepaid debit card, which does not require that the purchaser provide a name and address. A OneVanilla prepaid Visa card may be an appropriate option (onevanilla.com). This Visa card can then be linked to a PayPal account, if needed.

When interacting online with a suspect, it is important that your identity remains a secret and that your computer is protected against malware. Therefore, you may consider using a paid VPN service. Algo VPN (github.com/trailofbits/algo) allows you to create your own VPN service. There are paid VPN services too, like NordVPN (nordvpn.com) and RSocks (rsocks.net). You might also consider using the Tor browser (www.torproject.org) with the Tails OS (tails.boum.org) to remain anonymous online.

Realistically, it is not difficult for a detective to create an undercover identity. Nevertheless, there is a service that allows the user to quickly generate a false identity. Fake Name Generator (www.fakenamegenerator.com) is a free online service that allows the user to generate an ad hoc identity (see Figure 5.1). Moreover, the service allows the user to select gender (male/female), name set (American, Chinese, Hispanic, etc.), and country (Australia, Italy, United States, etc.). Once these three criteria have been submitted, a phony name, address, email address, telephone number, credit card number, Social Security number, weight, height, and other personal data are generated. Of course, sometimes the investigator may decide to tailor an undercover identity for a specific type of investigation—perhaps posing as a young girl when chatting online with a suspected pedophile. One problem for undercover investigators is the use of photographs to create a fake persona. The website thispersondoesnotexist.com creates realistic-looking computer-generated photos of people.

A screenshot of the home page of the Fake Name Generator website.

Figure 5.1 Fake Name Generator website results

Generating an Email Account

When working undercover, creating a temporary email account can be necessary to start a new service that will be utilized during an investigation. For example, when creating a new Gmail account, an email address is required to validate the user when setting up a new account. There are several disposable email services that allow the user to create an ad hoc email account with an inbox. Once the browser is closed, the email account is eliminated. Gmail accounts are particularly useful with undercover investigations because Google obfuscates the originating IP address from the email headers.

GuerrillaMail (www.guerrillamail.com) allows a user to create a temporary email address, which does not require any type of registration (see Figure 5.2). Your temporary email address will not have the @guerrillamail.com extension. The GuerrillaMail email address will last for 60 minutes.

The home page of the Guerilla mail website.

Figure 5.2 Guerrilla Mail website

Another service, mail expire (www.metafilter.com), allows the user to create a disposable email account that can be set to last up to three months (see Figure 5.3). However, unlike Guerrilla Mail, mail expire does require that you register and enter an existing email address. It should be noted that some disposable email accounts are blocked by some services as a method of verification.

A browser displays a webpage on the mail expire website.

Figure 5.3 mail expire website

Another disposable email service that does not require any type of registration is Mailinator (mailinator.com; see Figure 5.4). Interestingly, you can select your own username with this service. For example, you could select the email address [email protected].

The home page of Mailinator website.

Figure 5.4 Mailinator website

All of these aforementioned disposable email services are advertised as beneficial to users who wish to avoid spam. Nevertheless, they provide an effective means for detectives to utilize services without providing any (genuine) personally identifiable information.

In summary, an investigator can create a phony profile for an undercover investigation. A Gmail, or other email account, can be created using the phony profile. The email required by the Gmail registration process would be a disposable email created on-the-fly by a service like mailinator. Once a confirmation email appears in the mailinator Inbox, the detective can then click the confirmation link to finalize the Gmail account setup.

Masking Your Identity

Detectives have numerous methods at their disposal to remain anonymous online. Bluffmycall.com is one service that enables the user to (1) change her caller ID to any number, (2) disguise his voice, or (3) record his calls (see Figure 5.5). SpoofCard (www.spoofcard.com) is a similar service, which is also popular.

The bluffmycall.com website is shown.

Figure 5.5 Bluffmycall.com website

Spy Dialer (www.spydialer.com) is a free online service that allows a user to contact a cellphone number to hear who answers the telephone, without identifying the number of the caller (see Figure 5.6). The service can also be downloaded as an app to a smartphone.

A screenshot shows the home page of Spy Dialer website. There is a text box for entering number for free cell phone lookup with a button to dial. There are radio buttons for hear voicemail (selected) and lookup name.

Figure 5.6 SpyDialer.com website

Law enforcement can use a service called LEAP (Local Number Portability Enhanced Analytical Platform) to track criminals who try to evade investigation by switching telephone carriers. See lawen forcement.numberportability.com for more information about the service. It is also possible to find the carrier name associated with a telephone number by performing a reverse lookup with FoneFinder (fonefinder.net). Neustar (www.home.neustar) can then be used to see if the user of a number has ported it to another carrier.

It is important to note that law enforcement requires a wiretap to record telephone conversations. Laws differ from state to state about whether a recorded telephone conversation can be admitted as evidence; in New York State, only one party is required to consent to being recorded, whereas in California, both parties must consent. In New York State, the interception of a telephone call without consent or permission from a judge is eavesdropping, which is a felony. However, in New York you may record a call with one-party consent, when that party is part of a conversation. In many other states, all parties must consent to being recorded. This was clear in 1999, when Linda Tripp was indicted on charges of wiretapping, under Maryland law, after she recorded Monica’s Lewinsky’s confessions about her relationship with President Clinton. In this case, each wiretap violation carried a maximum penalty of five years in prison, a fine of $10,000, or both.

A user’s identity (more specifically, the IP address) can be masked by use of an online proxy. With an online proxy, a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize the IP address of the originating communication. Online proxy services include VIP Socks (vip72.com), Megaproxy (megaproxy.com; see Figure 5.7), Ion by Anonymizer (anonymizer.com), and The Cloak (the-cloak.com). In the case of Sarah Palin’s email account being hacked in 2008, David Kernell, using the handle “Rubico”, utilized a proxy service, but investigators were able to quickly identify the originating IP address. Kernell also left his email address ([email protected]) after posting Palin’s emails to 4chan, which is a website for anonymously posting information, including sensitive stolen data.

A screenshot of the home page of the Megaproxy website is shown. The tabs such as web SSL VPN, solutions, support, compare/select, and corporate are present at the top. The page has various details of the website. There are three buttons at the bottom. They are, Learn more, Sign up, and Try it free.

Figure 5.7 Megaproxy website

Many of these anonymizers (online proxies) are used by criminals to carry out their cybercriminal activity. Moreover, many of the computers being used as proxies are being used without the consent of the users and are a part of a botnet. Therefore, these proxy services and their servers generally operate outside the United States, especially in countries where the United States has little or no legal influence—countries like Russia or the Ukraine. Often U.S. investigators also encounter difficulties with accessing data from servers within the European Union because their privacy laws can stifle an investigation.

Dark Web Investigations

The World Wide Web (WWW), sometimes referred to as the “Clear Web”, is easy to use with traditional web browsers, like Safari, Edge, or Firefox. This is because regular websites, on the World Wide Web, are indexed and therefore searchable with search engines, like Bing and Google. There is, however, an unindexed part of the Web: The Dark Web.

The Dark Web is an encrypted network that utilizes the public Internet. Among the various overlay networks, the most widely used is Tor Routing. Tor was originally developed as part of a secure communication effort of the U.S. Naval Research Laboratory, as a means to protect and anonymize traffic by passing it through multiple layers of encrypted relays. The Dark Web is purposely hidden using a peer-to-peer (P2P) network. Dark Web sites are primarily accessed using the Tor Browser, which is a user-friendly browser that protects the anonymity of the user and can be important for individuals seeking to overcome censorship, ensure their privacy, or by criminals who seek to obfuscate their identity. According to the Tor Project’s website, “Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security”. The success of the Dark Web can be attributed to concerns about privacy, especially in a post-Snowden era.

OSINT Framework

A tremendous resource for finding open source intelligence (OSINT) is OSINT Framework (osintframework.com). This website can, for example, help an investigator search for Dark Web websites of interest. Figure 5.8 displays the type of online resources available related to the Dark Web.

Tor

Tor is free, open source, software and an open network that enables a user to surf the Internet with anonymity. A user can download the Tor Browser Bundle, thereby enabling the user to proxy through numerous host computers on the Tor network, throughout the world, while remaining anonymous. Tor also allows users to publish websites without disclosing their location and which are only available to Tor users. This is often referred to as the Dark Web because these websites are not searchable with a traditional browser, like Microsoft’s Edge. Many of these sites are hosted by criminal actors.

Tor is problematic for investigators because the identities of users on the Tor network are obfuscated, and there are numerous websites with hidden locations. Furthermore, the proprietors of nefarious sites conduct their criminal activities with numerous unknown users. Tor can also be a breeding ground for malware. The Silk Road is one example of a website on the Dark Web. This site, with close to one million registered users, was founded by William Ulbricht, also known as Dread Pirate Roberts, in 2011. The site facilitated criminal transactions: drug trades in LSD, cocaine, heroin, and more. To facilitate anonymity even further, transactions were conducted using Bitcoin. Over the space of 2 ½ years, 9.5 million Bitcoins changed hands (equivalent to $1.3 billion at the time), and Silk Road’s commissions totaled $85 million.

An image describing the OSINT framework.

Figure 5.8 OSINT Framework

Although it is difficult, or even impossible, to determine the identities of users online, once a user’s computer has been seized, law enforcement can gather some evidence about a user’s activity on Tor, which is derived from the Tor browser bundle. If the suspect’s computer is turned on, then some Tor browser activity can be retrieved from RAM or from the hiberfil.sys file—a file, which is a copy of RAM that is stored on the hard drive when the computer goes into hibernate mode on a PC. When performing a GREP search, the following statement can be used to find Tor sites, which possess a .onion extension:

http.{5,100}.onion

If the user used Tor in conjunction with Tails, the task becomes challenging. Tails (short for TheAmnesicIncognitoLiveSystem) is a live operating system that provides anonymity for the user using virtualized sessions with Tor. It can be run from a USB, SD card, or DVD on virtually any computer. Tor is just one type of Darknet. Another is I2P, which we will discuss next.

Invisible Internet Project

The Invisible Internet Project (I2P) is another tool available for secure communications and anonymous Internet surfing. This network uses public/private key encryption, and, like Tor, websites are hosted anonymously. On the suspect’s computer, the router.config file contains some information about I2P connectivity by the user. The investigator can also search for files with an .i2p extension on the suspect’s computer.

Freenet

Released in 2000, Freenet is a peer-to-peer (P2P) network. Freenet is a networked data store where users on that network can store files in an encrypted format on your computer. The user must be willing to dedicate a minimum of 256MB to the P2P community. The more space that you contribute, the faster your connection on the network (in theory). There are two modes of sharing and communication: “Opennet”, where the user is automatically connected with another host on the network, and “Darknet”, where the user manually selects a specific host on a network that they trust. Like Tor, the goal is to provide anonymity and protect freedom of speech. Like Tor, Freenet attracts pedophiles who wish to share images and videos of abused children.

SecureDrop

Although we sometimes associate Tor and other proxy services with hackers or criminals, there are situations where there is a need for these proxy services. For example, a journalist working with a corporate whistleblower or a political dissident may need to preserve anonymity for fear of death or oppression. Of course, whistleblowers can be tremendously controversial, as seen with Edward Snowden and Chelsea Manning. SecureDrop is an open source submission system, funded by the Freedom of the Press Foundation, which allows whistleblowers to anonymously communicate with journalists.

Dark Web Marketplaces

An investigation of Dark Web marketplaces typically begins with a search on the World Wide Web. One helpful resource for finding these marketplaces is TheDarkWebLInks (thedarkweblinks.com). Websites like pastebin.com can also be used to find these marketplaces. A user could enter the following search, for example:

site:pastebin.com ".onion" "hidden wiki"

The user can then limit the search to the previous week.

Dark Web sites can be scraped using Python or AppleScript, and then later analyzed by the investigator. Given that most of the listings on these marketplaces are narcotics, the investigator should have a dictionary of names of each drug or perhaps create one. For example, the drug fentanyl is also referred to as the following:

  • Apache

  • China Girl

  • Goodfellas

  • Jackpot

  • Tango and Cash

  • TNT

The Silk Road

The Dark Web has gained notoriety, in more recent times, because of the exponential growth of Dark Web marketplaces after the rise (2011) and fall (2013) of the Silk Road. The Silk Road was a Dark Web marketplace that facilitated vendors (often criminals) to surreptitiously sell drugs, counterfeit documents and other illegal items, anonymously to consumers, using Bitcoin as the crypto-currency of choice for buying and selling these illicit commodities. Bitcoin provides vendors, and their clients, with an extra layer of security on the Dark Web by leaving virtually no paper trail. This extraordinarily successful marketplace was devised and administered by Ross Ulbricht until he, and the Silk Road site, were taken down by the Federal Bureau of Investigation (FBI) and Homeland Security Investigations (HSI). This infamous marketplace was arguably so successful because of its enormous selection of drugs, which included new psychoactive substances. Many consumers were impressed by the professionalism of its customer support and the fact that they felt safe shopping there. Several other marketplaces have spawned since then, and different studies have analyzed how the number of vendors and sales, on Dark Web marketplaces, have evolved, while the majority of marketplaces have shown year-over-year increases.

PlayPen

In 2015, the FBI were responsible for taking down the PlayPen website, which was operating on the Dark Web. The website was responsible for distributing sexually explicit images of minors to its more than 200,000 subscribers. According to the FBI website, 25 producers of child pornography in the USA were prosecuted, 51 child abusers were prosecuted, 55 children were successfully identified or rescued in the USA and many more internationally. This take-down also led to 350 arrests in the USA and 548 international arrests. For some, the case was controversial because allegedly the FBI was in control of the PlayPen server for two weeks as they identified its subscribers. It appears that during these two weeks the FBI installed malware or a “NIT” (network investigative technique) onto computers that visited the PlayPen website, in an effort to identify visitors. Federal Prosecutor Annette Hayes wrote in a court filing that the government was forced to decide between disclosing its secret NIT and dismissing the case, and ultimately the Department of Justice decided to dismiss the case rather than disclose.

Operation Bayonet

In 2017, a multinational law enforcement operation, which included Homeland Security Investigations (HSI), Federal Bureau of Investigation (FBI), and Europol, shut down two of the most notorious Dark Web marketplaces: AlphaBay and Hansa.

Alexandre Cazes, a 26-year-old Canadian, who allegedly founded AlphaBay, was arrested. He never went to trial because he was found dead in his cell, several days after his arrest in Thailand. At the time that the site was shut down, it had approximately 400,000 users and around 369,000 listings. According to a government complaint, Cazes used his own personal email ([email protected]) account when contacting some of the marketplace users. Investigators also found records of Cazes’ assets, totaling over $23 million, on a computer.

In the case of Hansa, the Dutch police received a tip-off from some security researchers who had discovered a development version of the marketplace. Police subsequently discovered old IRC chat logs that detailed the full names and addresses of the Hansa site administrators.

Virtual Currencies

Fiat currency is legal tender that is backed by a government or governments. The U.S. dollar and the Euro are examples of fiat currency. There are literally hundreds of virtual currencies worldwide. In fact, some might say that most transactions are virtual because many of us use credit cards and use mobile payments for most financial transactions. What has changed is the recent introduction of crypto-currencies, whereby a non-state-sponsored currency is sent from a computer or a smart device to another user and the payment is only transferred once an algorithm (mathematical computation) is solved. This mathematical computation is solved by a middle-man, or miner. Subsequently, a public ledger of transactions, in theory, assures the integrity of the transaction. However, not all virtual currencies are crypto-currencies. For example, Second Life, which is a virtual world, allows users to buy buildings and artwork from other users using Linden dollars. There are many other virtual payment systems, including WebMoney, PerfectMoney, Yandex, and SolidTrust Pay, to name but a few.

CoinMarketCap (coinmarketcap.com) is a website that displays the market cap for crypto-currencies as well as a current quote for each currency.

Virtual currencies do carry tax consequences in different jurisdictions. For example, the Internal Revenue Service (IRS) in the United States, provides guidance about virtual currencies in Notice 2014-21. Those who facilitate the transfer of crypto currency, through mining (solving a mathematical algorithm), also have reporting requirements. These requirements are outlined by the Department of the Treasury, Financial Crimes Enforcement Network (FinCEN), in FIN-2014-R001 (www.fincen.gov/sites/default/files/administrative_ruling/FIN-2014-R001.pdf). For example, this would mean that a Bitcoin miner in the US would be deemed a money services business (MSB). Knowledge of these regulations may be important when prosecuting a suspect in the United States.

Bitcoin

Bitcoin is a crypto-currency, which is a decentralized, peer-to-peer, virtual currency. Bitcoin was invented by Satoshi Nakamoto, which is a pseudonym for an unknown identity. Satoshi means “wisdom” or “reason” and Nakamoto means “central source”. Some say that Bitcoin is a libertarian concept, given its decentralized, non-government system. Crypto-currencies, like Bitcoin, are not illegal in the USA, although they are sometimes used by nefarious actors given its innate anonymity. Bitcoin can be used to book flights, book hotels, order pizza, and buy many other products worldwide.

When a Bitcoin owner sends Bitcoin to another person, the currency is sent from a Bitcoin wallet to another Bitcoin wallet on a computer or on a smart device. A Bitcoin wallet stores a user’s Bitcoin currency. There are numerous Bitcoin wallets to choose from, and this wallet can be encrypted and password-protected. The wallet often uses SHA-256-bit encryption with a public and private key. The public key is displayed on blockchain.info. The wallet address is usually 34 alpha-numeric characters in length. Payment can also be made using a QR code. This QR code can also be used to buy or sell Bitcoin at special Bitcoin ATMs. An investigator will typically search for the wallet.dat file on a suspect’s computer or smartphone to find the Bitcoin wallet. WalletExplorer.com is one website that investigators can use to search for bitcoin addresses, wallet IDs, and other identifiers.

A Bitcoin miner will solve a mathematical problem before forwarding the Bitcoin currency to the recipient. In return, the miner will receive a small percentage of Bitcoin for solving the algorithm. Bitcoin mining requires tremendous computing power, and corporations are now dealing with the issue of some miners using their networks to mine Bitcoin.

The Blockchain (blockchain.info) is an electronic public ledger that keeps track of all Bitcoin transactions or blocks. Anyone can view these blocks in real time. However, determining who is responsible for each transaction is problematic without knowing the date and time of a transaction and knowing the identities of the people. Additionally, each block can be a combination of user transactions. To complicate matters further, a criminal can use a Bitcoin tumbler. A Bitcoin tumbler service is used to mix up Bitcoin transactions and make it ever harder to link Bitcoin to a specific transaction on the Blockchain. Thus, Bitcoin is the currency of choice for criminals on Dark Web marketplaces. Furthermore, many sellers operating on these marketplaces will convert the Bitcoin that they receive and quickly convert this crypto-currency into another crypto-currency, like Monero, Ethereum, or Dash. A criminal may exchange Bitcoin for Monero because Monero, unlike bitcoin, does not have a public ledger, and therefore examining these transactions are more challenging for investigators.

The Genesis Block was the first block in the Blockchain. It was created on or after January 3, 2009, and this Genesis Block can never be used again.

Venmo and Vicemo

There are numerous peer-to-peer payment services. Venmo (venmo.com) is one service that allows users to send money to other people, make deposits to a bank or even make purchases. Vicemo (vicemo.com) is a website that displays users who are allegedly buying drugs, alcohol, and sex on Venmo. Although the actual transactions should be verified, Vicemo is yet another potential source of open source intelligence for law enforcement.

Website Evidence

Websites change their content continuously, and sometimes by the time a computer forensics investigator becomes involved in an online investigation, a website of interest has changed.

Website Archives

Interestingly, there is a website that allows users to view a website at a particular point in history. At www.archive.org, the user can utilize the WayBackMachine utility (see Figure 5.9) to enter a URL and run a search to view historical snapshots of a website.

A screenshot of the www.archive.org website is shown.

Figure 5.9 Historical view of www.apple.com (on 8/19/04) using the WayBackMachine

Website Statistics

Sometimes an investigator will need to find statistics about a particular website. Netcraft (news.netcraft.com) provides a range of comprehensive statistics about a website, such as the IP address, how long the website has been active, the mailing address for the domain owner, the web server’s operating system, and many other helpful site statistics (see Figure 5.10).

A screenshot of the Netcraft statistics on the www.pace.edu website is shown.

Figure 5.10 Netcraft statistics on www.pace.edu

The Pirate Bay

The Pirate Bay (thepirate-bay.org) is a website that claims to be the world’s largest BitTorrent tracker. BitTorrent is a file-sharing protocol that facilitates the dissemination of large files. The website is notorious for sharing stolen confidential information, like the sensitive data stolen by a hacktivist group, AntiSecurity (or “AntiSec”), from Booz Allen Hamilton, which is a high-profile government security contractor. The group uploaded seven files containing 90,000 stolen military emails and passwords.

Alexa

Alexa (www.alexa.com/siteinfo) is another website that provides an array of statistics about various websites (see Figure 5.11).

A screenshot of the Alexa website is shown.

Figure 5.11 Alexa website

Background Searches on a Suspect

Online reconnaissance of personal information can vary greatly according to the needs of the investigator. Several online resources are available to assist in ascertaining the following personal information:

  • Personal information

  • Personal interests and membership in user groups

  • Contribution to blogs

  • Presence on social networking websites

  • Professional networks

  • Public records

  • Location

Finding Personal Information

Many websites provide basic information on individuals, like their address and telephone number. Most of these websites make money by selling the site users more extensive personal information under “premium” services, which can include information about an individual’s assets. Employers sometimes utilize the services of the following websites, and detectives also use them. It is important to note that searches by name generally provide multiple results, some of which are duplicates for the same person because old addresses may be listed.

Zaba Search

Zaba Search (www.zabasearch.com) enables the user to conduct a search based on a cellular telephone number (see Figure 5.12). The free service also provides a Google Earth map of the individual’s location.

A screenshot of the Zaba Search website is shown.

Figure 5.12 Zaba Search website

US SEARCH

US SEARCH (www.ussearch.com) is yet another online resource for finding personal information (see Figure 5.13). The results identify a list of relations, where possible. The value of this website is limited unless the investigator is willing to pay for additional information.

A screenshot of the US Search website is shown.

Figure 5.13 US SEARCH website

Searchbug

SearchBug (www.searchbug.com) is a free service on the Web that allows text messages to be sent to any cellular telephone free of charge (see Figure 5.14).

A screenshot of the Searchbug website is shown.

Figure 5.14 Searchbug website

Skipease

Skipease (www.skipease.com) allows the user to enter the zip code and a name to search for a person. Search results show additional information from sponsored websites (see Figure 5.15).

A screenshot of the Skipease website is shown.

Figure 5.15 Skipease website

Spokeo

Spokeo (www.spokeo.com) allows a user to search for individuals (see Figure 5.16). It also allows individuals to have their information removed from the site’s search engine. In addition, this site can help ascertain membership in social networking sites (although there may be charges associated with such searches).

A screenshot of the Spokeo website is shown.

Figure 5.16 Spokeo website

pipl

The pipl website (www.pipl.com) provides search results for other personal data, which includes websites like Been Verified or White Pages (see Figure 5.17).

A screenshot of the pipl website is shown.

Figure 5.17 pipl website

Numerous other personal data providers operate online, including PeopleFinders (peoplefinders.com) and Intelius (www.intelius.com), but most of these websites provide very limited information unless you are willing to pay for their premium services.

Personal Interests and User Groups

In June 2009, Swiss police announced that they had identified an Internet child pornography network that spanned 78 countries, involving more than 2,000 IP addresses. The police had received a tip-off from INTERPOL about a supposed hip-hop music website that was actually being used to disseminate videos of children being abused. The investigation led to numerous arrests and convictions. The Internet continually facilitates the dissemination of contraband, including illicit video and images of children. Pedophiles are also found in user groups, sharing images and ideas about how to groom children to succumb to their abhorrent demands. More importantly, once a user group is found, law enforcement can take down an entire network of pedophiles because these criminals are notorious for networking with like-minded deviants. Many of these pedophile networks pose as a legitimate service to disguise their underground activities. In one case, local law enforcement and the FBI uncovered a website that purported to assist abused children but was actually used to lure underage children.

Al-Qaeda has effectively used the Internet—and user groups in particular—to share its message of hatred and recruit new members. Law enforcement frequently visits these user groups to identify who they should be monitoring and ascertain whether there is any impending danger to the community at large. In 2011, it was claimed that 10,000 jihadist groups were using vBulletin, a group discussion platform. Today, these jihadist groups and numerous right-wing paramilitary groups spread their propaganda across thousands of channels on Telegram. Telegram is an application that allows users to communicate on a channel as a group, via a cellphone or via a web browser. Telegram can also be used to directly message individuals. It has become extremely popular with extremist groups because of its strong, proprietary encryption and the fact that the company does not facilitate law enforcement investigations. SocialNet and OIMonitor, from ShadowDragon (shadowdragon.io) are tools that can be used to copy data from Telegram.

User groups are generally a great source of personal data when it comes to profiling an individual’s behavior. There are many excellent resources that can speed up the work of an investigator.

The HootSuite social media management site (hootsuite.com) is an integration system that collates a variety of social media sites and is a valuable tool for investigators (see Figure 5.18).

A screenshot of the HootSuite website is shown.

Figure 5.18 HootSuite website

Social Searcher (social-searcher.com) is another helpful website for searching for social media accounts, using identifiers like usernames. Another similar website is knowem? (knowem.com).

Searching for Stolen Property

The Internet has made it easier for thieves to profit from their crimes, but the Internet has also made it easier to search for stolen goods. SearchTempest (www.searchtempest.com) is a website that allows the user to search for goods listed in classifieds from multiple websites, including eBay and Amazon. Of course, investigators also should check eBay and Craigslist directly. Searching these websites for stolen property is challenging, but a search can be effective for unique items.

LeadsOnline (leadsonline.com) is a service for law enforcement, eBay, and other resellers that provide a searchable database of stolen property.

Sometimes an investigator will want to establish ongoing surveillance for a suspect, which may include an associated telephone number or email address. Monster Crawler (www.monstercrawler.com), Search.com, and Google Alerts (www.google.com/alert) are effective for searching across multiple search engines and alerting an investigator to online activity by a suspect. It is also possible to use RSS feeds on eBay to be alerted to certain telephone numbers. This is especially important when seeking to identify drug dealers. Investigators can also use keywords to find drug users and dealers, with terms like 420YNOT, PIFF, and MJ. When searching for gang activity, there are keywords, like blood, crip, and cokeboys, that will assist the investigator.

Instant Messaging (IM)

Instant messaging has been transformed recently from merely providing text messaging to including more advanced video, VoIP, and video communications. Most computers come with an integrated webcam as standard, and data transfer rates have dramatically increased with improvements in broadband communications, thereby making video a more viable option. Therefore, applications like Skype, FaceTime, and Google Hangouts have become more prominent.

Internet Relay Chat (IRC) is a text-to-talk tool for communicating with other people online, and it is synonymous with instant messaging. IRC can be used for one-to-one communication or to chat with a group of people in a chat room. IRC can also be used to share files. In addition, the IRC protocol can be used maliciously to send commands to another computer, making it a zombie computer. Port 6667 is often associated with malware being sent to IRC users.

Mibbit is a website (see Figure 5.19) that provides a search engine for chat groups. The website monitors more than 6,000 IRC networks, and users can search these networks based on category.

A screenshot of the Mibbit website is shown.

Figure 5.19 Mibbit website

IRC is extremely important to law enforcement because many criminals use it to communicate with other criminals, co-conspirators, or potential victims. Terrorists, pedophiles, credit card thieves, and cyberbullies have all frequented chat rooms. From a computer forensics perspective, the most important source of information are the IRC servers, more than the computers using the service. However, investigators must act quickly because companies do not maintain their users’ chat logs for very long—perhaps seven days, at most, in many cases.

The importance of instant messaging evidence can be seen in the cyberbullying case of Ryan Halligan. On October 7, 2007, the middle school student committed suicide after being bullied online. Halligan and his friends conversed using AIM (AOL Instant Messenger). The boy’s conversations were inadvertently recorded and archived because Halligan had installed DeadAIM. DeadAIM was a freeware program, created by JDennis, to disable advertising and enable tabbed browsing. Ryan’s father discovered archived folders that DeadAIM had created on Ryan’s computer. The archived folders contained transcripts of conversations from AIM that revealed that a girl called Ashley pretended to like Ryan but later called him a loser. She pretended that she liked Ryan so that she could obtain personal information about him to later share and to embarrass him in front of his friends.

One issue that investigators have to deal with when investigating chat logs is the use of slang and acronyms. Table 5.1 defines some acronyms often used on IM and in cellphone text messages. Naturally, I have chosen to eliminate many acronyms that are inappropriate to print here, but those are readily available online.

Table 5.1 Common IM Acronyms

Chat Acronym

Meaning

BF

Best friend/boyfriend

BFF

Best friends forever

BG

Be good

CUL8R

See you later

def

Definitely

GF

Girlfriends

GGN

Gotta go now

huh

What?

K

OK

KPC

Keeping parents clueless

LOL

Laughing out loud

MOS

Mom over shoulder

NP

No problem

OMG

Oh my God

peeps

People

PIR

Parent in room

PLZ

Please

POMS

Parent over my shoulder

pron

Pornography

PRW

Parents are watching

pw

Password

r

Are

R U there?

Are you there?

RBTL

Read between the lines

RN

Right now

S2U

Same to you

sec

Wait a second

shhh

Quiet

srsly

Seriously

sup

What is up?

SWF

Single white female

TOM

Tomorrow

TOY

Thinking of you

TTFN

Tata for now

W8

Wait

WD

Well done!

XLNT

Excellent

XOXO

Hugs and kisses

XTC

Ecstasy

Note

Urban Dictionary (www.urbandictionary.com) is a great resource for acronyms and terms young people use today when communicating on social media.

Instant Messaging Evidence

Forensic tools, like FTK, allow the user to search for instant messenger chat logs on a suspect’s computer. Different instant messaging applications store user logs in different locations on a computer: registries, AppData folders, Program Files, and also in Documents and Settings.

The primary instant messenger protocols are IRC, ICQ, and XMPP. Attackers have targeted Internet Relay Chat (IRC) because of its use of unencrypted connections. IRC was historically used by AOL, although it now uses OSCAR (Open System for Communication in Realtime). ICQ was initially developed by Mirabilis but was then purchased by AOL, who subsequently sold it to Mail.ru Group in 2010. Extensible Messaging and Presence Protocol (XMPP), formerly known as Jabber, is an instant messaging protocol based on XML which was developed by the open source community.

Discord, with more than 250 million users worldwide, is yet another messaging service that is worth mentioning. An examination of the associated SQLite database renders a wealth of evidence, including photos and chats. Slack is also an important messaging platform, which is primarily used in a business environment.

AIM Phoenix

Numerous types of instant messaging applications are available. What complicates the job of a computer forensics investigator is that the file formats also vary. AIM messages are stored in an HTML format, while other services store messages as plaintext. By default, AIM messages are not stored automatically. These files can be recognized by their .aim file extension. AIM had the largest market share for instant messaging in North America.

Skype

Conversely, Skype text messages are saved by default. The bad news is that Skype files are not easily readable. Skype files can be recognized by their .dbb file extension. SkypeLogView is a freeware application that can read Skype log files. These log files include chat messages, incoming and outgoing calls, and file transfers. There are also other tools, including Skyperious and SkypeBrowser. Many other Skype applications, such as Skype Recorder, can automatically record your audio conversations. This is helpful to know because an undercover detective may need to communicate with a suspect using Skype and then could record the conversation. On a Windows computer, the location of Skype log files depends on the operating system version, but here is a good location to begin searching:

<root>:Documents and Settings[Username]AppDataRoamingSkype[Skype Username].

In Windows 10, you locate Skype chat logs here:

%localappdata%PackagesMicrosoft.SkypeApp_*LocalState<SkypeUserName>skype.db

On a Mac, you can access these logs here:

~/Library/Application Support/Skype/<SkypeUserName>/main.db
Google Hangouts

Google Hangouts, formerly known as GoogleTalk, has grown in market share as an alternative to Skype because it is bundled with many Android operating system devices, including tablets. Android is an operating system, owned by Google, which was developed for use on mobile devices, like cellular telephones and tablet personal computers. Google Hangouts evidence can be located in the Hangouts.json file, the contents of which can then be viewed using a JSON converter. JSONBuddy is one tool that a forensics investigator might consider using. Google Takeout is a tool, produced by the Google Data Liberation Front, which allows Google users of Google applications to export their data to an archive file for review and analysis. Investigators may also opt to use this tool.

Usenet Groups

Whether a detective is looking for a pedophile or a terrorist suspect, usenets are a good place to begin. Binsearch is a website (see Figure 5.20) that can assist investigators in locating particular groups or suspects on usenets. A usenet is an online distributed discussion board that allows users to post messages and read postings. Usenets, sometimes called newsgroups, first appeared in 1980 and are similar to bulletin board systems or Internet forums. Usenets groups are notorious for attracting pedophiles, political dissidents, terrorists, and others because there is no central host web server—thus, anyone can set up a web server for their own purposes.

A screenshot of the Binsearch webpage is shown.

Figure 5.20 Binsearch

Google Groups

Another way to search for a suspect on a usenet is by using Google Groups (see Figure 5.21). The website allows users to search the archives of millions of usenet postings over a number of years.

A screenshot of the Google groups webpage is shown.

Figure 5.21 Google Groups

Blogs

Monitoring blogs and accumulating information about a suspect on blogs is important. Moreover, there are some types of crimes that have a particular attraction for certain kinds of criminals. Pedophiles are notorious for their use of blogs and chat rooms as they seek to network with their own kind. Terrorists also frequent blogs and share their hatred and conviction to a particular cause with like-minded individuals.

In the wake of the Norwegian killing spree in 2011, police searched blogs to find out if there had been any postings by the murderer, Anders Behring Breivik. It is customary for police to search blogs after a serious crime has been committed, especially after a killing spree, to assess the motivation for an attack and, more important, ascertain whether the perpetrator had an accomplice.

You can use the Blog Search Engine (www.blogsearchengine.org, see Figure 5.22) to search for blog content.

A screenshot of the blog search engine shows the Blog search engine button, the logo of the site, and search bar named search term along with the search button. The links listed below the search bar, along with their icons are favorites, StumbleUpon, Del.icio.us, and Google Bookmarks.

Figure 5.22 Blog Search Engine

Militant Jihadists, especially Al-Qaeda and Islamic State (IS), have successfully used blogs to recruit and motivate sympathetic individuals. For example, Samir Khan was a prolific radical pro-Al-Qaeda blogger while he was a student at a community college in Charlotte, North Carolina. He was later killed, along with the notorious Al-Qaeda leader Anwar al-Awlaki, by a U.S. drone attack in Yemen.

Social Networking Websites

The proliferation of social networking websites means that they are a tremendous source of information to investigators. Access to sites like Facebook is ubiquitous. Moreover, users can quickly take photos with smartphones, like a Samsung Galaxy, and upload them within seconds. Those with a tablet or iPad can also quickly upload images or post comments.

Geodata

Geolocational data, available from websites like Facebook, Twitter, and Foursquare, has grown in importance. In other words, users of these services provide a tremendous amount of information about their location, either intentionally or unintentionally. For example, geographical positioning is often available by default from devices, like an iPhone. Today, this geographical positioning information is not enabled on the device by default. Smartphones running on the Android operating system also capture geographic positioning data.

Photographs taken with certain cameras, and also photographs taken with smartphones, like an iPhone, will contain a geotag if Location Services are enabled. A geotag is digital image metadata containing the latitude and longitude of the geographic location where the picture was captured.

Geolocational data can be associated with numerous applications, including Instagram, YouTube, Facebook, and Twitter. It is possible to subpoena MapQuest for the IP address associated with searches on its website.

Although geotags and geographic locational data can help law enforcement locate and apprehend wanted suspects and convicted criminals, criminals can also use geographic data to identify where individuals are located in order to stalk them or rob their homes. For example, a user posting tweets to Twitter or checking in to locations with Facebook can make it simple for a criminal to learn the routine of the individual and determine when the person has left home. Websites like Please Rob Me (pleaserobme.com) use social networking data to reveal where a person has been and where he or she currently is. Geofencing, which enables investigators to subpoena Google to determine users who have been in a specific area, is also an extremely important source of geolocation information that can narrow a pool of suspects.

Creepy (geocreepy.com) allows an investigator to find the location of a user based on geolocation data culled from Twitter, Facebook, and other social networking websites. While the tool is still available, it is not maintained with new updates.

Facebook

Facebook has more than 2.6 billion active users. A large number of these users access their profiles from mobile devices. Facebook has been used by identity theft criminals to profile their victims. Additionally, Facebook has been used by investigators to find and apprehend criminals on the lam and even by victims who post photos of home invaders. Conversely, it has been used by thieves to target homes, as a result of people posting status updates, like “I’m on vacation”.

Facebook can be used as a search engine for user profiles and content. For example, a search on Facebook could begin “Photos of people who live in…” or “People who live in <location> who like drugs”.

As mentioned, photos today contain geolocation information, so an investigator may be able to determine where a photograph was taken. In recent times, fugitives have been caught because photographs they posted on Facebook contained geolocation information (geotag) that ultimately led police to their place of hiding. Although Facebook now strips out geotag data from images that its users upload, prior to making the pictures available online, the company does keep a record of location data. Law enforcement can generally gain access to this geotag data with an appropriate search warrant.

Facebook also has thousands of groups in existence. Law enforcement has embraced Facebook groups, especially in Canada. A group called Canada’s Most Wanted Criminals can be found on Facebook and is dedicated to making the public aware of known criminals who are wanted by the law. The Royal Canadian Mounted Police (RCMP) uses Facebook extensively to raise public awareness of its initiatives and crime in general. The RCMP on Prince Edward Island (PEI), Canada’s smallest province, has used Facebook to keep track of where kids are having parties during prom season and to prevent kids from drinking and driving. PEI RCMP also maintains an AMBER Alert Facebook profile to help in quickly locating abducted children. AMBER is the acronym for America’s Missing: Broadcasting Emergency Response, although the name is in memory of Amber Hagerman, a 9-year-old who was abducted and murdered in Texas.

Incidentally, an organization called Wireless AMBER Alerts enables users to sign up and assist with missing children (https://amberalert.ojp.gov/resources/wireless-emergency-alert). The FBI has also developed the Child ID app, where guardians can register information about their children and promptly send those details to law enforcement in time of emergency.

The FBI has also used Facebook to try to apprehend wanted criminals and has even developed an iPhone application called FBI Wanted. The FBI has used Facebook, Twitter, and YouTube to raise public awareness about its most wanted criminals, and some credit can be attributed to social media in the apprehension of James “Whitey” Bulger, the Bostonian mobster on the lam for 16 years. A YouTube video was posted by the FBI, who targeted Bulger’s girlfriend—Catherine Greig (see Figure 5.23).

A screenshot shows the FBI YouTube video of Catherine Greig (Bulgar's girlfriend). It shows the headshot of Catherine Greig, with her name and reward of 100,000 dollars listed beside it, on a background of an FBI stamp.

Figure 5.23 FBI YouTube video of Catherine Greig (Bulger’s girlfriend)

Twitter

Twitter can be a marvelous resource for helping an investigator re-create the events that led up to a crime or the behavior of the criminal. The site enables users to tweet (upload a message) to show where they are and what they are doing. Some Twitter accounts also have been used to evade law enforcement; drivers in California were using Twitter to alert other drivers about sobriety checkpoints.

The URL twitter.com/explore will enable an investigator to find out which users are discussing a particular topic on Twitter. A search can be specific to a location: “near:boston lego”.

There are a number of Twitter analytics tools that use Twitter’s APIs. An Application Programming Interface (API) is a computer program that facilitates the interaction between two computer applications or programs.

Foller.me is a tremendous tool for Twitter analytics. It details a user’s connections, topics, and URLs, as well as the mode of posting tweets; for example, postings were performed using an iPad. Foller.me provides information about a user and when he or she joined. This tool also provides highlights of topics discussed by that user. The number of tweets and retweets are noted for a user. The website followerwonk.com allows a user to log into his Twitter account and analyze his followers, getting information about where they are located and when they tweet. Another tool, TweetDeck (tweetdeck.twitter.com), facilitates real-time tracking of Twitter accounts in a convenient manner.

MySpace

MySpace is a social networking website that is very similar to Facebook but that has many fewer users. A user can create a profile and befriend individuals and groups. The average user tends to be younger than a Facebook user, and music is an important part of the site.

Professional Networks

Investigators often think about using social networking websites to profile a suspect or apprehend a criminal. However, they should also consider searching through professional networking websites.

LinkedIn

More than 460 million professionals use LinkedIn (www.linkedin.com; see Figure 5.24). Information about a user’s network of friends and professional colleagues can also be gleaned by searching the site. An investigator can also determine an individual’s interests, based upon their membership of the many professional groups and organizations available. LinkedIn facilitates the use of other social networking services, like Twitter, as well. A user can link a LinkedIn account to a Twitter account and can post tweets through LinkedIn. When searching for user profiles, it is important to remember that a user can identify who has viewed a profile. Therefore, a search can be conducted through google.com and it is preferable to search using a sockpuppet profile.

A screenshot of the LinkedIn webpage is shown.

Figure 5.24 LinkedIn

In addition, these websites can also provide information about professionals and the organizations that they are associated with:

Public Records

Many different public records containing personal information are available on the Web. Some of these records involve legal actions and are profiled here.

BRB Publications, Inc.

BRB Publications (www.brbpub.com; see Figure 5.25) provides detailed background information on individuals for a fee. The requested report includes information like criminal offenses, bankruptcies, liens, real estate records, and business ownership.

A screenshot of the BRB Publications website is shown.

Figure 5.25 BRB Publications website

Using Internet Protocol Addresses

An Internet Protocol (IP) address is a 32-bit number that uniquely identifies a host on the Internet using Internet Protocol Version 4 (IPv4) or a 128-bit number for IPv6. In Chapter 8, we will discuss IP addresses in greater detail. The host can be a client computer, a web server computer, or even a shared resource like a printer. Luckily, users do not need to remember the numbers associated with an IP address.

Websites like WebToolHub.com allow you to enter an IP address in text format and convert it to its numeric value, and vice versa.

A dynamic IP address is an IP address assigned by an Internet service provider (ISP) each time one of its clients connects to the Internet. A static IP address is an IP address that an ISP assigns for a fixed period of time or permanently.

Numerous websites provide information to investigators about the location of a suspect or even a victim. Here is a list of IP lookup websites:

Another tool with more expanded capabilities than some of the tools listed here is CentralOps.net. This website provides a tremendous wealth of information about domains.

Searches Using Metadata

Fingerprinting Organizations with Collected Archives (FOCA), from Eleven Paths (www.elevenpaths.com), is a tool that uses metadata hidden within documents to locate similar documents across the Web. The tool can be used to identify if documents have been leaked from a company and identify websites where they are located. This link analysis tool is very effective in searching for files across the Internet with similar metadata, including the same author.

Locating a Suspect

Creepy (www.geocreepy.com) is a free tool that integrates with the Application Programming Interface (API) of social media applications, including Twitter. The tool can be used to track where a person of interest has been based on their social media postings, while their location services function is enabled on their mobile device.

Using Router Forensics

As previously noted, finding a live system and retrieving evidence from the computer while it is still switched on is very important. Investigating a computer while it is turned on is called live forensics or triage forensics. A greater amount of Internet activity is generally available from a live system because investigators can retrieve the contents of RAM. The same is true with routers. Unfortunately, many investigators focus on retrieving the suspect’s computer and neglect the potential evidence available from a router.

Default router passwords can be found online at websites such as RouterPasswords.com. Law enforcement can access a suspect’s router directly with a search warrant or consent and can document the settings by printing each page to a PDF (perhaps by using a tool such as CutePDF, at cutepdf.com) or by taking screenshots.

Law Enforcement Access to Personal Information

A review of the events on September 11, 2001, found an information gap in intelligence gathering that might have prevented the terrorist attacks. In other words, intelligence agencies and law enforcement were not sharing information about persons of interest and criminal suspects. In the wake of the 9/11 attacks, the Department of Homeland Security (DHS) was formed. Although the system is not perfect, local, state, and federal law enforcement agencies have better access to information, and with less bureaucracy.

Local Law Enforcement

Each local authority maintains its own databases of known criminals. In New York, there is a center for maintaining this information, known as the Real Time Crime Center. The Real Time Crime Center (RTCC) is a data warehouse developed and used by the New York Police Department’s more than 35,000 police officers to track and apprehend known and suspected criminals. The databases maintain criminal records, criminal complaints, arrests, and telephone calls made to 911 and 311 services. Police officers even record the nicknames and tattoos of suspects that are arrested and store this information in their databases at the RTCC. The agency has also developed a sophisticated geographic information system (GIS) that includes satellite imagery to help officers quickly find and apprehend suspects.

Federal, State, and Local Information Exchange

Fusion centers across the United States rely on both government databases and commercial data repositories to collect and retrieve personal information. Entersect is a commercial data broker that at one time claimed that it maintained billions of records on virtually all Americans. Entersect has provided these personal records to fusion centers. As previously noted, fusion centers are a joint initiative of the Department of Homeland Security (DHS) and the Department of Justice (DOJ).

The DHS is responsible for Homeland Security Information Network State and Local Intelligence Community Interest (HSIN-SLIC), which is used for disseminating sensitive but non-classified intelligence between federal, state, and local authorities. The Homeland Security Data Network (HSDN) was a network developed by Northrup Grumman and contains top-secret, classified, and unclassified information. Fusion centers can also rely on intelligence gathered by the National Counterterrorism Center (NCTC), a government agency that is part of the Office of the Director of National Intelligence (ODNI) and gathers top secret information related to counterterrorism efforts.

The primary mission of fusion centers is to facilitate information gathering and dissemination at the federal, state, and local law enforcement levels, and to provide that intelligence in hopes of both preventing crimes and solving criminal offenses. A Terrorism Liaison Officer (TLO), employed by a fusion center, has the primary responsibility to facilitate and coordinate information sharing among numerous agencies. This function involves coordinating record management systems (RMS), which are local databases often found at the local law enforcement level. Local, state, and federal law enforcement also have access to other databases, like the Department of Motor Vehicles (DMV), which provides investigators with information relating to driving violations and other personal information. TLO online services are available for free to law enforcement but can be accessed by those in the private sector for a fee. Interestingly, companies like Jiffy Lube also maintain extensive personal records.

Founded in 1967, the National Crime Information Center (NCIC) is an extremely important crime database utilized by law enforcement nationwide to apprehend fugitives, recover stolen goods, identify terrorists, and locate missing persons. According to the FBI, by the end of 2015, NCIC contained more than 12 million active records and averaged 12.6 million active transactions per day. The database can be used to identify a sex offender, locate a gang member, or find out whether a seized gun was stolen. During a routine traffic stop, police can access NCIC to identify any warrants against the driver or see if the car has been reported stolen. Of importance to digital forensics investigators are stolen electronics, like computers, tablets and smartphones, which can often be found in the FBI’s database (NCIC).

Other government agencies have their own proprietary networks with searchable databases, like the FBI’s secure FBINET. Threat And Local Observation Notice (TALON) is a secure counter-terrorism database that the U.S. Air Force has maintained since the 9/11 terrorist attacks.

International Databases

INTERPOL is the most prolific international law enforcement agency that gathers and disseminates intelligence on known and suspected criminals. It maintains international databases on everything from stolen art, to suspected terrorists, to lost travel documents, to child abuse victims. MIND/FIND (Fixed Interpol Network Database and Mobile INTERPOL Network Database) are online and offline databases maintained by INTERPOL to protect borders by enabling travel document searches.

Access to Personal Data in the European Union

The European Union (E.U.) has developed privacy laws that have drastically reduced the amount of personal data that companies can maintain and make available to third parties. This is in contrast to the United States, where privacy laws are much more relaxed in terms of personal data collection and storage. Concerted efforts are underway to improve the exchange of personal data between the United States and the European Union, but there are major differences in how information is collected, from airline passenger data to hotel registration information. These differences can severely hamper the work of collaborative international investigations. E.U. online privacy laws, which have reduced the amount of personal information collected, limit the amount of digital evidence available to investigators. You can learn more about this, and the General Data Protection Regulation (GDPR), in Chapter 7, “Admissibility of Digital Evidence”. In July 2020, a European Court of Justice ruling invalidated a commonly-used E.U.-U.S. sharing agreement, referred to as Privacy Shield.

Online Crime

The Internet is a tremendous resource for thieves to obtain personal information and carry out their attacks. Criminals can find new ways to mask their identity, social engineer, and bilk people and corporations out of millions of dollars. Identity theft and payment card fraud has grown to unprecedented levels as a result of the Internet.

Identity Theft

In terms of gathering personal information, a criminal can use a variety of the online websites, noted earlier, to determine someone’s telephone number, address, and net worth by paying for an in-depth search. Moreover, a criminal can view a person’s residence (using a site like Zillow, www.zillow.com) and quickly decide on a plan to rob that house, if necessary, through the use of Google Earth.

Hackers do not even need to work out a user’s password today but can simply reset a password by answering challenge questions from the email service provider. For example, a challenge question might be to enter the city where you were born or to enter your pet’s name. The answers to these questions are frequently available from a person’s profile on Facebook or similar social networking website. Alaska Governor Sarah Palin had her Yahoo! email account hacked, and her personal emails were subsequently posted online. Apparently, the email account hack did not require much technical skill; the password was reset using Palin’s date of birth, zip code, and information about where she met her husband—questions easily found through Google searches. Two-factor authentication (2FA) has helped to mitigate some of these vulnerabilities. For example, an authorization code may be texted to the user’s smartphone before a password can be reset.

Access to user accounts, like online banking and email accounts, frequently occurs through keystroke loggers. Law enforcement officials also can use these keystroke loggers to capture criminals. An example of this was the capture of Alexey Ivanov and Vasily Gorshkov, notorious hackers who plied their trade in extortion. The FBI ultimately brought down the hackers through the use of a keystroke logger. Chapter 13, “Case Studies”, provides more details about this case.

Credit Cards for Sale

Credit card theft is a huge problem worldwide. The Internet has enabled credit card theft to grow. Crime in some areas has moved from the streets to the Web. Simply type the word “fullz” into any search engine, and you can see a list of websites that offer stolen credit card numbers for sale, including the CVV number that so many believe provides security to the user. A stolen credit card number can cost as little as $1.50. Many credit cards have been stolen from individuals because of malware like Zeus. Zeus was a Trojan horse virus that used a keystroke logger to steal bank and credit card information.

Electronic Medical Records

In August 2014, Community Health Systems, a general hospital healthcare provider, reported that 4.5 million healthcare records were stolen. Mandiant (now called FireEye) believed that Chinese hackers were responsible. The Health Information Technology for Economic and Clinical Health Act (HITECH Act) was enacted as part of the American Recovery and Reinvestment Act. This act mandated the move from paper records to electronic health records (EHR). Although this act was designed to increase efficiency in the healthcare industry, moving so many records to a digital format and storing them on a network has enticed hackers to attack healthcare providers. This mandate required the movement of all medical records to an electronic format by January 2015. The act cost billions of dollars, and, unfortunately, compliance was often the primary focus rather than computer security.

The growth in this type of crime has been phenomenal—for one clear reason: while a stolen Social Security or credit card number can sell for as little as $1, a patient EHR can sell for $20 or more on the black market. An EHR can fetch a larger sum of money because it contains more personally identifiable information (PII), which criminals can then use for a whole range of fraudulent activity.

Counterfeit and Counter-proliferation Investigations (CPI)

The are many types of investigations that can involve examining shipping information. For example, trade in counterfeit goods or counter-proliferation investigations (CPI) can benefit from this type of information. Counter-proliferation refers to efforts to prevent the export of weapons and proprietary technologies to foreign nations or terrorist groups. Port Examiner (portexaminer.com) is an online resource that allows an investigator to examine U.S. Customs records. VesselFinder (vesselfinder.com) is a website that allows you to track shipping vessels just about anywhere across the globe. Marine-Traffic (marinetraffic.com) allows an investigator to track active and decommissioned marine vessels across the globe. Google Street View and Google Earth could be used to take a closer view of shipping ports and warehouses to gather reconnaissance. When investigating counterfeit goods on a website, many unauthorized websites and counterfeit listings use photos of real products and images taken from legitimate websites. There are websites, like TinEye (tineye.com), that can perform a reverse image lookup to show where that photo image appears on other websites.

Cyberbullying

Cyberbullying continues to be a problem worldwide and has received a great deal of media attention, particularly in the high-profile cases of Ryan Halligan, Phoebe Prince, Megan Meier, and Tyler Clementi. Prosecutors must rely heavily on digital evidence from online sources from the victim’s computer, suspects’ machines, and Web service providers. Unfortunately, the laws in many jurisdictions have yet to be updated to criminalize cyberbullying.

Social Networking

As discussed earlier in this chapter, law enforcement, criminals, and companies can use social networking to find out about individuals. Social networking websites have also been a hotbed of criminal activity. Facebook, for example, has been used to launch phishing apps (applications). One example is a fraudulent notification about a comment to a user’s post. The hyperlink in the notification may then lead to a phishing website.

Another case highlights the problems associated with social networking websites. Recently, a college resource company posted phony high school class profiles on Facebook. The phony profiles showed a high school student from a class looking to connect with other students from the same graduating class. A marketing company was setting up the profile so it could use the connections to market colleges to high school students.

The U.S. Department of Defense has been of two minds about whether to permit military personnel access to social networking sites. On one hand, social networking can boost troop morale, enabling those stationed abroad to maintain contact with family and friends. On the other hand, military secrets could potentially be leaked to the public. In Israel, a military raid was scrubbed after an Israeli soldier posted information about the raid on Facebook.

The social networking site Twitter has also been in the news. In 2010, the Twitter accounts of U.K. cabinet ministers were hacked. Similarly, during the Russia–Georgia conflict over Ossetia in 2008, Twitter accounts were hacked and the website of the Georgian president was subjected to a distributed denial-of-service attack (DDoS).

Online criminal activity is no longer simply motivated by money or just a challenge of wits. Online criminal activity has changed in recent times to include religious propaganda by groups, like Al-Qaeda and Islamic State, and is also politically charged with the emergence of hacktivists like Anonymous, AntiSec, and LulzSec. Junaid Hussein, a British-born hacker, rose to the highest ranks of the Islamic State and carried out a global cyber-attack that compromised the identity of U.S. military personnel.

Capturing Online Communications

Computer forensics investigators often need to capture online content either in real time or retroactively. The content captured online can be HTML pages, the IP address of a computer on the Internet, voice, video, and instant messages. Some tools are well-suited to capturing online content and communications, including AXIOM.

Magnet Forensics is the developer of AXIOM. The tool is popular with investigators because it forensically acquires Internet artifacts from computers and smart devices. The tool can effectively parse out cookie data, websites visited, and temporary Internet files.

Using Screen Captures

Many different types of screen capture software are available. Whether you are using a personal computer or an Apple Mac, capturing what is displayed onscreen is relatively simple. On a PC, there is a Print Screen button. On a Mac, this is a little more involved.

Windows 10 now includes the Snipping Tool, which can easily capture an entire screen, a smaller window, or a small portion of a screen. In the Search bar, on your Windows Desktop, simply type snip and then press Enter to open the application.

Using Video

Investigators will often come into contact with video content on the Internet. It is important to possess a tool that can capture that video content.

Investigators today do not need to view videos in their entirety to understand the content, especially if the video is particularly graphic and disturbing. Autopsy Video Triage enables an investigator to view thumbnail images instead of streaming the video. The investigator can predetermine the intervals for creating thumbnails. An additional advantage of creating thumbnails is that the images can simply be copied to the report instead of having to create DVDs of the video for the defense and prosecution.

SaveVid.org is yet another tool to capture online video from YouTube and other hosts in a variety of video file formats.

Real Player is available for free from real.com. What sets it apart from other tools is how user-friendly it is. When viewing a video, you do not have to open the application; you can simply move the mouse over the right top corner to find the button Download This Video.

A number of other video recording tools are available, including WM Recorder (wmrecorder.com).

Viewing Cookies

A cookie is a text file sent from a web server to a client computer for the purposes of identification and authentication. A persistent cookie is a text file identifying an Internet user that is sent to the browser and then stored on a client computer until the expiration date stored in the cookie is reached. Generally, persistent cookies are used to record websites that a user visits and are spyware. Nevertheless, cookies are not malware. A session cookie is a text file sent to a browser that is stored on a computer and used to identify and authenticate an Internet user; it is removed when the user’s browser is closed. Online banks use session cookies to authenticate users during a browser session, when requests are made, to prevent man-in-the-middle attacks. If a hacker attempts to take over an online session, the web server should be able to know that the intruder is impersonating the legitimate user because the intruder does not have a cookie issued by the bank. An analogy is an adult paying to enter a county fair and receiving a green wristband, the equivalent of a cookie. If a teenager attempts to buy beer (equivalent to a hacker) and has a yellow wristband, the vendor (equivalent to a web server) would deny service to the individual. Yet another type of cookie is a flash cookie. A flash cookie, also referred to as a Local Shared Object (LSO), stores data on a user’s system and is pushed out by websites running Adobe Flash. These cookies can be used to track a user online.

Microsoft Edge stores cookies randomly in a variety of folders, in an effort to fend off hackers. Examiners working with systems running Microsoft Vista, Windows 7/8/10 can find cookies in <root>Users<username>AppDataRoamingMicrosoftWindowsCookies

The cookie text file clearly identifies the website(s) that the user has visited, as shown in this example:

__qca P0-170859135-1366509561547 livefyre.com/ 2147484752 559795968 30403767
3611057200 30293555 * __utma 218713990.303107170.1366509562.1366509562.13665095
62.1 livefyre.com/ 2147484752 3363037824 30440406 3612307241 30293555 * __utmb
218713990.1.10.1366509562 livefyre.com/ 2147484752 130586240 30293560 3612307241
30293555*__utmz 218713990.1366509562.1.1.utmcsr=msn.foxsports.com|utmccn=(referral)
|utmcmd=referral|utmcct=/nhl/story/new-york-islanders-beat-florida-panthers-041613
livefyre.com/ 2147484752 2471084672 30330268 3612307241 30293555*

In a move to improve system security further, Internet Explorer 9.0.2 randomly assigned an alphanumeric name to each cookie text file. The contents of the cookie files remained the same, although investigators could no longer associate the cookie filename with websites.

Using Windows Registry

An investigator can determine the websites a user has visited by accessing Windows Registry. The following Registry location displays websites that the user has visited:

HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerTypedURLs

From here, the investigator can export the registries as a text file and then open the entries with an application like Notepad. Of course, other applications, like AccessData’s Registry Viewer application, provide a comprehensive way to access file registries.

A history of websites visited can also be retried from a hidden file called index.dat. The file index.dat is a collection of files created by Microsoft Internet Explorer and contains websites visited and Internet searches. The file also includes cookies and cache saved on a user’s computer. The file actually contains a large amount of historical Internet information, and the good news for investigators is that the file is linked to the user who has logged in; the user has very little control over how the file stores information. According to the Microsoft website, the file never increases in size, even when the user deletes Internet history and clears the browser cache, and it is never deleted.

The index.dat database of files is not readable without the use of a special viewer. The following exercise introduces you to a free application that enables you to view the contents of index.dat.

Edge Web Browser

Microsoft’s Edge was introduced with Windows 10 as a replacement for Internet Explorer. This new browser claims to use less battery life than competitors, like Firefox, and also blocks more phishing websites than its competitors, like Chrome. The WebCacheV01.dat file contains web browsing artifacts for Microsoft Edge. Browsing history files for both Internet Explorer (IE) and Edge, on a Windows 10 computer, can be found here:

<volume>Users<UserName>AppDataLocalMicrosoftWindowsWebCache

Summary

The rise of social networking websites has provided investigators with a wealth of information about suspects. Pedophiles and other criminals use the Internet as a resource to carry out their criminal activities. Therefore, it is important for an investigator to know the user groups frequented by these criminals and also be aware of online resources that can mask an investigator’s identity while working undercover.

The contents of RAM on a suspect’s computer can be a valuable source of evidence for retracing an individual’s Internet activity. Nevertheless, there are other sources of evidence. For example, the index.dat file is a database of files that document websites an individual visits; on a Windows 10 computer the corresponding file is WebCacheV01.dat. Windows Registry can also provide invaluable information about a user’s Internet activity. Some Internet communication services, like Skype, save text messages on a user’s computer by default. Yahoo! Messenger stores messages on a user’s computer using a simplistic encryption algorithm. It is important for an investigator to be familiar with the digital footprint left by instant messaging applications and know the tools available to view these files.

With the rise of the Internet, there has been a rise in online crime. Online criminal activity includes the possession and distribution of child exploitation images, identity theft, stolen credit card retailing, cyberbullying, and social networking scams.

Online investigations require the investigator to acquire digital evidence from a variety of sources, including computers (victims and suspects), mobile devices, websites (HTML documents), web server logs, IP addresses, digital images, and sound and video content.

Key Terms

AMBER: Acronym for America’s Missing: Broadcasting Emergency Response, although the name is in memory of Amber Hagerman, a 9-year-old who was abducted and murdered in Texas.

Android: An operating system owned by Google that was developed for use on mobile devices like cellular telephones and tablet personal computers.

Application Programming Interface (API): A computer program that facilitates the interaction between two computer applications or programs.

Bitcoin: A crypto-currency, which is a decentralized, peer-to-peer, virtual currency.

Bitcoin miner: Solves a mathematical problem before forwarding the Bitcoin currency to the recipient.

Bitcoin tumbler: A service used to mix up Bitcoin transactions and make it harder to link Bitcoin to a specific transaction on the Blockchain.

Bitcoin wallet stores a user’s Bitcoin currency.

BitTorrent: A file-sharing protocol that facilitates the dissemination of large files.

Blockchain: An electronic public ledger that keeps track of all Bitcoin transactions or blocks.

cookie: A text file sent from a web server to a client computer for the purposes of identification and authentication.

counter-proliferation: Efforts to prevent the export of weapons and proprietary technologies to foreign nations or terrorist groups.

DeadAIM: A freeware program created by JDennis to disable advertising and enable tabbed browsing.

dynamic IP address: An IP address assigned by an Internet service provider (ISP) each time one of its clients connects to the Internet.

Extensible Messaging and Presence Protocol (XMPP): Formerly known as Jabber, an instant messaging protocol based on XML that was developed by the open source community.

Fiat currency: Legal tender that is backed by a government or governments.

flash cookie: Also referred to as a local shared object (LSO). Stores data on a user’s system and is pushed out by websites running Adobe Flash. These cookies can be used to track a user online.

Genesis Block: The first block in the blockchain.

geotag: Digital image metadata containing the latitude and longitude of the geographic location where the picture was captured.

Homeland Security Data Network (HSDN): A network developed by Northrup Grumman that contains top-secret, classified, and unclassified information.

Homeland Security Information Network State and Local Intelligence Community Interest (HSIN-SLIC): A network that is used for disseminating sensitive but non-classified intelligence between federal, state, and local authorities.

index.dat: A collection of files generated by Microsoft Internet Explorer that contains websites visited and Internet searches.

Internet Protocol (IP) address: A 32-bit or 128-bit number that uniquely identifies a host on the Internet.

Internet Relay Chat (IRC): A talk-to-text tool for communicating with other people online.

MIND/FIND (Fixed INTERPOL Network Database and Mobile Interpol Network Database): Online and offline databases maintained by INTERPOL to protect borders by enabling travel document searches.

National Counterterrorism Center (NCTC): A government agency that is part of the Office of the Director of National Intelligence (ODNI) and is responsible for gathering top secret information related to counterterrorism efforts.

National Crime Information Center (NCIC): An extremely important crime database utilized by law enforcement nationwide to apprehend fugitives, recover stolen goods, identify terrorists, and locate missing persons.

online proxy: A computer used to mask a user’s identity so that the third party cannot recognize the IP address of the originating communication.

persistent cookie: A text file identifying an Internet user that is sent to the browser and then stored on a client computer until the expiration date stored in the cookie is reached.

Real Time Crime Center (RTCC): A data warehouse developed and used by the New York Police Department’s more than 35,000 police officers to track and apprehend known and suspected criminals.

record management systems (RMS): Local databases often found at the local law enforcement level.

session cookie: A text file sent to a browser and stored on a computer in order to identify and authenticate an Internet user. It is removed when the user’s browser is closed.

Tails: A live operating system that provides anonymity for the user, through virtualized sessions with Tor.

Terrorism Liaison Officer (TLO): A person employed by a fusion center whose primary responsibility is facilitating and coordinating information sharing among numerous agencies.

Threat And Local Observation Notice (TALON): A secure counterterrorist database maintained by the U.S. Air Force since the 9/11 terrorist attacks.

Tor: Free open source software and an open network that enables a user to surf the Internet with anonymity.

undercover investigation: A process used to acquire information without an individual or a suspect knowing the true identity of the investigator.

usenet: A distributed online discussion board that allows users to post messages and read postings.

WebCacheV01.dat: A file containing Web browsing artifacts for Microsoft Edge

Zeus: A Trojan horse virus that uses a keystroke logger to steal bank and credit card information.

Assessment

Classroom Discussions

1. In this chapter, you have learned that numerous online resources can assist investigators in gathering personal information about a suspect. Conversely, the abundance of personal information available online may be providing criminals with information that can assist them with identity theft, burglary, and other serious crimes. Some countries have sought to provide greater protection for consumers and limit the amount of personal information available online. Is there enough protection for consumers and their personal information?

2. Say that you are a detective, who has been asked to investigate a website suspected of selling counterfeit Microsoft and Adobe applications. What would you do to find out about the website and document the content and website statistics for your investigation report?

3. There is a benefit to investigators to have access to geotags and other geolocational information to locate and apprehend suspects and convicted criminals. Conversely, the availability of this information puts many individuals in danger of being stalked or robbed. Is greater public awareness more important than the digital evidence that it provides investigators?

Multiple-Choice Questions

1. Which of the following can be used to share large files with other Internet users?

  1. BitTorrent

  2. XOR

  3. TALON

  4. Zeus

2. IRC is the acronym for which of the following?

  1. Internet Recipient Chat

  2. Instant Response Communication

  3. Internet Response Communication

  4. Internet Relay Chat

3. Jabber is the old name for an instant messaging protocol that is now called what?

  1. DeadAIM

  2. iChat

  3. XMPP

  4. XML

4. Which of the following is an operating system developed by Google for use on mobile devices?

  1. Linux

  2. Android

  3. iOS

  4. Windows

5. Which of the following includes the longitude and latitude of where a digital photograph was taken?

  1. Geotag

  2. LatLongTag

  3. Metatag

  4. Cookie

6. AMBER is the acronym for which of the following?

  1. Alert Motorists Broadcast Emergency Relay

  2. America’s Missing: Broadcast Electronic Relay

  3. Automatic Monitoring: Broadcasting Emergency Response

  4. America’s Missing: Broadcasting Emergency Response

7. What is the name of the unique identifier assigned by an internet service provider (ISP) each time one of its clients connects to the Internet?

  1. Session cookie

  2. Persistent cookie

  3. Dynamic IP address

  4. Router

8. Which of the following is the name of the Trojan horse virus that uses a keystroke logger to steal bank and credit card information?

  1. Poseidon

  2. Zeus

  3. Apollo

  4. Hermes

9. Which of the following could be considered spyware?

  1. Persistent cookie

  2. Session cookie

  3. Cache

  4. Dynamic IP address

10. Which of the following is a file that contains a history of websites visited using Microsoft Edge on a Windows 10 personal computer?

  1. WebCacheV01.dat

  2. IE.dat

  3. Index.dat

  4. WebCache.dat

Fill in the Blanks

1. A(n) __________ is the process used to acquire information without the individual or suspect knowing the true identity of the investigator.

2. __________ (short for theamnesicincognitolivesystem) is a live operating system that provides anonymity for the user using virtualized sessions with Tor.

3. __________ currency is legal tender that is backed by a government or governments.

4. Sometimes referred to as newsgroups, a(n) __________ is an online distributed discussion board that allows users to post messages and read postings.

5. The Real Time __________ is a data warehouse developed and used by the New York Police Department’s more than 35,000 police officers to track and apprehend known and suspected criminals.

6. The __________ Security Data Network is a network developed by Northrup Grumman that contains top-secret, classified, and unclassified information.

7. A __________ cookie is also referred to as a local shared object (LSO). It stores data on a user’s system and is pushed out by websites running Adobe Flash.

8. A(n) __________ Programming Interface is a computer program that facilitates the interaction between two computer applications or programs.

9. A(n) __________ address is a 32-bit or 128-bit number that uniquely identifies a host on the Internet.

10. A(n) __________ cookie is a text file sent to a browser that is stored on a computer and used to identify and authenticate an Internet user; it is removed when the user’s browser is closed.

Projects

Conduct a Criminal Investigation

You are a computer forensics investigator in local law enforcement who has been assigned to an identity theft case. The suspect has set up a website that purports to be a technology blog, but trusted users can log in to a secure area of the website and buy stolen credit card numbers.

Detail how you would conduct your investigation in terms of profiling the suspect, working undercover, and capturing incriminating evidence online.

Perform Online Reconnaissance

Use the online resources documented earlier in this chapter to report on the accuracy of the information listed about you. Provide details about the type of information you find. You do not need to provide personal details; just note the type of information available. You do not need to pay for any services for this exercise.

Write an Essay about the Silk Road

Prosecutors in the case against Ross Ulbricht relied on a combination of traditional investigative techniques and digital evidence. Write an essay detailing the use of digital evidence in this case.

Investigating a Local Incident

Imagine that you are traveling home one evening and the streets, close to your home, are blocked by law enforcement and emergency responders. There is no information from media outlets, on the radio or on television, about what is happening in the area. Write an essay about how you could use OSINT to (1) determine the street and/or building where the incident is taking place and (2) identify the type of emergency.

Write an Essay about Consumer Privacy Online

Over the years, legislators have faced challenges, in the US Capitol, with introducing legislation that protects the privacy of Internet users. The revelations about the data collection practices of Cambridge Analytica, leveraging Facebook’s consumers, caused consternation and prompted some to reconsider privacy legislation. Some have argued that the European Union and other countries take online privacy more seriously than the United States.

Write an essay comparing consumer privacy protection for Internet users in the United States compared to the European Union and other countries. Include references to legislation being discussed or passed, especially the General Data Protection Regulation (GDPR).

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.174.55