Home
Help

Globe 100

Latest News
Latest business news
Latest high-tech news

Market Watch Dow:
10787.80 (+132.65)
NASDAQ:
2564.98 (+74.87)
S&P 500:
1301.93 (+20.50)
More stock quotes

Columnists
Steve Bailey
Marla Brill
Simson L. Garfinkel
Kenneth Hooker
Charles A. Jaffe
David Warsh

Columns
Boston Capital
Plugged In
Simple Interest
The Globe 100

Links
Technology
Check out Boston. com's Tech Center

Personal Finance
Financial calculators, financial advice, stock quotes and more

Boston.com business section, including Emerging Business

Yellow Pages
Alphabetical listings, courtesy Boston.com's Yellow Pages Directory
Banks
Brokers
Credit and Debt Counseling
Credit Unions
Exchanges
Financial Planners
Insurance
Investment Bankers
Investment Securities
Loans
Mutual Funds
Retirement Planners
Savings and Loans

Sections Boston Globe Online: Page One Nation | World Metro | Region Business Sports Living | Arts Editorials

Weekly
Health | Science (Mon.)
Food (Wed.)
Calendar (Thu.)
At Home (Thu.)
Picture This (Fri.)

Sunday
Automotive
Cape & Islands
Focus
Learning
Magazine
New England
Real Estate
Travel
City Weekly
South Weekly
West Weekly
North Weekly
NorthWest Weekly
NH Weekly

Features
Archives
Book Reviews
Columns
Comics
Crossword
Horoscopes
Death Notices
Lottery
Movie Reviews
Music Reviews
Obituaries
Today's stories A-Z
TV & Radio
Weather

Classifieds
Autos
Classifieds
Help Wanted
Real Estate

Help
Contact the Globe
Send us feedback

Alternative views
Low-graphics version
Acrobat version (.pdf)

Search the Globe:

Today
Yesterday

Search the Web
Using Lycos:


Fleet Bank
The Boston Globe OnlineBoston.com Boston Globe Online / Business
[ Send this story to a friend | Easy-print version | Add to Daily User ]

PLUGGED IN
The tricks, tools of a computer sleuth

Gumshoes must tread carefully, but wealth of clues can be found

By Simsom L. Garfinkel, 08/12/99

omputer forensics is a relatively new and little-known branch of computer security. Like other kinds of forensics, computer forensics are a set of techniques for collecting and explaining evidence - especially evidence that might be gathered during a criminal investigation. What makes it different is that instead of examining fingerprints or DNA, a computer forensics specialist focuses on data left inside a computer system.

The inside of a computer, it turns out, is a surprisingly difficult place from which to collect evidence. One reason is that computers have a lot of places where evidence can hide. My desktop machine has 128 megabytes of RAM and more than 20 gigabytes of hard disk space, roughly the equivalent 3.5 million pages of typewritten text. In this much space it can take a trained investigator days or even weeks to search it effectively.

A second issue complicating the task: It is easy to damage or destroy evidence in the process of looking for it.

Finally, there is the problem of willful destruction: to keep themselves from getting caught, many computer criminals will delete files, modify programs, and otherwise alter a computer system after they have broken into it. To be successful, a computer forensics specialist needs to be able to step around this damage and still find what he or she is looking for.

Last week, a pair of flamboyant computer security experts, Dan Farmer and Wietse Venema, taught a one-day course on computer forensics at IBM's Yorktown Heights' research laboratory. Called ''Murder on the Internet Express,'' the course discussed techniques for analyzing a computer system to find telltale signs left behind by someone using a computer. They discussed common tactics computer criminals use to destroy evidence, and why these approaches frequently fail. And finally, the pair previewed some new forensics tools they plan to release tomorrow.

There are three primary ways in which computer users leave tracks in a computer systems. The first kinds of tracks are in the log files - records most computers keep that detail the machine's activities. Log files are most common when you use services on the Internet. When you call up the Internet from a home PC, a record of your phone call is kept in a log file. Likewise, whenever you send electronic mail or view a Web page, that information is also recorded. If an investigator can get access to the log files, they can be used to paint a comprehensive picture of what the person has been doing on line.

A second way is to look at files on the computer itself. Both the UNIX and the Windows operating systems keep very detailed records of when each file was created, last modified, and last read. By examining these times for every file on the computer, an investigator can create a very detailed picture of what a person did.

A third way is to bypass the computer's files entirely, and instead just examine the hard drive. That's because information written to the hard disk stays there until it is overwritten. Because computer users almost never fill their hard drives all the way, it's common to find information on the disk that was deleted long ago.

One of the main uses of computer forensics today is figuring out what has happened after someone has broken into a computer system. With good tools, an analyst can determine when the break-in happened, how the intruder obtained access, and which files were examined or modified. Forensics tools can also be used to inspect the system to see whether any traps were left behind. For example, the attacker might have left a ''tripwire'' or ''timebomb'' that would automatically wipe out the system. Alternatively, the attacker might have created a ''back door'' so he or she could gain covert access at a later time.

Forensics also can be used by police to analyze computers seized during a criminal investigation. Earlier this summer I learned that the FBI has been using disk recovery tools such as Power Quest's Lost and Found to assist in child pornography investigations.

In one case they were able to see how a suspect had installed a copy of America Online, downloaded some questionable images, and then apparently deleted both the images and the AOL program. A few months later, he allegedly did the same thing again - installing AOL, downloading images, and deleting it all again. Lost and Found let the investigators almost literally look into the past, because parts of the AOL program and the downloaded images were still on the suspect's hard disk, even though they had been technically ''deleted.''

Programs like Lost and Found and Norton Utilities, which combine forensics with data recovery, have been available for the Windows platform for years. The big news at IBM last week was that Farmer and Venema are releasing a series of forensics programs for the UNIX and Linux operating systems. Called ''The Coroner's Toolkit,'' the tools make it much easier to conduct a detailed examination of a UNIX system. That's important, since UNIX is the dominant operating system among Internet servers and, thanks to Linux, is becoming more common on desktop machines as well.

Of course, computer forensics tools can also be used to spy on employees and other legitimate computer users. Indeed, says Farmer, ''Spying and abuse are now easier than ever. It is pretty trivial to find out what people using computers are up to.''

Those are strong words, especially considering their source. Three years ago Farmer and Venema released a security auditing program called ''SATAN'' on the Internet, to the dismay of many computer specialists. SATAN generated hostile responses because it could be used by system administrators to secure computers and by attackers to break into systems. It remains to be seen whether or not The Coroner's Toolkit will generate a similar response.

The Coroner's Toolkit is scheduled to be released tomorrow. Look for it on line at www.fish.com/security/forensics.html

Technology writer Simson L. Garfinkel can be reached at plugged-in@simson.net

This story ran on page C4 of the Boston Globe on 08/12/99.
© Copyright 1999 Globe Newspaper Company.

[ Send this story to a friend | Easy-print version | Add to Daily User ]


Click here for advertiser information
Fleet Bank

© Copyright 1999 Globe Newspaper Company
Boston Globe Extranet
Extending our newspaper services to the web
Return to the home page
of The Globe Online