রবিবার, ১৮ নভেম্বর, ২০১২

The Real Cyberforensics Used To Snoop On Petraeus (And You ...

Anonymous, throwaway Google accounts aren?t so anonymous, it turns out. Neither is a James Bond-like ?digital dropbox.? Here?s a look into the forensics the FBI used to discover David Petraeus?s affair and how it could be used to investigate any email account, anywhere.

In an increasingly weird and tangled affair, Former CIA director David Petraeus, Marine General John R. Allen, Paula Broadwell, Jill Kelley, an unnamed FBI Agent, and others all used various anonymous accounts and message-masking techniques pioneered by terrorists and teens alike. They thought they were communicating with each other with discretion and secrecy.

But FBI investigators found their way through almost all of it.

That?s because they?re practiced in the field of cyberforensics?detailed Internet and technology detective techniques used every day all around the world. When it comes to the vast majority of activity by Internet users, it?s amazingly easy to trace fake email addresses and anonymous blogs back to their owners. Or, put another way, if the director of the CIA?s undercover ops can be cracked, so can yours. Here?s how.

Cyberforensics firms regularly show up on retainer or on the payroll of law enforcement, lawyers of all stripes, lobbyists, and even intelligence agencies. Every activity on the Internet leaves identity breadcrumbs in the form of activity logs, cookies, GPS activity from mobile phones, and even logs of camera activity and keyboard use secretly copied from targets? computers. Given enough manpower hours, cyberforensics experts can reconstruct the tiniest minutiae of any phone or computer owner?s lives. Law enforcement agencies and intelligence agencies also retain their own in-house cyberforensics experts.

ACCORDING TO THE ACLU?S CHRIS SOGHOIAN, BROADWELL AND PETRAEUS MAY HAVE THOUGHT LEAVING UNSENT MESSAGES IN DRAFT FOLDERS IN THEIR ANONYMOUS THROWAWAY GMAIL ACCOUNT WOULDN?T LEAVE A DIGITAL PAPER TRAIL. THEY WERE WRONG.

The FBI gained access to anonymous Gmail accounts traced to Petraeus and Broadwell through a law, more than 25 years old, that gives law enforcement carte blanche to snoop in email accounts. Provisions of 1986?s Stored Communications Act (SCA) allow ?government entities? to access email records in storage for less than 180 days ?if there is reasonable cause to believe a crime has been committed.? For email records that are older than 180 days, a warrant is required. Using the SCA, FBI investigators were able to obtain access to emails Broadwell and Petraeus wrote via Gmail over the past six months. Google?routinely discloses government queriesinto Gmail?s archives, and the Electronic Frontier Foundation and others have?raised concerns over the SCA, an email bill written back in the halcyon days of Compuserve and GEnie.

Both Petraeus and Broadwell were savvy enough to use Gmail accounts with fake names. But while Petraeus knew his way around email, he wasn?t savvy enough for Broadwell and him to take precautions that could have hidden any incriminating emails. Neither used identity-obscuring VPNs and rerouting solutions such as the?Tor Project, which could have hindered the FBI from tracing, for instance, Broadwell?s fake email account back to her North Carolina home. Apart from Tor, commercially available end-user solutions such as?Hotspot Shield?andLogMeIn Hamachi?obscure the origination points of email messages with varying levels of success. It is important to note that many of those services, especially those that use American servers, may keep IP address logs that are accessible to investigators or hackers.

Darren R. Hayes, the head of Pace University?s Computer Information Systems program and a computer forensics expert, tells?Fast Company?that there are numerous ways for anonymous email accounts to escape detection, or to at least make the process much harder. Commercial services such as?GuerillaMail?and?Mailinator?offer disposable, throwaway email addresses whose data can be held on foreign servers outside the reach of the American government; VPNs also make tracing emails much harder.

IF PETRAEUS OR BROADWELL USED AN EMAIL CLIENT LIKE OUTLOOK TO SEND MESSAGES FROM THEIR FAKE GMAIL ACCOUNTS, THAT LIKELY DID THEM IN.

Spy techniques used by Petraeus and Broadwell to hide their missives did?not?work. According to the ACLU?s Chris Soghoian, Broadwell and Petraeus may have thought?leaving unsent messages in draft folders in their anonymous throwaway Gmail account?wouldn?t leave a digital paper trail. They were wrong. The James Bond-style technique, leaving draft messages in a ?digital dropbox,? didn?t stop Gmail from retaining identifying metadata?data appended to files or messages or other forms of information.

Metadata varies for email depending on the service on which it originates. For instance, Yahoo Mail metadata differs from Gmail, which differs from Outlook servers. Metadata also varies depending on the client software users send their messages from; using metadata, a cyberforensics specialist can find out whether a message sent from a Gmail address was written in Gmail.com, Apple?s mail client on the iPad or Mac, or from a user?s Outlook client. In some cases, these services add identifying information that could lead investigators to the sender?s real name and physical location.

If Petraeus or Broadwell used an email client like Outlook to send messages from their fake Gmail accounts, that likely did them in. According to Digital Trends? Andrew Couts,?messages sent from Gmail.com strip identifying IP address metadata, while Gmail messages sent via Outlook, Thunderbird, or Apple?s Mail clients all append IP addresses to an email message?s metadata. Using an IP address, it is easy to extrapolate the physical location from which an email was sent. Gmail.com, while not including an IP address, attaches routing information that indicates a message?s journey through the digital ether and can provide important clues to the original sending location. Similar metadata is appended to image files posted on Facebook, Twitter, Picasa, Flickr, and other popular image-sharing sites, making the lives of cyberforensics specialists incredibly easy when investigating cases. Smartphones routinely attach the GPS coordinates where a photograph was taken and even standard digital photographs include identifying information about the make and model of the camera, Hayes said.

Once FBI investigators traced Broadwell?s throwaway email account to her North Carolina home and physical locations that matched her travel schedule, the agency gained access to her primary email accounts. As of press time, it appears they used information obtained there to confirm her and Petraeus were conducting an extramarital affair. The spy chief?s involvement in a relationship outside of his marriage, according to press reports, was considered a blackmail risk.

SMARTPHONES ROUTINELY ATTACH THE GPS COORDINATES WHERE A PHOTOGRAPH WAS TAKEN.

The FBI, NSA, local police departments, and other government entities can all access email account records and histories via sending requests to Google, AOL, and others. These accounts customarily request all information associated with an IP address?meaning that all the email addresses from a household, whether involved in an investigation or not, are culled by law enforcement.

Cyberforensics, though not regularly discussed in the press, are a booming industry. ?These days, virtually all cases involve digital evidence. Whether the case is counterterrorism, kidnapping, drugs, or a white collar crime, digital evidence is key,? AccessData?s Erika Lee tellsFast Company. AccessData, which sells computer forensics software to investigators parsing electronic records and corporations tracing the perpetrators of hacking attacks, is part of a field that does everything from parse the physical locations Facebook status updates were posted from to uncovering the Chinese cybercafes where multimillion dollar attacks on banks were launched from.

In the end, it?s important to remember that?as?The Week?s Marc Ambinder?put it?this whole story began ?based on the complaints of one person in Tampa who knew a bunch of generals.? Based on those complaints, the FBI was able to gain easy access to multiple email addresses, including that of the head of the CIA, without a warrant. Meanwhile, investigators outside the government such as hackers and criminals can always break into anonymous email accounts and trace them back to their owners fairly easily. The important cybersecurity takeaway from?L?Affaire Petraeus? For those anonymous emails you absolutely don?t want traced back to you, send them via Gmail.com. And use Tor.

Or, you know, don?t cheat.

Source: http://www.sytech-consultants.com/blog/2012/the-real-cyberforensics-used-to-snoop-on-petraeus-and-you?utm_source=rss&utm_medium=rss&utm_campaign=the-real-cyberforensics-used-to-snoop-on-petraeus-and-you

toulouse france ny jets ny jets the situation tim tebow jets katy perry part of me video photoshop cs6 beta

কোন মন্তব্য নেই:

একটি মন্তব্য পোস্ট করুন