10 July 2011
US Secret Service National Computer Forensics Institute
News report:
http://www.msnbc.msn.com/id/43678351/ns/technology_and_science-security/
How the Secret Service stalks cyber criminals
Some juicy details of embedding and infiltration are divulged at hearing
By Neal Ungerleider, Fast Company
A top Secret Service official ended up spilling details about federal anti-hacker
strategy at a relatively obscure federal hearing in Alabama. In testimony
given to the House Committee on Financial Services, Assistant Director Alvin
T. Smith revealed just how involved the Secret Service is in federal
investigations into cyber crime ... and told some extremely cool stories
in the process.
Smith was a witness at a field hearing called, simply, "Hacked Off: Helping
Law Enforcement Protect Private Financial Information."
At the naughtily named hearing, Smith detailed how the Secret Service has
infiltrated underground websites (including both hacker and cyber fraud sites)
and bulletin boards. A 2008 investigation into criminals who stole credit
and debit card numbers from Dave & Buster's, OfficeMax, Sports Authority
and Barnes & Noble customers was largely accomplished thanks to accounts
by undercover feds on illegal websites.
Undercover Secret Service agents then, with the assistance of Turkish and
other international investigators, traced the sale of stolen American credit
card numbers to Russia and Eastern Europe.
While The Guardian has
previously
revealed that the Secret Service has infiltrated hacker websites, this
is one of the first times a federal official has spoken on the record about
the extent of law enforcement penetration.
Website: http://www.ncfi.usss.gov
Overview and History
The National Computer Forensics Institute (NCFI) was established in 2007
through a partnership initiative between the Department of Homeland Security,
the United States Secret Service, the Alabama District Attorneys Association,
the State of Alabama, and the city of Hoover. This state-of-the-art facility
will provide state and local law enforcement officers the training necessary
to conduct basis electronic crimes investigations, respond to network intrusion
incidents, and conduct computer forensics examinations.
This facility offers state and local law enforcement officers, prosecutors,
and judges a variety of cyber related courses based on the Secret Service
electronic crimes training model. All NCFI training courses are made available
through funding from the Department of Homeland Security. All travel, lodging,
and per diem expenses are paid by the Department of Homeland Security and
courses are provided at no costs to attendees. Upon completion of training,
attendees are issued all computer equipment, hardware, software, manuals,
and tools necessary to conduct electronic crimes investigations and forensic
examinations.
This innovative facility and strategic partnership will substantially enhance
law enforcement efforts to suppress the continually evolving and increasing
number of electronic crime cases affecting communities nationwide.
[Sample Course]
Online Social Networking
OSN is a four-day course designed to provide investigators with the ability
to act as an investigator to a variety of social media cases. Investigators
will gain hands-on experience with online social media investigations, email
investigations, basic networking, legal issues, and search and seizure. The
course combines instructor-led discussions and practical exercises to teach
methodologies and techniques used during investigations involving digital
evidence of social media with traditional investigative techniques.
After completing this course, students will:
-
Be able to use social media to further investigations.
-
Understand the significance of different social media.
-
Install and configure different social media software.
-
Understand the tools necessary to document social media investigation.
-
Understand the basic drafting of court orders and search warrants.
-
Understand basic computer networking.
-
Complete a group practical exercise.
-
Know legal issues applicable to digital evidence for social media investigations.
The Network Intrusion Training training course (NITRO):
http://cryptome.org/NITRO.zip
(21MB)
|