Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Internet Your Rights Online

Alternative Browsers Impede Investigations 720

rbochan writes "Allegations in an article over at CNET propose that alternate browsers such as Firefox and Opera impede law enforcement and investigation efforts because they "use different structures, files and naming conventions for the data that investigators are after", which can "cause trouble for examiners.""
This discussion has been archived. No new comments can be posted.

Alternative Browsers Impede Investigations

Comments Filter:
  • Browser concerns (Score:3, Interesting)

    by bigwavejas ( 678602 ) * on Thursday September 01, 2005 @04:39PM (#13458007) Journal
    It seems to me this is the least of their problems. Finding the potential wrongdoer is much more difficult than actually locating data on their computer. With anonymous surfing methods Tor [eff.org] and drive encryption technologies TrueCrypt [truecrypt.org] I would almost consider an unencrypted/ unsecure system a "non-issue."

    /search/*.jpg, *.html, *.gif, *.etc...

    Firefox and Opera may use a different method of file structure/ naming, but they *do* have a fundamental process and that process does not vary from system to system.

  • Um, Duh? (Score:5, Interesting)

    by NorbMan ( 829255 ) * on Thursday September 01, 2005 @04:40PM (#13458024) Journal
    From TFA:
    Firefox and Opera store information on typed URLs in a different file than IE does, and the files are somewhat tough to decipher

    You would think since Firefox is open-source, it would be a trivial matter to determine the format of the cache files by examining the source code.

  • In a word: (Score:3, Interesting)

    by commo1 ( 709770 ) on Thursday September 01, 2005 @04:43PM (#13458068)
    Good.

    That's one of the reasons I use Firefox, Thunderbird, Sunbird, etc...

    Security by obscurity is not essentially valid, but it can be useful.

    The government can't force people to organize their thoughts or ideas written down on legal pads with sworn oaths as to dates & times, why should ANY information be handed to them. I run may trace eliminators, for this purpose. I encrypt my file system. If this is going to slow them down or prevent them from gathering evidence, it's done it's job. Just another reason not to buy into the Microsoft way. (I'm not being facetious, it's true: Microsoft has an agenda to be on the side of the law, they HAVE to be lobbying quietly to get stuff like this out and laws passed to enforce it.)
  • by Anonymous Coward on Thursday September 01, 2005 @04:44PM (#13458089)
    http://www.theregister.co.uk/2004/01/28/a_visit_fr om_the_fbi/ [theregister.co.uk]

    A visit from the FBI
    By Scott Granneman, SecurityFocus
    Published Wednesday 28th January 2004 13:05 GMT

              [snip]

    I teach technology classes at Washington University in St. Louis, a fact that I mentioned in a column from 22 October 2003 titled, "Joe Average User Is In Trouble [securityfocus.com]". In that column, I talked about the fact that most ordinary computer users have no idea about what security means. They don't practice secure computing because they don't understand what that means. After that column came out, I received a lot of email. One of those emails was from Dave Thomas, former chief of computer intrusion investigations at FBI headquarters, and current Assistant Special Agent in Charge of the St. Louis Division of the FBI.

    Dave had this to say: "I have spent a considerable amount in the computer underground and have seen many ways in which clever individuals trick unsuspecting users. I don't think most people have a clue just how bad things are." He then offered to come speak to my students about his experiences.

    I did what I think most people would do: I emailed Dave back immediately and we set up a date for his visit to my class.

    It's not every day that I have an FBI agent who's also a computer security expert come speak to my class, so I invited other students and friends to come hear him speak. On the night of Dave's talk, we had a nice cross-section of students, friends, and associates in the desks of my room, several of them "computer people," most not.

    Dave arrived and set his laptop up, an IBM ThinkPad A31. He didn't connect to the Internet - too dangerous, and against regulations, if I recall - but instead ran his presentation software using movies and videos where others would have actually gone online to demonstrate their points. While he was getting everything ready, I took a look at the first FBI agent I could remember meeting in person.

              [snip]

    Dave had some surprises up his sleeve as well. You'll remember that I said he was using a ThinkPad (running Windows!). I asked him about that, and he told us that many of the computer security folks back at FBI HQ use Macs running OS X, since those machines can do just about anything: run software for Mac, Unix, or Windows, using either a GUI or the command line. And they're secure out of the box. In the field, however, they don't have as much money to spend, so they have to stretch their dollars by buying WinTel-based hardware. Are you listening, Apple? The FBI wants to buy your stuff. Talk to them!

    Dave also had a great quotation for us: "If you're a bad guy and you want to frustrate law enforcement, use a Mac." Basically, police and government agencies know what to do with seized Windows machines. They can recover whatever information they want, with tools that they've used countless times. The same holds true, but to a lesser degree, for Unix-based machines. But Macs evidently stymie most law enforcement personnel. They just don't know how to recover data on them. So what do they do? By and large, law enforcement personnel in American end up sending impounded Macs needing data recovery to the acknowledged North American Mac experts: the Royal Canadian Mounted Police. Evidently the Mounties have built up a knowledge and technique for Mac forensics that is second to none.

              [snip]
  • by baryon351 ( 626717 ) on Thursday September 01, 2005 @04:44PM (#13458094)
    It's the silliest thing I've read about non-IE browsers, and how they're BAD since I read this one. [danaquarium.com]
  • by BJZQ8 ( 644168 ) on Thursday September 01, 2005 @04:48PM (#13458141) Homepage Journal
    This is NOT a joke. I have dealt with some state police "computer forensics" people that were little more than a rookie cop with a "Computer Forensics for Dummies" book under their arm. It was THAT bad. They used undelete utilities and such to get a file off of a ZIP disk. Wowee. They are given virtually unlimited budgets and permission to buy practically any computer item, all in the name of security...but you can't change the fact that they are LEJA majors, not CS majors.
  • by The Master Control P ( 655590 ) <ejkeeverNO@SPAMnerdshack.com> on Thursday September 01, 2005 @04:51PM (#13458179)
    I find it hard to believe that trained professionals couldn't figure out how to read other formats for cookies. Or find out where the cookies go. As a previous poster said, gimme a break... Heaven forbid they take my computer. They'd have to figure out what cryptic command starts the desktop, and which of 3 browsers (Firefox, Konqueror, Lynx) I was using. After all that, they'd find out I've got no cookies except for about 5 sites :)

    Call me paranoid, but I think that the police like MSIE because they know that if push comes to shove, that MS will gladly cooperate and help in exchange for certain 'favors' likely involving no use of non-MS products or the dropping of the next antitrust lawsuit. On the other hand, FOSS developers are far less likely to agree (and will never, ever give the government backdoors to their software).

    In other words, it's easier to manipulate one fat, greedy corporation than millions of individuals.
  • by 99BottlesOfBeerInMyF ( 813746 ) on Thursday September 01, 2005 @04:58PM (#13458264)

    God help these 'professionals' if a suspect's computer happens to run Linux

    I remember reading a while back that when the FBI seizes a macintosh computer they ship it to the Canadian Mounties for data recovery because the FBI does not know how to recover data from macintosh computers. I don't know if that is true, but I would not be surprised.

  • by JohnFluxx ( 413620 ) on Thursday September 01, 2005 @05:03PM (#13458313)
    While this is true, the computers they can't deal with get sent out to private companies, who _are_ good. Either way they get the data - just the cheap or expensive way.
  • by TodLiebeck ( 633704 ) on Thursday September 01, 2005 @05:11PM (#13458413) Homepage
    The one thing that has always bothered me about such "forensic analysis" in computer crime investigation is the fact that it is fairly trivial for a competent developer-type person to artificially create this information and tell any story s/he wants. If someone wanted to frame a person for a computer crime they could even develop a trivial piece of malware that would actually visit target sites from a person's computer over time, such that even the ISP's and target host's logs would confirm the user's activity. Such a program could be configured to activate only when a user was at a computer. The only technical challenge to creating such a piece of software would be finding a means to install it, but it's common knowledge that there are a great variety of means (both social and technical) to accomplish this step.

    It would be my guess that it would be fairly difficult to convince a jury that the real criminal was an "evil program" running behind the scenes. The only real hope for a defendant in such a scenario would be to find some flaw in the malware program to suggest its existence (for example, if it activated when the defendant was out of town and his/her spouse was using the machine).

    It concerns me that somewhere, someday, someone might go to prison as a result of the forensic analysis of his/her computer when in fact the criminal act was committed by a third party solely for the purpose of landing his/her victim in prison.
  • by arkanes ( 521690 ) <arkanes@NoSPam.gmail.com> on Thursday September 01, 2005 @05:18PM (#13458488) Homepage
    I don't know how gullible juries are in Arizona, but seriously, can't you exploit this?

    "Officer MacGruff, are you an expert in computer forensics? Can you summarize your education? Can you describe your methodology?"

    This reminds me of the whole speed camera thing in AU, where they lost a major court case because, given 8 weeks, they couldn't find an expert willing to testify on the relability of hashes as MACs. Not because the testimony wasn't believed, mind, but that they didn't have any.

  • by HTH NE1 ( 675604 ) on Thursday September 01, 2005 @05:36PM (#13458680)
    Remember the ruling that if you advertise your software as having the function of violating copyright you are liable for contributory infringement?

    Now extend that to advertising your software as creating barriers to law enforcement investigations. Conspiracy to obstruct justice in an investigation to which national security is attached?

    The one thing they should not do is promote this as a feature of their browsers!

    Meanwhile, with the open source browsers, this should give ideas to people who do want to hide this information to modify the source to make the information even more obfuscated and how to make attempts to use the browser itself to extract the information cause the data to self-destruct. The more unique your build, the better.
  • by grahamsz ( 150076 ) on Thursday September 01, 2005 @05:50PM (#13458805) Homepage Journal
    In some states, parole for sex offenders can require that they don't look at pornography.

    Their parole office will drop by periodically and check their PC. They have some sort of forensic software that does this.

    I've heard some jurisdictions require that you only run Windows on your computer as a condition of your parole. Logically this translates to going back to prison for owning a knoppix cd.

    There simply aren't the resources to train all parole officers in computer forensics, expose them to various obscure operating systems, or to perform regular offline analysis of offenders hard drives.

    The resources are (probably) there for big cases, but when there are probably close to half a million sex offenders on parole - it's just not practical.
  • by major.morgan ( 696734 ) on Thursday September 01, 2005 @05:58PM (#13458872) Homepage
    I teach both networking and computer security. In my classes I have had personal experience with "Computer Crime Investigators". Most of them are officers who have gone to $20-50,000 (not exaggerating) worth of training in a few weeks that they don't understand, got a few "law enforcement only" utilities (Knoppix has better tools) that they can run. They are no better at understanding technology than your average office user. If they can't click a button in their tools and have all of the evidence discovered, analyzed and spit out in a non-technical report - they generally won't get much. Add a sprinkle of encryption and they are baffled. There are those who are quite skilled, but as with most things - they are few and far between.

    For example: I have a friend who works in IT for a law enforcement agency. He constantly gets calls from their computer forensics specialist asking for help on why his station won't boot. Usually it's because he overwrote his boot sector while ananyzing a drive (I don't understand either).

    Unfortunately the prevailing opinion is that teaching a street cop technology is easier than teaching a tech the intracate details of law enforcement. The higher ups don't realize that any IT persons job is basically an daily investigation. I think the answer is to pair up the two, but again, none of these agencies has asked me.
  • by zerblat ( 785 ) <jonas.skubic@se> on Thursday September 01, 2005 @06:17PM (#13459040) Homepage
    The problem is that Mozilla uses Mork [erys.org] to store the history, and Mork databases are more or less impossible [livejournal.com] to extract usable data from. So you don't really have much of a choice ;)
  • by XchristX ( 839963 ) on Thursday September 01, 2005 @06:21PM (#13459079)
    In Linux, run a standard installation of KDE. navigate to any file/directory using konqueror, then right click and goto the 'actions' context menu entry, and click on "encrypt & archive file/folder'. It does so using kgpg, KDE's frontend to gpg. You can use a passphrase to encrypt it if you want. That's pretty easy, and can't be crached ab initio by trojans or anything. So why do I have to use windoze?
  • A theory... (Score:3, Interesting)

    by Jodka ( 520060 ) on Thursday September 01, 2005 @07:18PM (#13459455)

    After looking over the site [htcia.org], I suspect that "The High Technology Crime Investigation Association (HTCIA)" is a front; it is really a for-profit money-making venture, not a legitimate professional association, as it presents itself. For a genuine professional association, they make too strong an effort to convince us that's what they are. It would work like this: A few guys collect the attendance and membership fees, keeping a big profit for themselves. The fees are paid by governments. The conference attendees, mostly law enforcement officials, receive some stupid advice. Masquerading as a professional organization instead of a for-profit business creates good will, helping them to fleece taxpayers.

    The content of the training seminars is especially suspicious. Really, how easy is it to uncover the "secret" history files of "alternative" web browsers? I timed myself, and it took me about 90 seconds using Google to work out some good keywords and find the answer. See the first link [holgermetzger.de] in my google search [google.com].

    Something else suspicious about this professional training: Because the source code for Firefox is available for free to the public, which is not the case with Internet Explorer, it should be easier, not more difficult, to uncover where and how Firefox logs history.

  • by Anonymous Coward on Thursday September 01, 2005 @07:33PM (#13459541)
    Why dont they make the tool do the search, make the tool look at when the url history was reset.

    Browser A (IE): Used regularly for normal web surfing. Maintains a long history of "safe" websites.

    Browser B (Firefox): Used occaisionally for "unsafe" web surfing. Maintains no cache at all. If asked, you installed it "to check it out, but I never use it".

    (#27 on the list of things you learn when you have nosy, computer-literate roommates and/or a nosy, computer-literate SO who doesn't like pr0n.)
  • by 5um0F1 ( 695976 ) on Thursday September 01, 2005 @07:40PM (#13459594)
    I spent 2 years doing electronic crime analysis, and as all law enforcement, the pay and conditions suck. Lack of resourses and lack of understanding the requirements to constantly update skills/knowledge adn training (from the non-technical bean counters ) make life difficult. Add this to report writing and presenting evidence in court to clueless laywers and all in all you have a shit-house job. But on the plus side, chicks dug it !!
  • by Low2000 ( 606536 ) on Thursday September 01, 2005 @07:44PM (#13459613)
    If you are using windows (2000/XP Professional, 2003, Vista), and your a digital forensics professional, and you come accross 'encrypted' NTFS data that has been encrypted using the parents encryption method, do the followign.

    Right click the directory you want to un-encrypt, select properties, security, and press teh advanced button.

    Select the 'Owner' tab, then add your user account and administrator as owners. Remove all other owners.

    Check Replace owner on subcontainers and objects

    Switch the the Permissions tab and select 'Replace permission entries on all child objects with entires shown here that apply to child objects'

    Select 'OK' and go grab a doughnut... ... in a few minutes you should be done.

    I'm honestly not trying to aid would be 'hackers' or anything. I mostly just worry people use windows encryption thinking it's useful if their system has been compromised. It's not...

    There is actualy a MS KB article out there that explains this process a little better then I did but I'm a bit lazy today.
  • by dougmc ( 70836 ) <dougmc+slashdot@frenzied.us> on Thursday September 01, 2005 @07:45PM (#13459621) Homepage
    It's up to the government to get with the times and update their forensics software.
    I wouldn't suggest holding your breath waiting for that to happen.

    If you're a normal citizen, not out on parole or having to register as a sex offender or something, use whatever OS and browser you want. They haven't make this illegal yet.

    If you've been convicted of child porn violations, or have to register as a sex offender, you're screwed already, and nobody's likely to really care. Our legal system has a nice habit of continuing to punish people for things like this indefinitely (in spite of the Constitution's `no cruel and unusual punishments' section) and I don't see this changing any time soon. Even if all you did was get caught peeing behind a bush.

    NOBODY is going to make the police update their equipment just to give you more freedom in what OS or browser you use. (And you should be glad that they allow Windows XP, and not 95 or 3.1.)

  • by prockcore ( 543967 ) on Thursday September 01, 2005 @07:58PM (#13459710)
    Don't look impossible to me. The fact that no-one on that thread seems to know what UTF-16 is explains why they're having so much trouble with a relatively simple format.

    You want a hard file format? Try Quark. SPIFSPOCSPIFSPIT, this means something to quark... but damned if anyone knows what.

    (I'm not talking about xpresstags either, that's a cakewalk compared to quark's binary format)
  • by bitslinger_42 ( 598584 ) on Thursday September 01, 2005 @08:09PM (#13459781)

    Granted, a supposed expert who can't figure out proxy logs and cookies isn't very much of an expert, but he does have a point. I do computer forensics for one of my clients, and not only have I never run into a single case where the suspect deliberately hid their activity in the 7 years I've been doing this, but most of them are so unbelieveably stupid that they:

    • surf porn at work
    • during business hours
    • in open cubicles
    • with the monitor facing the hallway
    • when tour groups are going through the building
    • and when tech support is at the next desk

    For the vast majority of cases I've seen, finding evidence isn't really the problem. Explaining what the evidence means to HR/Legal is MUCH more difficult.

  • by bergeron76 ( 176351 ) * on Thursday September 01, 2005 @08:35PM (#13459969) Homepage
    Firefox is OPEN SOURCE! That means the file formats are OPEN. Microsoft IE is CLOSED SOURCE, meaning you need to reverse engineer everything to figure out where stuff lives.

    That said, I wonder what would prevent someone from creating a wireless fileserver and embedding it behind their drywall. Using an NFSmount or Share, an evildoer's PC wouldn't hold anything evil when the FED's nabbed it.

    Realistically I bet it would though - They can do some pretty amazing things with Forensics these days, and I wouldn't be surprised if they could take a ram chip and see previous states of 0's and 1's.

  • by Mekkis ( 769156 ) <cyranoei@hotmail.com> on Thursday September 01, 2005 @08:37PM (#13459981) Journal
    I work in computer forensics and it isn't that goddamned hard to develop tools to process different kinds of databases, encrypted or otherwise. Besides, I'm certain that if it were in the interests of "National Security", Federal investigators could get ensure cooperation between developers of FireFox or Opera and the contractors who actually do the forensics work.

    All you have to do is play "follow the money" and it quickly sounds like Micro$oft is using the God-and-Country argument to win by default the Second Browser War. Considering how invested Micro$oft has been in the US Justice Dep't. (one of former USAG John Ashcroft's biggest campaign contributors and still heavily involved to this date) it would be unsurprising if they were the ones pulling the strings on the issuance of a statement like this.

    What ought to happen is for the Dep't. of Homeland Security to proclaim Internet Explorer as the single largest cause of "electronic terrorism" because of Micro$oft's half-assed security measures.

    That'd shut them up real quick...
  • evil! (Score:4, Interesting)

    by cahiha ( 873942 ) on Thursday September 01, 2005 @08:40PM (#13460000)
    Even worse, those non-IE browsers make it really hard for police to install spyware and keylogging software on the user's computer. With IE, they just insert a little bit of code into any web page and they are done, but Opera and Firefox put up obstacles to that kind of legitimate law enforcement activity! Evil! Terrorism!
  • by Jetson ( 176002 ) on Thursday September 01, 2005 @08:44PM (#13460023) Homepage
    And your point?

    The point was that it's now possible to encrypt data so that other people can't read it unless they have appropriate credentials.

    True story:
    One of my coworkers thought NT4+NTFS was an incredibly secure platform. So I put a Knoppix CD in the drive, rebooted, mounted the NTFS partition, went to his profile directory and showed him the contents of his cookies. I then explained to him that NTFS security was cooperative, meaning that the security was based on the idea that a security flag in the filesystem would say "please don't read this file" and the operating system would respect that request. As soon as you find a way to ignore that flag then anything resembling security is out the window (pardon the pun).

  • by Anonymous Coward on Thursday September 01, 2005 @09:02PM (#13460126)
    Uh no, if you're on parole, then by definition you're still serving a sentence. By their mercy, you have been granted the privelege of serving your sentence in society as opposed to in prison. They don't owe you anything. If all you know is Linux, they're perfectly within their right to say "go back to jail and serve your sentence like you were supposed to do in the first place".
  • They aren't stupid (Score:3, Interesting)

    by glesga_kiss ( 596639 ) on Friday September 02, 2005 @08:22AM (#13463010)
    I don't know where the article is getting its info from, but it's wrong. Computer Forensic people aren't daft; they know what they are doing. There was computer audit proceedure document that hit the net about a year ago, I think it was even posted on /.

    At the time, I read through it and noted some "smart" things. They know about dead-mens switches etc; they NEVER boot up the PC. The drive gets removed and hooked up to a scanning system. The scan then looks for anything dodgy or the officer can browse it. If the software needs updated to include bookmarks/history from other sources, then I'm sure it's not all that big a deal to add this in. Even then, bookmarks & history? They are all too easy to clean and/or fake.

    If you think the computer forensic expects boot up the PC and try to save your bookmarks to a floppy, you are sadly mistaken.

    What worries me more is that computer evidence is so easilly fakeable yet is often seen as gospel by the courts. It would be easy to create "logs" showing bad activity from someone you don't like. If I ever get hastled from the RIAA, the court will be presented with "evidence" that shows the guys bringing the suit were paedophiles, just to show how ridiculus the idea of third-parties producing "evidence" from a remote system claiming you downloaded "X on date Y". The forensic guys have been trained and undoubtably have sworn and oath or signed a contract to be honest. Some anti-p2p company hasn't and it is also in there commercial interest to provide more of this evidence. Worrying times...

  • by Macgrrl ( 762836 ) on Friday September 02, 2005 @07:03PM (#13467243)

    In Victoria is is illegal to sell X-rated material or own more than 50 X-rated titles Note it is not illegal to BUY X-rated material.. Kiddie porn is always illegal to possess or distribute.

    The only places in Australia where you may legally sell X-rated materials are in the two territories; i.e. Northern Territory and Australian Capital Territory (where our nation's capital is located).

The only possible interpretation of any research whatever in the `social sciences' is: some do, some don't. -- Ernest Rutherford

Working...