Identifying the Hacker

I l @ ve RuBoard

One of the primary goals of any investigation is to identify the person or persons who committed the criminal acts. The Internet adds levels of complexity to the process of establishing their identity. Because of the makeup of the Internet, it is sometimes difficult for law enforcement officers to discover the identity of a hacker. There are a variety of anonymous applications which, by their nature, obscure the identity of the user , and there are many tools which can be used by a hacker to intentionally hide or alter his or her identity. Tracking a hacker may call for a combination of Internet research skills, subpoenas, court orders, search warrants , electronic surveillance, and traditional investigative techniques.

A hacker might hide or "spoof" his Internet Protocol (IP) address or might intentionally bounce his communications through many intermediate computers scattered throughout the world before arriving at a target computer. The investigator must then identify all of the bounce points to find the location of the hacker, but usually can trace the hacker back only one bounce point at a time. Subpoenas and court orders to each bounce point may be necessary to identify the hacker.

U.S. government contractor Exigent Software Technology has admitted that unidentified hackers broke into a restricted military computer system and stole the source codes controlling satellite and missile guidance systems. Hackers got away with two thirds of the code when the target computer at the Naval Research Lab in Washington was attacked on Christmas Eve. The military detected the break-in three days later.

The theft was made public when Swedish police searched the servers of Internet service provider Carbonide on suspicion that hackers used the company's Freebox Web e-mail service to distribute the code to others. The hacker used the name "Leeif," which was a stolen account, on the system. Carbonide was able to trace the attack on its network to a server at the University of Kaiserslautern in Germany. The German federal office for criminal affairs said that an investigation is underway. [77]

[77] White, Aoife, "Hackers Steal Military Source Code," vnunet.com, 15 March 2001.

Network Tracking

A computer on a network has a number of addresses. Originally, these addresses were assigned to specific machines and identified the machine. Today, that is not so. The unprecedented growth of the Internet has made the Internet numbering scheme inadequate to handle the number of users from the number of access providers. To help allow the numbering scheme to go further, and to help provide mobile computer, reusable numbering methods have been deployed.

IP addresses are issued by various organizations under the direction of the Internet Assigned Numbers Authority, IANA. DHCP became the normal method for setting addresses as Internet Service Providers were requesting and trying to manage addresses for an explosively growing market. An ISP could have one IP address for each modem and ten times as many customers. IP addresses are no longer a identifier of a system; rather, they are an identification of the location where a system gains Internet access. A machine may have a specific address for only one session, and not necessarily even that, because a machine can release an address and renegotiate for another.

Network Address Translation, NAT, is a process which allows multiple computers to share a single, or group of, IPs. It allows a company or a home network to connect multiple computers to the Internet through a service which provides only a single network address. This can provide security, since the systems do not provide their address to external networks. NAT is built into most router and firewall devices and is used extensively throughout the Internet.

Every network connection is to have a unique machine address. This machine address is usually part of the network interface card, and is suppose to be unique, but it is required to be unique only on a physical network. These original machine addresses were issued to the manufactures of network interfaces. However, with the explosive growth of networks, machine addresses have become assignable and configurable so that a machine can easily change its machine address.

Address spoofing is a common hacking technique whereby the source address in a packet is changed so that the actual address is not available to the system which is being attacked. This can be a nonexistent address, or an address which will lead the investigation down the wrong path .

Inadequate Logs

Computer systems of interest to hackers usually keep track of all authorized and unauthorized access attempts. These computer logs provide records which are useful and often critical clues that can be used as the starting point to trace the route taken from computer to computer through the Internet, to discover the source of the attack. However, some victims don't keep logs or don't keep them long enough so that, when a hacker's activities are discovered , the logs are no longer available. Some ISPs don't keep records, or don't keep them long enough to be of help to law enforcement officers. A victim who has no record of the IP address of the computer from which unauthorized access was gained limits the ability to track the attack and may be unable to identify the hacker.

Identifying an Individual

Determining the specific individual or individuals who are responsible can be a very difficult task. Often it will be possible to determine what was done, how it was done, when it was done, and from where it was done, but not who did it. The address, which is the usual identity found in an investigation, belongs to a machine, not an individual. The search will lead to the point where the attacker accesses the Internet, possibly the machine. You will probably be able to tell what account was used, even those accounts on other systems that were used during the attack. However, the information from the computer itself will rarely be able to prove who the person was who compromised the system. Without stronger authentication methods, there is no proof that this person was the user on the system. It generally takes physical evidence to prove that a specific person was the hacker. It could be his possession of the information that was taken or his bragging of his conquest that is the conclusive evidence.

In cases when the guilty party is found, it is important to prosecute the hacker as a deterrent to this hacker, as well as to others.

I l @ ve RuBoard


Halting the Hacker. A Practical Guide to Computer Security
Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
ISBN: 0130464163
EAN: 2147483647
Year: 2002
Pages: 210

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net