lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BFE5269A054D1D41AD47E648B30D8CE5025D23C4@VHAISWMSGA1.vha.med.va.gov>
Date: Sat Sep  3 16:05:25 2005
From: tobin.craig at va.gov (Craig, Tobin (OIG))
Subject: RE: Computer forensics to uncover illegal
	internet use

The opinions expressed below are my personal and professional opinions,
and not the official position of my employer....

Apologies in advance for the long posting.....

>What is this thing you believe in, an 'electronic crime against a
>child' ?

Well, if you had actually taken the time to quote me accurately, you
would find I mentioned "electronic crimes against children", and not the
phrase you chose to substitute in its place.  A minor point, but
nevertheless, you might want to make sure you are accurate before you go
off the deep end.

>Your intentions may be fine, but your reasoning is actually quite
>insane. An 'electronic crime against a child' ? Absolutely outrageous
>and patently absurd. There is no such thing.

Actually, if you hit any conventional internet search engine and type in
the words "electronic" "crimes" "against" "children" you'll get several
million hits.  Review the top ones, you'll see they predominantly refer
to "electronic" aspects of "crimes against children".

You don't like that?  Then take the same search engine, and search for
the phrase "electronic crimes against children".  I found only two hits,
both pieces of legislation, and both coming from Hawaii. (Don't you have
an office there?)

>Tobin Craig (tobin.craig@...gov) wrote:
>> Title 18, USC 3:  Accessory after
>> the fact.
>> "Whoever, knowing that an offense
>> against the United States has been
>> committed, receives, relieves,
>> comforts or assists the offender in
>> order to hinder or prevent his
>> apprehension, trial or punishment, is
>> an accessory after the fact."

>You presume to deprive me of my right to wipe my hard drive because,
>in your expert opinion and in the legal opinion of some prosecutors,
>doing so causes me to violate Title 18, USC 3 - making me an accessory
>to your so-called 'electronic crime against a child' - and you are
>mistaken.

>You fail to understand the very important distinction between merely
>suspecting that a crime may have been committed and actually KNOWING.

>To violate Title 18, USC 3 you must actually know, not merely suspect,
>that an offense has been committed. You are wrong when you think that
>the mere presence of data on a hard drive prove to you, the trained
>computer forensic examiner, that a crime has occurred.

OK, let's go through this once more.

I asked you in response to an email sent by you on August 30, 2005:

"So if I've read this correctly, you are advocating the willful
destruction of evidence that would otherwise be used in the
investigation of crimes against children??"

You replied to my question on August 31, 2005:

"Yes. Wipe the drive and get on with business."

You have admitted that you advocate the WILLFUL DESTRUCTION of EVIDENCE.
My question was not concerning the wiping of a hard drive you had
suspicions about, it was about the WILLFUL (deliberate, voluntary, done
on purpose) destruction of EVIDENCE.  This means that a: you have
determined that there is something there that might get someone in
trouble, and b: rather than getting that person or corporation into
trouble, you choose to try and make it all go away.

>Seeing child porn may make you feel as though you have been assaulted,
>but that is your own subjective and purely emotional reaction, and
>does not prove anything to you. It does not cause you to KNOW that an
>offense has been committed. You may choose to report your suspicion,
>and the reasons for it, but you most certainly do not have any
>obligation pursuant to Title 18, USC 3 until and unless you actually
>KNOW.

>Seeing digital content that you know perfectly well is not a live
>broadcast of an act in progress should not give rise to your feeling
>that you KNOW an offense has been committed.

>A highly-trained and credentialed 'IT Forensic Director, Computer
>Crimes and Forensics' professional such as yourself should understand
>the difference, but you don't. Your technical training ignores this
>extremely important awareness and your personal bias coupled with the
>fact that you never work on behalf of the defense render you unable to
>know the difference between opinion and fact.

I know you are aware of the following, since you taught 2 courses for
CCE in 2005, but for the record, there is a code of ethics that I as a
Certified Computer Examiner must adhere to.

This code of ethics, the standard of integrity that I hold myself to
professionally and personally, and the value I place upon the ability to
render an unbiased impartial opinion are an integral part of my work
ethic, and I do not appreciate being maligned.

>When my hard drive becomes contaminated with child pornography because
>of the actions of some third-party, I have two conflicting duties:

>1) to clean my hard drive of the offensive material as soon as it is
>practical for me to do so, and,

>2) to be careful not to recklessly endanger other persons by
>destroying the only evidence that may clear them of any potential
>accusations of wrongdoing, or by spawning an irrational witch hunt or
>a stampede where I know ahead of time that somebody will be hurt.

>Because of #2, it is still the best decision for a company to image,
>encrypt, and store with counsel the hard drive images of concern.

>No report should be made to any law enforcement agency.

I hate to break the news, but when your hard drive becomes contaminated
with child pornography (so you're at the point that you've identified it
as child pornography), you (according to the law of the United States)
have only ONE course of action, report it to law enforcement.

It's in the law, Jason.  Title 18, USC 2252.

Of course you can tighten down firewall rules, etc to prevent it
happening again, but once you've identified it as child pornography, you
must turn it over.

>A logged record of wiping the drive where the log entry is designed
>intentionally to mislead an unskilled reader, so as to conceal from
>casual observation the fact that the encrypted drive image was made
>and placed in storage before the drive was wiped, is absolutely the
>right decision to make.

So in addition to falsifying log records, you are now advocating
concealing the fact that the data was not in fact destroyed, but
archived?  Now instead of an individual being an offender, you have
placed the corporation in jeopardy, since it now knowingly possesses the
same images you identified as child pornography.  In addition, you have
(whether you choose to accept the reality of it or not) assisted the
offender in order to hinder or prevent his apprehension.

It's in the law Jason.  Title 18, USC 3.

>Your training and experience are biased against the defense because
>you are trained by law enforcement and you are never exposed to
>fundamental principles that would equip you to properly apply an
>unbiased and well-informed approach to your work.

Actually, I'm a trained chemist.  My whole background is in fundamental
principles, and I have tried whenever possible to apply that background
to computer forensics.  Furthermore, if you knew anything about my work
as forensic chemist, you would know that the lab I worked at established
more innocence that guilt.  I learned very early on in my career the
importance of identification, coupled with taking any evidentiary
findings in context with surrounding factors.  Don't even presume to
lecture me on bias.

>Ask yourself why >not? Is there something wrong with 'computer
>forensics' that these >truths must be ignored in order for
>'computer forensics' to be used in practice?

>My answer is yes, there is. You are what's wrong with so-called
>'computer forensics' -- it is a biased system for telling lies
>under >the guise of expert testimony, and these lies are being
>told over and >over again in jurisdictions around the world. The
>purpose of the lies >is to advance the cause, bias, and belief
>system of those who tell >them. Your stated cause (today) is to
>catch everyone who commits an >'electronic crime against a
>child' -- the methods and thinking from >which you derive this
>cause will, naturally, allow you to choose a >different cause in
>the future and pursue it as well. Go get those >'electronic
>terrorists' who spread speech that harms commercial >interests.
>Anyone who expresses hate toward Microsoft and its >dangerous
>products must be an electronic criminal. Your expert >testimony
>can take them off the street, so go to it. Hate speech, and
>>speech against the interests of commerce, are against the law.

In other words, by your standard, I'm biased to investigate child
pornography, but impartial to investigate terrorist crime.  Remarkable.

In closing: this discussion was for the most part a sensible,
professional opportunity to exchange ideas and assist someone in the
community with a valid question.

Throughout this discussion I have sought to keep our communication on a
civil and a professional level, and I would have appreciated the same
courtesy in return.  It appears I may have expected too much.

Without knowing me, my background, or my experiences you have
nevertheless leveled some groundless accusations at my character,
integrity, and technical competence.  I won't even dignify those
accusations with a response, though I will reiterate: The International
Society of Forensic Computer Examiners code of ethics, the standard of
integrity that I hold myself to professionally and personally, and the
value I place upon the ability to render an unbiased impartial opinion
are an integral part of my work ethic, and I do not appreciate being
maligned.

Apologies for the long post,

Just my opinion,

Tobin

___________________________
Tobin Craig, MRSC, CISSP, SCERS, EnCE, CCE
IT Forensic Director, Computer Crimes and Forensics
Department of Veterans Affairs
Office of Inspector General
___________________________

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ