+ All Categories
Home > Documents > ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic....

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic....

Date post: 02-Aug-2020
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
25
©2014 ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE As the use of the Internet and associated technologies has grown rapidly in recent years, so has the opportunity for computer-related crime. Unlawful activity can be committed or facilitated online with criminals trading and sharing information, masking their identity, gathering information on victims, and communicating with co-conspirators. Websites, email, chat rooms, and social networks can all provide vital evidence in an investigation of computer-related crime, and this session will assist investigators in their efforts to curb such crime. STEPHEN HILL, PH.D., CIIP, MLPI Managing Director Snowdrop Consulting Ltd United Kingdom Dr Stephen Hill specialises in e-crime and fraud awareness, and has more than 12 years of experience focusing on counter fraud, cyber fraud, not-for-profit fraud, and risk management. He is a certified practitioner (CIIP) for IS027001 and has worked on a number of guides to fraud detection, data security, and prevention for many small to medium enterprises (SMEs) and charities. He is a Trustee Director of the Fraud Advisory Panel and chairs their Cybercrime Working Group with colleagues from the public, private, and third sectors. In addition to developing a series of fraud prevention, data security, e-fraud, and Internet investigations and OSINT courses, Hill published Corporate Fraud: Prevention & Detection, a book with practical advice on all aspects of fraud and how to prevent it, with the royalties going to the charity Victim Support. “Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author.
Transcript
Page 1: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

©2014

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND

OPEN SOURCE INTELLIGENCE

As the use of the Internet and associated technologies has grown rapidly in recent years, so has

the opportunity for computer-related crime. Unlawful activity can be committed or facilitated

online with criminals trading and sharing information, masking their identity, gathering

information on victims, and communicating with co-conspirators. Websites, email, chat rooms,

and social networks can all provide vital evidence in an investigation of computer-related crime,

and this session will assist investigators in their efforts to curb such crime.

STEPHEN HILL, PH.D., CIIP, MLPI

Managing Director

Snowdrop Consulting Ltd

United Kingdom

Dr Stephen Hill specialises in e-crime and fraud awareness, and has more than 12 years of

experience focusing on counter fraud, cyber fraud, not-for-profit fraud, and risk management. He

is a certified practitioner (CIIP) for IS027001 and has worked on a number of guides to fraud

detection, data security, and prevention for many small to medium enterprises (SMEs) and

charities. He is a Trustee Director of the Fraud Advisory Panel and chairs their Cybercrime

Working Group with colleagues from the public, private, and third sectors. In addition to

developing a series of fraud prevention, data security, e-fraud, and Internet investigations and

OSINT courses, Hill published Corporate Fraud: Prevention & Detection, a book with practical

advice on all aspects of fraud and how to prevent it, with the royalties going to the charity Victim

Support.

“Association of Certified Fraud Examiners,” “Certified Fraud Examiner,” “CFE,” “ACFE,” and the

ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of

this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without

the prior consent of the author.

Page 2: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 1

NOTES Online Investigations

The use of the Internet and mobile technologies, including

smartphones, has grown rapidly in recent years as has the

opportunity for computer-related crime. Unlawful activity

can be committed or facilitated online with criminals

trading and sharing information, masking their identity,

gathering information on victims, and communicating with

co-conspirators.

However the Internet also provides opportunities to the

fraud investigator to acquire vital digital intelligence. The

Internet by design is ‘public’ with incredible amounts of

data available to anyone with a computer and browser.

Today the fraud examiner has access to new and evolving

search engines, databases, open source tools, chat rooms,

blogs, online gaming communities and social networks in

their efforts to curb crime.

Introduction to the Internet and WWW

The Internet is a worldwide, free-broadcast medium for the

general public and is the “interconnection of computer

networks”. It is a massive hardware combination of

millions of personal, business, and governmental

computers, all connected like roads and highways. Using a

PC, Mac, smartphone, Xbox, movie player, or GPS, you

can access a vast world of messaging and useful content

through the Net.

The Net has sub networks. The biggest sub network is the

World Wide Web, comprising HTML pages and

hyperlinks. Other sub networks are email, instant

messaging, P2P (peer-to-peer) file sharing, and FTP

downloading.

Page 3: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 2

NOTES Birth of the Net

The Internet grew out of an experiment begun in the 1960s

by the U.S. Department of Defense (DoD). The DoD

wanted to create a computer network that would continue

to function in the event of a disaster, such as a nuclear war.

If part of the network were damaged or destroyed, the rest

of the system still had to work. That network known as

ARPANET linked U.S. scientific and academic researchers

and was the forerunner of today’s Internet.

In 1985, the National Science Foundation (NSF) created

NSFNET, a series of networks for research and education

communication. Based on ARPANET protocols, the

NSFNET created a national backbone service, provided

free to any U.S. research and educational institution. At the

same time, regional networks were created to link

individual institutions with the national backbone service.

As personal computers became more mainstream in the

1980s and 1990s, the Internet grew exponentially as more

users plugged their computers into the massive network.

Today, the Internet has grown into a public spider web of

millions of personal, government, and commercial

computers, all connected by cables and by wireless signals.

No single person owns the Internet. No single government

has authority over its operations.

Some technical rules and hardware/software standards

enforce how people plug into the Internet, but for the most

part, the Internet is a free and open broadcast medium of

hardware networking.

You connect to the Internet through a private Internet

service provider, a public Wi-Fi network, or through your

office’s network.

Page 4: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 3

NOTES World Wide Web (WWW)

The World Wide Web, or "Web" for short, is a huge

collection of digital pages: that large software subset of the

Internet dedicated to broadcasting content in the form of

HTML pages.

The Web is viewed by using free software called Web

browsers. Born in 1989, the Web is based on hypertext

transfer protocol, the language that allows the user to

“jump” (hyperlink) to any other public Web page. There

are billions of pages on the Web today stored on Web 1.0,

Web 2.0, or the Invisible Web.

Web 1.0

When the World Wide Web was launched in 1989 by Tim

Berners-Lee, it was composed of just text and simple

graphics. Effectively a collection of electronic brochures,

the Web was organised as a simple broadcast-receive

format. We call this simple static format Web 1.0. Today,

millions of Web pages are still quite static, and the term

Web 1.0 still applies.

Web 2.0

In the late 1990s, the Web started to go beyond static

content, and began offering interactive services. Instead of

just Web pages as brochures, the Web began to offer online

software where people could perform tasks and receive

consumer-type services. Online banking, video gaming,

dating services, stocks tracking, financial planning,

graphics editing, home videos, webmail—all of these

became regular online Web offerings before the year 2000.

These online services are now referred to as Web 2.0.

Names like Facebook, Flickr, Twitter, eBay, YouTube, and

Gmail helped to make Web 2.0 a part of our daily lives.

Page 5: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 4

NOTES The Invisible or Deep Web

Technically a subset of Web 2.0, the Invisible Web refers to

those billions of Web pages that are purposely hidden from

surface search engines.

These invisible Web pages are private-confidential pages

(e.g., personal email, personal banking statements), and

Web pages generated by specialised databases (e.g., job

postings). Invisible Web pages are either hidden completely

from typical surface search methods, or require special

search engines to locate the data.

IP Address, DNS, and TCP/IP

IP Address

The Internet has as client-server architecture with

computers connected to the Internet acting either as a

client or as a server. The client asks for data and the

server receives the request and returns the data. Both

client and server require an Internet Protocol (IP)

address.

An IP address allows one computer (or other digital

device) to communicate with another via the Internet.

IP addresses allow the location of billions of digital

devices that are connected to the Internet to be

pinpointed and differentiated from other devices. In the

same sense that someone needs your mailing address to

send you a letter, a remote computer needs your IP

address to communicate with your computer.

An Internet Protocol is a set of rules (a complex string

of numbers that acts as a binary identifier for devices

across the Internet) that govern Internet activity and

facilitate completion of a variety of actions on the

World Wide Web. Therefore an Internet Protocol

address is part of the systematically laid-out,

Page 6: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 5

NOTES interconnected grid that governs online communication

by identifying both initiating devices and various

Internet destinations, thereby making two-way

communication possible.

In short, an IP address is the address that computers,

servers, and other devices use to identify one another

online.

An IP (v4) address consists of four numbers, each of

which contains one to three digits, with a single dot (.)

separating each number or set of digits. Each of the four

numbers can range from 0 to 255. Here’s the IP address

of the ACFE main website: 207.207.34.162. This

innocuous-looking group of four numbers is the key

that empowers users to send and retrieve data over

Internet connections, ensuring that messages, as well as

requests for data and the data requested, will reach their

correct Internet destinations.

IP addresses can be either static or dynamic. Static IP

addresses never change. They serve as a permanent

Internet address and provide a simple and reliable way

for remote computers to contact users. Static IP

addresses reveal information including the continent,

country, region, and city in which a computer is

located; the ISP (Internet Service Provider) that

services that particular computer; and such technical

information as the precise latitude and longitude of the

country, as well as the locale, of the computer. Many

websites provide IP address look-up services to their

visitors, free of charge.

Dynamic IP addresses are temporary and are assigned

each time a computer accesses the Internet. They are, in

effect, borrowed from a pool of IP addresses that are

Page 7: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 6

NOTES shared among various computers. Since a limited

number of static IP addresses are available, many ISPs

reserve a portion of their assigned addresses for sharing

among their subscribers in this way.

Static IP addresses are considered somewhat less secure

than dynamic IP addresses, since they are easier to track

for data mining purposes.

Domain Name System (DNS)

DNS is the information that you enter into a Web

browser to reach a specific website. When you input a

URL like www.acfe.com/fraud-resources.aspx into a

browser, its domain name is acfe.com. Basically, a

domain name is the human-friendly version of an IP

address. Businesses vie for easy-to-remember domain

names, since they make it easier for people to find them

online. If people had to remember complex IP

addresses to navigate the Internet it would become very

difficult and in effect users would lose interest.

Although it’s possible to enter an IP address into a Web

browser to access a website, it’s a lot easier to enter its

domain name. However, computers, servers, and other

devices are unable to make heads or tails of domain

names; they strictly rely on binary identifiers. The

DNS’s job, then, is to take domain names and translate

them into the IP addresses that allow machines to

communicate with one another. Every domain name has

at least one IP address associated with it.

ICANN

To reach another person on the Internet you have to

type an address into a computer—a name or a number.

That address must be unique so computers know where

to find each other. The Internet Corporation for

Page 8: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 7

NOTES Assigned Names and Numbers (ICANN) coordinates

these unique identifiers across the world. Without that

coordination, we wouldn’t have one global Internet.

In more technical terms, ICANN coordinates the

Internet Assigned Numbers Authority (IANA)

functions, which are key technical services critical to

the continued operations of the Internet’s underlying

address book, the Domain Name System (DNS). The

IANA functions include:

The coordination of the assignment of technical

protocol parameters including the management of

the address and routing parameter area (ARPA) top-

level domain

The administration of certain responsibilities

associated with Internet DNS root zone

management such as generic (gTLD) and country

code (ccTLD) Top-Level Domains

The allocation of Internet numbering resources

IANA

The Internet Assigned Numbers Authority (IANA) is

responsible for the global coordination of the DNS

Root, IP addressing, and other Internet protocol

resources (www.iana.org). IANA is a department of

ICANN responsible for coordinating some of the key

elements that keep the Internet running smoothly.

Whilst the Internet is renowned for being a worldwide

network free from central coordination, there is a

technical need for some key parts of the Internet to be

globally coordinated, and this coordination role is

undertaken by IANA.

Understanding the URL

URL stands for Uniform Resource Locator. The URL

specifies the Internet address of a file stored on a host

Page 9: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 8

NOTES computer connected to the Internet. Every file on the

Internet, no matter what its access protocol, has a unique

URL. Web software programs use the URL to retrieve the

file from the host computer and the directory in which it

resides. This file is then displayed on the user’s computer.

URLs are translated into numeric addresses using the

Internet Domain Name System (DNS). The numeric

address is actually the “real” URL. Since numeric strings

are difficult for humans to use, alphanumeric addresses are

employed by end users. Once the translation is made, the

Web server can send the requested page to the user’s Web

browser.

What Does a Typical URL Look Like?

Here are some examples:

http://www.acfe.com: The home page for the ACFE

https://www.paypal.com/uk/webapps/mpp/home: A

secure version of http using SSL

ftp://rtfm.mit.edu/pub: A directory of files available for

downloading

http://blogs.reuters.com/soccer: A blog or weblog from

the Reuters news agency

The first part of a URL (before the two slashes) tells you

the type of resource or method of access at that address. For

example:

http—a hypertext document or directory

gopher—a gopher document or menu

ftp—a file available for downloading or a directory of

such files

news—a newsgroup

telnet—a computer system that you can log into over

the Internet

WAIS—a database or document in a Wide Area

Information Search database

Page 10: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 9

NOTES file—a file located on a local drive (your hard drive)

Anatomy of a URL

This is the format of a URL:

https://www.fraudadvisorypanel.org/pdf_show_171.pdf

This URL is associated with a section of the Fraud

Advisory Panel’s website. So what is it telling us?

Protocol: http (how to get their)

Host name: www.fraudadvisorypanel.org

Domain name: fraudadvisorypanel (where to go)

Top-level domain: .org

File name: pdf_show_171.pdf (what to get)

Here are some other important things to know about URLs:

A URL usually has no spaces.

A URL always uses forward slashes.

If you enter a URL incorrectly, your browser will not

be able to locate the site or resource you want.

You can find the URL behind any link by passing your

mouse cursor over the link. The pointer will turn into a

hand and the URL will appear in the browser’s status

bar, usually located at the bottom of your screen.

Web Browsers

The World Wide Web operates on a client-server model.

Users run a Web client on their computer called a Web

browser such as Firefox, Chrome, Safari, and Internet

Explorer. That client contacts a Web server and requests

information or resources. The server locates and then sends

the information to the browser, which displays the results.

When Web browsers contact servers, they’re asking to be

sent pages built with Hypertext Markup Language

(HTML). Browsers interpret those pages and display them

on the user’s computer. They also can display applications,

Page 11: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 10

NOTES programs, animations, and similar material created with

programming languages such as Java and ActiveX,

scripting languages such as JavaScript.

Search Engines

The first step to Internet research is to have a thorough

understanding of the search protocols offered by the

various Internet search engines. Google, Yahoo, and Bing

are only three of the several free search engines available

for investigative Internet research; however, fraud

examiners should not rely exclusively on one search

engine.

For best results, experts recommend using multiple search

engines, as each engine only retrieves those pages to which

it is indexed, and no Internet search engine is indexed to all

available information.

Fraud examiners might choose a meta-search site, which

allows queries to be submitted to multiple search engines

simultaneously. Alternatively is it worth considering setting

up an automated search such as Google Alerts.

Automated Searching

Whilst searching the Web on a daily basis for company or

people data during an investigation, the process becomes

timely and resourceful. Some searches can be setup to run

24/7 allowing you time to commit to other areas of your

investigation.

Let’s say for example that you are running a background

search on a company and associated directors linked to

your case. Typically, you would get this kind of

information by running a search on a daily basis, but that’s

a hassle if you end up running the same search every day or

even several times per day.

Page 12: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 11

NOTES There is a solution that enables the investigator to flip

things around and let the results come to them,

automatically, at designated times.

Tools to assist in running automated searches include:

Google.co.uk/alerts (Google)

Noticraig.com (Craiglist)

Automatedsearches.com (eBay)

Google Alerts are emails sent to you when Google finds

new results such as Web pages, newspaper articles, or

blogs that match your search term. You can use Google

Alerts to monitor anything on the Web. For example,

people use Google Alerts to:

Find out what is being said about their company or

product.

Monitor a developing news story.

Keep up-to-date on a competitor or industry.

Get the latest news on a celebrity or sports team.

Find out what’s being said about them.

How Google Alerts Work

Type a search term into the box, such as Company X or

Person X, and you'll see a preview of what the alert

would look like on the right (it shows the latest articles

that include your search terms).

You could also use Google Alerts to follow a

developing news story or get the latest on your

favourite sports team or celebrity.

Use the Result box to narrow by News, Blogs,

Discussions, Videos, or Books, and set the frequency to

as-it-happens, daily, or weekly.

Page 13: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 12

NOTES Search Engines (Index)

Databases used by search engines are made by “robots” or

“spiders” that automatically map the Web by following the

links between sites. These robots or spiders read the Web

pages and put the text (or parts of the text) into a large

database or index that you can then access.

None of them cover the whole net; Google, the world’s

largest index of the Internet, only catalogues 8 percent of

the World Wide Web. Other big search engines include

Bing, Ask, and Duck Duck Go.

Search Directories

Search directories are hierarchical databases with

references to websites. The websites that are included are

hand-picked by humans and classified according to the

rules of that particular search service. Yahoo is the leader

of search directories. About, BOTW, and DMOZ are also

very popular.

Useful Search Engines (index and directory)

Ask (www.ask.com)

Bing (www.bing.com)

Blekko (www.blekko.com)

Boolify (www.boolify.org)

Cluuz (www.cluuz.com)

Deeperweb (www.deeperweb.com)

duckduckgo (www.duckduckgo.com)

Exalead (www.exalead.com/search)

Google (www.exalead.com/search)

Gseek (www.gseek.com)

Ixquick (https://ixquick.com)

Yahoo! (www.search.yahoo.com)

Yandex (www.yandex.com)

Page 14: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 13

NOTES Meta Search

Meta-search engines are search engine tools that pass

queries on to many other search engines or directories and

then summarise the results in one handy interface. A meta-

search engine such as Dogpile collects and sorts the hits,

takes out duplicates, and presents the end result in a simple

format. Popular meta-search websites include Scour,

IXQuick, and Mama.

Deep Web

The deep Web (or invisible Web) is the set of information

resources on the World Wide Web not reported by normal

search engines. Deep Web content includes information in

private databases that are accessible over the Internet but

not intended to be crawled by search engines. For example,

some universities, government agencies, and other

organisations maintain databases of information that were

not created for general public access. Other sites might

restrict database access to members or subscribers.

The term deep Web was coined by BrightPlanet, an Internet

search technology company that specialises in searching

deep Web content. Although some of the content is not

open to the general public, BrightPlanet estimates that 95

percent of the deep Web can be accessed through

specialised search.

Deep Web search sites include:

Topix.net—a news search engine

Infoplease.com—factual answers to questions

Pipl.com—people-finder search tools

Flightaware.com—real-time flight tracking service

Specialist Search Tools

There are other tools available to the fraud examiner and it

depends on what it is they are looking for as to which site

Page 15: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 14

NOTES to use. Here is a selection of useful links to add to your

Internet investigation toolbox:

Silo Breaker (www.silobreaker.com)

KGB People (www.kgbpeople.com)

Spokeo (www.spokeo.com)

Verify Email Address (www.verify-email.org)

YouTube (www.youtube.com)

Flickr (www.flickr.co.uk)

Yippy (www.yippy.com)

The Wayback Machine (www.archive.org)

Blog Searching Tools

www.icerocket.com

www.technorati.com/blogs/directory

www.ljseek.com

www.blogcatalog.com/category

People Finder Search Tools

www.yasni.co.uk

www.123people.co.uk

www.kgbpeople.com

www.yatedo.com

www.wink.com

www.yoname.com

www.snitch.name

Image Searching

Image search is evolving rapidly with specialised search

tools and engines able to read the text on the image; see its

colours; identify image location; and classify it based on its

form, shape, and textures.

Here are some of the best image tools and techniques to

assist you in your investigation:

www.images.google.com

www.bing.com/images

Page 16: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 15

NOTES www.exalead.com/search/image

www.flickr.com

www.instagram.com

www.facesaerch.com

www.delarge.co.uk/gallery/tools/finder

www.tineye.com

www.fotoforensics.com

www.searchinstagram.com

www.regex.info/exif.cgi

Social Media Investigations

Social media has opened up numerous opportunities to the

fraud examiner and is a key component to profiling the

subject of an investigation. The pool of information about

each individual can form a distinctive social signature.

Twitter, Facebook, and LinkedIn (to name but a few) have

embedded themselves in people’s lives. Posting to walls,

tweets, videos, and image updates are emerging as a new

trove of intelligence for the fraud examiner.

Social media evidence can be a valuable addition to an

investigation, revealing the kind of information that, years

ago, would have been difficult, if not impossible, to find.

But it has to be gathered in a way that will hold up in court.

Because it’s such a new source of evidence in

investigations, case law is developing rapidly. A forward-

thinking investigator would be well advised to stay on top

of the latest legislation both locally and internationally.

Once access to social media information has been secured,

either through court order or simply due to public

accessibility, evidence must be gathered in a way that is

legal and useful. Collecting evidence from social media

sites can be challenging for several reasons. Social media is

constantly changing, and users can easily update and delete

material that could be evidence in a case, although once a

Page 17: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 16

NOTES user is aware of an ongoing investigation, he or she is under

an obligation to preserve social media evidence just as if it

were any other type of evidence.

Useful links for social media intelligence gathering:

www.socialmention.com

www.kurrently.com

www.topsy.com

www.tweetcharts.com

www.weknowwhatyouredoing.com

www.tweetdeck.com

www.twitscoop.com

www.facesaerch.com

www.globaltweets.com

www.social-searcher.com

www.twellow.com

www.whostalkin.com

www.tweetreach.com

www.thudit.com

www.twitpic.com

www.searchinstagram.com

www.hootsuite.com

There are limitations to the information you can access on a

social network due to privacy settings and anonymity; legal

advice might be required before using social media

evidence against an individual.

Tracing an Internet Address to a Source

Just as every house has an address, every computer

connected to the Internet has an address. This is referred to

as an Internet Protocol (IP) address.

Identifying the Owner of a Website

There are a number of domain lookup tools available and in

this example we are going to use

Page 18: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 17

NOTES http://whois.domaintools.com. Once on the website, enter a

domain name and click lookup. When the lookup has been

entered you will be able to identify who is registered as the

owner of the website. The registration details a number of

important things—the registrant (can be an individual or a

company), the registrant’s address, who they registered the

website with (registrar), and dates indicating registration

and renewal and last update.

Identifying the Hosting Provider of a Website

It is important to also identify the hosting provider (i.e.,

who runs the Web server where the website you are

investigating resides). At the top of the page you are

currently on you will see a series of tabs including Server

Stats.

Click on the Server Stats tab and you will see an IP

address of the hosting provider.

Click on the IP address to identify the details of the

provider, including key contacts

Identifying Which Bodies Could Also Be Contacted

IANA (www.iana.org)

The Internet Assigned Numbers Authority (IANA) is a

department of ICANN responsible for coordinating

some of the key elements that keep the Internet running

smoothly. Whilst the Internet is renowned for being a

worldwide network free from central coordination,

there is a technical need for some key parts of the it to

be globally coordinated—and this coordination role is

undertaken by IANA. Specifically, IANA allocates and

maintains unique codes and numbering systems that are

used in the technical standards (protocols) that drive the

Internet.

Page 19: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 18

NOTES ICANN (www.icann.org)

To reach another person on the Internet you have to

type an address into your computer—a name or a

number. That address has to be unique so computers

know where to find each other. ICANN coordinates

these unique identifiers across the world. Without that

coordination we wouldn’t have one global Internet.

ICANN was formed in 1998. It is a not-for-profit

partnership of people from all over the world dedicated

to keeping the Internet secure, stable, and interoperable.

It promotes competition and develops policy on the

Internet’s unique identifiers. ICANN doesn’t control

content on the Internet. It cannot stop spam and it

doesn’t deal with access to the Internet. But through its

coordination role of the Internet’s naming system, it

does have an important impact on the expansion and

evolution of the Internet.

Regional Bodies

The Internet is split into five regions—Africa, North

America, Asia-Pacific, Latin America/Caribbean, and

Europe/Middle-East/Central Asia. Each region has a

Regional Internet Registry (RIR) that has responsibilities in

regard to the Internet. These RIRs and their contact email

addresses are:

AfriNIC: [email protected]

ARIN: [email protected]

APNIC: [email protected]

LACNIC: [email protected]

RIPE NCC: [email protected]

Typically these bodies are reluctant to get involved;

however, they can be a useful last course of action.

What to Look for in Terms of Suspicious Setups

Key indicators to watch for are:

Page 20: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 19

NOTES Websites registered in one country but hosted in

another. This becomes more suspicious when the

registrant is in the UK but is hosted in Russia, Eastern

Europe, or Africa. Also look out for typical havens,

such as Switzerland and Andorra.

Websites operating in the UK, aimed at a UK market,

but where the registered owner is based outside of the

UK.

Websites registered by a third-party company and

therefore masking the real owner. Again, typically these

third parties will be located in havens.

Websites with obviously incorrect or misleading

details.

Following the Money: Who Registered or Paid for the

Domain Registration?

Domain names are typically registered for a two-year

period and can only be renewed within a couple of months

of the expiry date. Some other domains can be registered

for longer periods, and are typically offered at a discounted

rate registered for five or ten years at a time. Understanding

how a domain registration has been paid for could help the

investigation. Remember hosting services and domain

registration requires a fee, so follow the money. In the

domain name entry: when you view the details of a domain

name entry in the list of your domain names, the user ID of

the billing contact will be shown. Click on the domain

name to see the details. In some cases the website you are

investigating will need to be maintained and updated so the

server log maintained by the registrar will indicate how the

web manager accesses the site providing you with more

vital digital evidence.

Viewing the Internet Archive

Visit the Internet Archive’s Wayback Machine page at

www.archive.org, which can take you back as far as 1996.

Page 21: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 20

NOTES Locate the box labelled “Web”. You’ll find another box

to the right of the icon for the Internet Archive’s

Wayback Machine.

Click this box to the right of the insignia for the

Wayback Machine. Type the website you want to find

into this box.

Press the Enter key on your keyboard to submit the

search, or click the “Take Me Back” button.

Wait a few moments. The machine has lots of items to

search for, covering lots of dates over the last 10 to 15

years.

Click on one of the dates displayed. This date is the

date the robot came along and cached a view of the

exact page you enquired about.

Wait for the page to display. You’ll be delighted to see

the page as it appeared on the date selected.

NB - Links to pages further in on the Web aren’t always

archived on the same day as the page you enquired about.

You’ll get an error message when you try to do something

on the page. Use the Wayback Machine to view the page

only. Some of the older archives are missing pictures. In

this case, keep clicking different dates until you find a

working one.

How to Trace an Email Address

Trace an email address in the most popular programs like

Microsoft Outlook, Hotmail, Yahoo, Gmail, and AOL, by

finding the header.

What Is an Email Header?

Each email you receive comes with headers. The

headers contain information about the routing of the

message and the originating Internet Protocol address

of the message. Not all electronic messages you receive

will allow you to track them back to the originating

Page 22: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 21

NOTES point, and on how you send messages determines

whether they can trace an email address back to you.

The headers don’t contain any personal information. At

most, the results of the trace will show you the

origination IP and the computer name that sent the

email. After viewing the trace information, the

initiating IP can be looked up to determine from where

the message was sent. IP address location information

does not contain your street name, house number, or

phone number. The trace will most likely determine the

city and the ISP the sender used.

How Do I Get the Header to Start the Trace Email

Process?

Each electronic messaging program varies as to how

you get to the message options.

Outlook—Right click the message while it’s in the

inbox and choose Message Options. A window will

open with the headers in the bottom of the window.

Windows Live—Right click the correspondence

while it’s in the inbox, choose Properties, and then

click the Details tab.

Gmail—Open the correspondence. In the upper

right corner of the email you’ll see the word Reply

with a little down arrow to the right. Click the down

arrow and choose Show Original.

Hotmail—Right click the message and select View

message source.

Yahoo!—Click the Actions dropdown menu and

select View Full Header.

AOL—Click Action and then View Message

Source.

You can see that no matter the program, the headers are

usually just a right click away.

Page 23: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 22

NOTES Tracing the Header

The next step to trace an email address is to find the

originating IP listed in the header. An easy way to read

the header of an email is to use the email header tool on

www.whatismyipaddress.com.

Simply copy the header information from the email and

paste into the relevant box on the “what is my IP

address” email header webpage.

Protecting Your ID When Online

Every time you surf the Internet, your IP address is publicly

visible to everyone on target network resources. It is

important, therefore, to disguise your ID and online

presence.

Creating a Sock Puppet (False ID)

Four steps to create a sock puppet:

Create a fake ID—use name generator

Create fake profiles and user accounts on Facebook

or Twitter for example

Fake or disguised email, phone, and IP details

Consider payment method—pre-paid credit card

Documenting Online Investigation Intelligence

Record URLs (especially Facebook)

Email communications (keep copies of relevant

correspondence)

Screen capture—Print screen, Save As or apps such

as Camtasia

Depending on nature of case, keep hard copies of

screen shots, emails, etc.

Creating a Digital Case File

Documentation—Dates, times, accounts, IDs,

images, video, chat, messages

Page 24: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 23

NOTES Recordings—Screen records of the detailed

investigation

Website details—HTML, links, bookmarks, etc.

Don’t Leave Digital Finger Prints!

Every time you surf the Internet, your IP address is publicly

visible to everyone on target network resources. There are

numerous Internet proxy servers offering anonymous Web

browsing capability (www.hidemyass.com and

www.torproject.org are two such examples). Accessing

websites via these proxies hides your public IP address

from Web servers, helping to protect your identity online.

Remember that when using a proxy server, you give them

your ID. Proxy and VPN services are recommended when

investigating online as they re-route your Internet traffic

and change your IP.

A proxy is like a Web filter—it will only secure traffic

via the Internet browser using the proxy server settings.

A VPN encrypts all of your traffic—VPNs replace your

ISP and route all traffic through the VPN server,

including all programs and applications.

Other things to consider when protecting yourself online:

Browse the Internet safely by using a secure Web

browser such as Firefox and always run the updates

when released.

Turn on your browser’s “private mode,” usually found

under Preferences, Tools, or Settings.

Use the privacy settings on social networks such as

Facebook and use a strong password.

Clear out temporary Internet files, cache, and history

files (also monitor third-party cookies).

Use a search engine such as DuckDuckGo that

distinguishes itself with a “We do not track” feature.

Secure wireless networks as unprotected Wi-Fi

(wireless) networks are vulnerable.

Page 25: ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND …...IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet address and

ASSISTING YOUR FRAUD EXAMINATION WITH ONLINE AND OPEN SOURCE INTELLIGENCE

2014 ACFE European Fraud Conference ©2014 24

NOTES Enable WPA2 (Wi-Fi Protected Access).

Do not auto-connect to open Wi-Fi networks.

Be careful which Wi-Fi hotspots you connect to.

Install firewalls onto your IT systems to prevent outside

parties from gaining access to information.

Keep anti-virus and anti-spyware software up-to-date

and download the latest security updates.

Use strong passwords for online login and always

ensure that you are on a secure site before leaving any

sensitive information (https).

Use encryption to protect information contained in

emails or stored on laptops or other portable devices

such as memory sticks.

How Safe Is Your Web Browser?

Panopticlick is an online tool by the Electronic Frontier

Foundation (EFF) that tests your browser with one click. It

shows you the browser’s characteristics, including plugins,

screen size, time zone, and others. From this information it

detects how unique your browser is and how easily it can

be identified by the owners of the websites you visit online.

To test your browser visit https://panopticlick.eff.org.

Useful Links: Email Privacy

www.hushmail.com

www.riseup.net/en

www.zoho.com/mail

Useful Links: Shield IP via VPN (fee required)

www.witopia.net

www.privatvpn.se/en

www.strongvpn.com

Useful Links: Browser Add-on for Privacy

www.ghostery.com

www.abine.com/dntdetail.php


Recommended