Names: nelson j. Chirwa course: computer hacking forensics investigation student number



Download 449.11 Kb.
Page7/8
Date25.06.2017
Size449.11 Kb.
#21765
1   2   3   4   5   6   7   8

SYSLOGD_OPTIONS=“-m 0”

The administrator must add the -r flag to the options being passed to syslog:



SYSLOGD_OPTIONS=“-m 0 -r”

The -r option opens the syslog daemon port 514 and makes syslog listen for incoming log information.

• In the file /etc/sysconfig/syslog, there is a line similar to the above line. The administrator needs to add the -r flag to this line also.

• The administrator needs to integrate the syslog daemon service into the

/etc/services files. Syslog 514/udp

The administrator must run the following command after altering the three files:



/sbin/service syslog restart

A reference should appear in the var/log/messages file indicating that the remote syslog server is running.

The syslog server can be added to the /etc/syslogd.conf file in the client, which can preserve an audit trail even if a cracker does an rm -rf.

Other servers can be configured to log their messages to the remote server by modifying the action field in the syslog.conf as:



Auth.* @myhost
Tool: Syslog-ng
Syslog-ng is a flexible and scalable audit-processing tool. It offers a centralized and securely stored log for all the devices on a network.

The following are some of the features of Syslog-ng:

• It guarantees the availability of logs.

• It is compatible with a wide variety of platforms.

• It is used in heavily firewalled environments.

• It offers proven robustness.

• It allows a user to manage audit trails flexibly.

• It has customizable data mining and analysis capabilities.

• It allows a user to filter based on message content.
8. Analysis of Laser and Inkjet Prints Using Spectroscopic

Methods for Forensic Identification of Questioned Documents
Lukáš Gál, Michaela Belovičová, Michal Oravec, Miroslava Palková, Michal Čeppan

Slovak University of Technology in Bratislava, Faculty of Chemical and Food

Technology, Institute of Polymer Materials, Department of Graphic Arts Technology and Applied Photochemistry

Abstract:

The spectral properties in UV-VIS-NIR and IR regions of laser and inkjet prints were studied for the purposes of forensic analysis of documents. The procedures of measurements and processing of spectra of printed documents using fibre optics reflectance spectroscopy in UV-VIS and NIR region, FTIR-ATR with diamond/ZnSe and germanium crystals were optimized. It was found that the shapes of spectra of various black laser jet prints and inkjet prints generally differ in the spectral regions UV-VIS-NIR and IR. However, the resolution of individual spectra, and hence of individual printers, based on the simple visual comparison is not reliable enough. However, using of these spectra for identification of individual printers should be enhanced by computational chemometric methods

Keywords: document, spectroscopy, laser, inkjet
Introduction

In the realm of interesting facts frequently cited, a major legal step with strong implications for

Questioned Documents examination was taken in 1562 when the English Parliament decreed forgery as a statutory offense. The damages incurred by forgery were considered so severe that in 1634 it was made a capital offense, which it remained for more than two hundred years.

Thus, the crime of forgery was established in the sixteenth century, and in 1684 it was ruled that “comparison of hands is without doubt good evidence in cases of treason” (R v. Hayes, 10 State

Tr. 307).

The protecting copyright and verifying authenticity is very important in each aspects of our life.

The documents like agreements, wills, and ownership of properties, judicial papers, and educational certificates or other commonly used documents in economy and society are used every day. Document is any material that contains printed information conveying some meaning or a message. With the growing of new technologies creation documents increased too. However, the exchange principle, now called Contact Traces, first articulated by Edmond

Locard in 1910 give us an advantage in this direction: “One cannot come into contact with an environment without changing it in some way”

The graphic documents represent a complex system of underlay and material structure of own graphical information (inks, toners, colours…) and substrate (usually paper) with mutual complex interactions of components, which are represented on document properties.

Observation of authenticity and other characteristics of graphical documents are approached to from several directions. A basic process is material analysis of documents, i.e. determination of material characteristics of documents components, underlays and inks and layers structure in the case of multi-layered documents, which can help to investigate and clarify the facts. In practice throughout range of physical and chemical methods is used to the study and analysis of document composition and to state of graphical documents too. Currently used analytical techniques for investigation of inks and writing means pastes (TLC, HPTLC, GC-MS, and

HPLC) [2-4] requires pre-treatment of a sample – separation of analysed material from carrier (mostly paper). This approach brings several disadvantages – risk of changes of chemical structure during separation of dyes, poor solubility of some components of writing materials in extraction reagent, irreversible damage of integrity of the studied material.

Due to the character of studied objects, the methods, which allow the greatest extend of non- destructive and micro-destructive investigation have special importance, among which molecular spectroscopy methods and other optical methods (colorimetric to objective dye description, photography and micro-photography in different spectral areas, imaging photometry and image analysis) are preferably used [5-9]. Various applications of spectroscopic methods in analysis of inks [5, 8, 10], dating of inks of ball tip pens [11, 12], analysis of paper [11,

12], tonners for copiers and laser printers [13, 14], as well as forensic analysis of other materials

[15] were described in the literature.

The aim of this work was study of spectral properties of laser and inkjet prints and assessment of possibilities of non-destructive methods of molecular spectroscopy to identify laser toners and inkjet inks.

Experimental methods

Samples of prints were preparing as follows:

A model target which consists of solid surfaces, lines corresponding to the thickness of the font size 8, 10 and 12 points and characters of size 8, 10 and 12 points was designed.

Subsequently a set of prints from various types of inkjet and laser printers, using the same type of office paper for all types of printers, with standard print quality settings were prepared.

For inkjet prints only the printing in black was selected.

For laser printer’s samples with black printing settings were printed and for color laser printers the samples with CMYK printing settings were printed, too… Number of samples analysed: 15 prints of different inks for inkjet prints and 20 prints of different toners for laser prints.


Methodology of work and examination methods

UV-VIS-NIR spectroscopy

The reflectance spectra of inkjet prints in UV-VIS-NIR region area were measured on fibre optic reflectance spectroscopic system Ocean Optics, which consisting of HR 4000 spectrometer, UV-

VIS-NIR light source DH-2000-BAL and of standard adapter for measurement of reflection spectra with geometry 45/45. For each measurement, the detector was calibrated on the blank paper near to the inked area. In this way, influences of the paper were largely excluded. A measured reflectance spectra R(l) were converted to optical density spectra D(l) (1). D(λ) = log 1/R(λ) (1)

Directly obtained spectra contain a lot of points and are noisy and almost unusable without processing.

The original spectra were interpolated in the wavelength range 220-1050 nm with the step 2 nm. Then the spectra were smoothed, without significant influence on the shape using Savitzky-Golay type of filter with filtration parameters 15 points and second polynomial order. Finally, the spectra of optical densities were normalized to interval 0-1. This type of shape enhancement is more suitable for analysis. Thus obtained spectra are appropriate for further analysis.


FTIR-ATR spectroscopy

The reflectance spectra of laser prints in the Infrared region (IR) were measured on Excalibur

FTS 3000MX (Digilab, USA) spectrometer with ATR adapter with diamond crystal. The obtained spectra of laser prints were processed and normalized in the same way as in the case of UV-VIS-NIR spectra of inkjet print above.

The reflectance spectra of inkjet prints in IR region are practically useless, because absorption signals of inks penetrated deeply into the paper are overlapped by strong absorption signal of cellulose.



Results and discussion

Laser prints

Spectra are included into individual groups according to the different absorption in the wavelength range 1500-600 cm.

FTIR spectra of individual laser prints are generally different. Simple visual distinction is not unambiguous and for assignment of spectra to individual prints will the numerical, chemometric have to be used.

FTIR spectra of 2 groups of laser prints

IR spectra of diverse laser toners are different in various extents. The differences between the spectra of laser prints of different producers are more significant.

Comparison of FTIR spectra of laser prints of different producers

Inkjet prints

Comparison of normalised optical densities spectra (Figure 6) from 4 different types of prints shows, that the shapes of spectra of inks of Epson printers significantly differ from the shapes of spectra of Canon inks. The differences are most noticeable in the spectral range 600-1050 nm.

Based on these differences of shapes the possibility of resolution of individual marks of inks can be presumed.

Spectra from 4 different types of prints

The spectra of two black inks of Epson used in different types of inkjet printers are on the

There is significant bathochromic shift into the near infrared region in the spectrum of ink from the printer Epson PM-D800, so spectra of these two inks can be resolved.


Spectra of black inks of different Epson inkjet printers and Spectra of black inks of different

Canon inkjet printers.

The spectra of two black inks Canon used in different types of Canon inkjet printers are on the. The shapes of the spectra differ mainly in the spectral range 550-1050 nm. So, the resolution of these spectra and hence inks is possible.



9. Investigating Trademark and Copyright Infringement

Trademark Investigations

Brand owners invest a lot of time and resources in trademarks, and they deserve to have competent assistance to make sure that they aren’t wasting any capital. With the trademark investigation services of Kessler International at your disposal, you’ll be able to determine if someone else already holds the trademark you’re interested in or if it’s been abandoned. Our trademark in-use investigation protocols are also designed to inform you if anyone is profiting from valuable intellectual property without the permission of the owners.



Forewarned Is Forearmed

Before seriously committing to deploying any trademark, prominent organizations or their attorneys enlist us so that they can discover if the coast is legally clear. It’s far better to allow us to provide you with thorough, reliable info beforehand rather than finding yourself caught up in litigation later on. We’ll let you know:



  • If anyone is currently using a similar mark

  • How long a given mark has been in existence

  • How extensively a trademark has been used

  • The geographical distribution of a trademark

Secure Your Rights

Whether through ignorance or malice, there are many people and organizations who might unfairly employ the fruits of other people’s labor toward their own ends. We’ll endeavour to prevent this from happening with our intellectual property investigation efforts. If we uncover a case of someone illicitly profiting from the property of you or your clients, we’ll take steps to help you resolve the issue either amicably or through the legal system.



About Our Intellectual Property Investigations

In order to conduct a trademark investigation, we employ sophisticated tools, like our proprietary Web.Sweep and News.Sweep programs. They enable us to do cost-effective trademark searches across the internet as part of a comprehensive trademark in use investigation. We aren’t restricted to searching only in certain geographical areas or markets; we operate around the world. We supplement these measures with photographic evidence and undercover investigations whenever necessary. After gathering all the information we need, we’ll compile a detailed report of our findings. Our professional researchers and investigators have a wealth of knowledge and experience, so they’re well suited to the task of creating documents that lay out exactly what you wish to ascertain. We pass all our reports along to members of our senior staff, who review them for accuracy before handing them over to our clients.



Trusted by Large Enterprises

We’ve been consulted by Fortune 500 companies, who appreciate the fact that we can safeguard their brands with a meticulous trademark in use investigation. We’ve been serving our clients, including law firms and corporate counsel, for more than two decades. If you believe that it’s time for a diligent trademark investigation, then Kessler International is here to lend you a hand. Contact us today to learn more about how we can efficiently defend intellectual property rights and prevent poor investments.



  1. Case Studies

Our client, a proprietor in the wines and spirits industry retained the services of Kessler International to conduct a trademark investigation with respect to an upstart liquor company producing a beverage found to be similarly named, and using a similar logo as that of our client. Kessler conducted research, contacted key individuals, and provided the necessary findings to our client. In turn, it was requested that Kessler provide a supplemental service in light of our investigation’s results. As such, Kessler monitored the growth and expansion of the particular trademarked beverage, and consistently forwarded the results to our client to proceed in a manner they saw fit. Recently, Kessler was retained to conduct a trademark investigation on behalf of a high-end law firm. In this particular case, the law firm had been contacted by a hotel group with a growing concern that a competing entity constructing hotels would feature a currently in-use trademark. Our investigators conducted Internet and social media research to acquire any and all intelligence available on the competitor. An undercover investigator was also sent to the offices of the competitor to confirm or deny their very existence. Upon providing this information to our client, it was requested that Kessler perform an on-site visit to confirm the extent of trademark infringement. Kessler then sent an investigator to visit the construction sites to obtain additional information regarding any and all infringement of our client’s mark. In one location the currently in-use trademark was found represented within a fully-operational hotel, while the second location was found to still be under construction. Our in-depth findings were forwarded to our client. Our written report was further supplemented by top quality photographs of our on-site findings.


  1. Trademark & Copyright Infringement Investigation

The idea for your new corporate logo is decidedly brilliant. So you pursue the next step and hire an artist, who for a hefty price will immortalize your firm forever. Right? Wrong! Everyday, many companies just like yours make the mistake of committing large amounts of time and money to a trademark only to find out that another firm across the country is using the exact same image to brand their company name. How can you be sure this doesn’t happen to you? Make sure you get trademark clearance from ADSPL. We specialize in the areas of trademark search and trademark investigation.

  1. Trademark Investigation – Secure Your Brand Identity

What if you don’t? What if you go ahead with the trademark generation without a trademark in-use search or intellectual property investigation, and later find it to be identical to an already existing trademark? The ramifications could be devastating, and may undermine your firm’s financial stability. Not only would you waste large amounts of capital unnecessarily. You’d also be legally liable to pay damages to the original trademark owner, leading to financial losses that could devastate your firm’s capital structure.

  1. Trademark In Use Investigations

Should it be determined that certain trademarked materials are currently in-use, that does not mean ADSPL’S investigation stops. ADSPL has developed a number of strategies, including undercover product acquisition to verify usage or non-usage of a particular trademarked item. In addition, ADSPL’S established the Trademark Acquisition Division to function as a liaison should you so decide to purchase an existing trademark. A simple phone call to ADSPL and a meeting with a member of our expert trademark investigation research team in our Trademark Acquisition Division will lay the foundation for a complete international market survey of your proposed logo or trademark. We’ll let you know if your trademark is in use, and give you the name and contact information of the trademark owner. We’ve found that just because a trademark is owned doesn’t necessarily mean it’s being used. We’ll help you ascertain the usage or non-usage, and act as a liaison in if you decide to purchase an existing trademark.

  1. Our Trademark Investigations are Worldwide

In performing trademark investigations, ADSPL is able to determine the first date of a trademark’s use; obtain documents from governmental agencies regarding any and all filings of the trademarked material; in addition to providing information regarding the supply and distribution of a given trademarked product. As ADSPL has operations worldwide, the trademark investigations we conduct are not limited to a specific geographical region. As our fee structure is considered quite competitive, the charges associated with trademark investigations usually remain the same regardless of our client’s location.

  1. Protect Your Business from Trademark Infringement

According to recent statistics, the epidemic of trademark infringements is growing at an exponential rate. Through advancements in technology and the explosive growth of the Internet, access to your prized intellectual property is exposed, more than ever before, to unscrupulous individuals looking to cash in on your good name and reputation. These infringements, if not detected early, lead to dilution and fair market use of your properties without compensation. Intellectual property and trademark infringement suits can be difficult, exhausting your time and resources.

  1. Technology of Trademark Investigations

In an effort combat trademark infringement, ADSPL’S researchers and investigators have an array of tools at their disposal to make sure that any property that you decide to trademark is safe from infringement. At ADSPL, we’re also able to conduct full national and international market surveys of your existing trademarks. Our research has no bounds. All markets and industries can be investigated for illegal use of your intellectual property. ADSPL has been consulted by many number of prominent industry leaders to not only confirm if a trademark is available, but that in-use trademarks are being appropriately represented. Each and every of ADSPL trademark investigations are compiled into a report written by a competent team of researchers and investigators with editorial experience. Each report is reviewed by these individuals, and then subsequently reviewed for accuracy by members of the Senior Staff to ensure that our client’s receive only the most accurate results. Let the professional investigators and researchers at ADSPL handle your trademark investigations. We will protect you from infringements, and make sure you’re not found guilty of the same yourself, with efficient and cost effective solutions. When you want total protection for your prized intellectual property, call ADSPL today.

10. Investigating Child Pornography Cases

At the Neal Davis Law Firm, we handle a number of child pornography cases, and we’re often asked why it takes so long for the Government to conduct a computer forensic investigation either before or after a suspect’s arrest. We’ve seen a general pattern of investigation in these cases. It begins with law enforcement suspecting someone of possessing child pornography, usually because law enforcement has seen the suspect online upload to or download from a known child porn site. Law enforcement obtains a search warrant, goes to the suspect’s home, and seizes any items—e.g., hard drives, cell phones, or computers—that could store digital media, including child porn. Law enforcement typically tries to interview the suspect and then decides whether to make an arrest. If the suspect is not arrested at that time, and child porn is discovered after forensic evaluation of their digital media, then the suspect will be arrested later, usually within 6 to 12 months. Regardless of whether the suspect is arrested immediately or later, law enforcement submits the items suspected to contain pornography to a computer forensics unit to be analyzed. Because of the backlog of evidence waiting to be analyzed—child porn cases are much more prevalent than the public believes—this process can take several months. We’re currently seeing at least a six-month wait, sometimes up to a year, for forensic analysis to occur.

HOW THE GOVERNMENT INVESTIGATES COMPUTER CRIMES

Child pornography images and videos have a unique “hash” number assigned to them. This is a computer code that is unique to each image and video, sort of like the “Bates stamp” used to number documents submitted as evidence. The hash codes for images and videos are typically compared to a Government database of known child pornography victims. If the hash numbers match, then the Government can tie a specific pornographic image or video with a known victim. For example, suppose a particular image has a hash number of I23423594985043. The Government runs this number through a database, matches it with a 12-year-old victim named “Alexa” who was photographed in the Ukraine in the mid-1990s, and whom Ukrainian police have already confirmed was a minor at the time. If the hash numbers do not match but it appears there is a child involved, then the Government will turn to the question of whether the suspect actually made the pornography. The Government will look for anything in the image or video—location, prescription bottles, or anything else—that would confirm whether the suspect made the child pornography.





Download 449.11 Kb.

Share with your friends:
1   2   3   4   5   6   7   8




The database is protected by copyright ©ininet.org 2024
send message

    Main page