Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Latest News
    • PC Hardware

    Digital Detectives Track Hacks

    Written by

    Anne Chen
    Published April 23, 2001
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      If e-business had a modern-day Sherlock Holmes, his name would be David Dittrich. Dittrich, a security manager at the University of Washington, in Seattle, is one of a rare breed of security pros—the computer forensics expert—whose skills are getting ever more precious as the number of computer crimes spirals. These are the data detectives who search for digital clues remaining on computers after malicious—or black-hat—hackers have done their dirty deeds. Sleuths like Dittrich analyze e-mail, Web site records and hard drive data, looking for clues to the identity of criminals and crackers, much like gumshoes examine crime scenes for fingerprints and stray hairs.

      Its not just the number of crimes thats fueling the need for these skills; its also the increasing sophistication of criminals. “The black-hat community is moving forward at a pace that outstrips the ability of the average system administrator or law enforcement agency,” Dittrich said.

      That means that both e-businesses and law enforcement agencies are paying plenty to find experts such as Dittrich to sift through evidence left behind at digital crime scenes, experts say. “The need for computer forensics is growing exponentially,” said John Gunn, lab director of the San Diego Regional Computer Forensics Laboratory, the first multiagency, regional computer forensics lab in the United States.

      The need is particularly acute at local, state, federal and military law enforcement agencies that host computer forensics divisions, which are looking for individuals adept at solving hacking and intellectual property cases. And an increasing number of corporations are using computer forensics to resolve internal matters such as fraud, violations of trade secrets and inappropriate use of company computers, according to Lee Kushner, CEO of information security recruiting company L.J. Kushner and Associates LLC, in Freehold, N.J.

      Gunn said the job is intense and tedious and requires nerves of steel. Most specialists at the San Diego RCFL have years of programming or computer- related experience, strong analytical skills, and the patience to invest days taking apart a computer in search of evidence. And if things keep going the way they are, it probably wont hurt if these experts didnt mind overtime. Last year, the San Diego RCFL closed 400 computer-related cases. This year, Gunn expects the number of cases to double.

      Other professional attributes needed to catch a thief, experts say, are strong computer science fundamentals, a broad understanding of security vulnerabilities and strong system administration skills. Dittrich, who has been analyzing compromised systems and reconstructing the events since the early 1990s, uses these skills to seek information to reconstruct how a system was hacked. “The number and complexity of intrusions has increased at an alarming rate. Ive been forced to find ways … to try to keep up with intruder tools as they have progressed in sophistication,” Dittrich said.

      Experts gather this data and create an audit trail for criminal prosecutions. They search for information that may be encrypted or hidden, along with unallocated disk space. Most cunningly of all, they set traps using vulnerable computers to lure malicious hackers into giving away themselves and their techniques.

      Dittrich stressed that computer forensics specialists must have strong analytic skills and excellent verbal and written communication skills. Thats because theyre required to document their findings in detail, and they often testify at criminal trials.

      The demand is being answered by several educational facilities, including the University of Central Florida, in Orlando, which offers a graduate certificate degree in computer forensics. The International Association of Computer Investigative Specialists, based in Donahue, Iowa, offers certification for computer forensics examiners. Demand for such courses is so high that the associations fall classes are already full.

      Such courses are helpful for those IT managers or individuals who lack computer programming experience but who want to make the leap into computer forensics. Gunn, who conducted general investigations for the FBI before joining the RCFL, got up to speed with training courses offered by the FBI.

      Computer forensics specialists like Gunn caution that IT managers interested in pursuing computer forensics as a career shouldnt expect that just by taking a few courses in the subject, theyll be able to track some of the worlds slyest hackers. The specialty is a tough discipline in a fast-moving industry that requires highly trained professionals dedicated to continued learning, he said.

      Thats because, as experts like Dittrich say, theres no way to stay ahead of the crooks. White-hat hackers at this point can only try to narrow the gap between themselves and the bad guys—and hope that the black-hat hackers dont get too fastidious when it comes to leaving behind digital footprints.

      Anne Chen
      Anne Chen
      As a senior writer for eWEEK Labs, Anne writes articles pertaining to IT professionals and the best practices for technology implementation. Anne covers the deployment issues and the business drivers related to technologies including databases, wireless, security and network operating systems. Anne joined eWeek in 1999 as a writer for eWeek's eBiz Strategies section before moving over to Labs in 2001. Prior to eWeek, she covered business and technology at the San Jose Mercury News and at the Contra Costa Times.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.