Tony Soprano's laptop

What would mob-boss Tony Soprano need in a laptop?

Tony Soprano's dislike of computers is well-known, but in 2007, it's hard to keep a business running without one. (Another argument for creator David Chase ending the show after five seasons, but too late now.) Tony knows that yesterday's bookie can't compete with a txt-ing young punk offloading his risky punts on Betfair, and that though tradition's important, sometimes old-school thinking just doesn't cut it. To stay on top, a business has to move with the times.

So how would you build a computer for the boss? Obfuscation -- just hiding things -- won't work, because interested parties have a lot of time when it comes to a high-value target like Tony. Obvious encryption probably won't work either, because knowing that passwords and keys exist is half the fight, after which one can debate the finer points of brute force versus rubber hose methods of deriving them. It's just as important to keep things simple as it is to use the right tools for the job.

When the Feds come knocking

The goal is to provide useful business computer functions -- documents, number crunching, and communications -- while minimizing exposure to forensics processes. In other words, the usual step-by-step computer forensics process followed by the feds or a nosy detective would be considered a series of attack surfaces against which the system has to provide preventative or mitigating defenses.

When law enforcement climbs in the window and finds a computer system of interest, they usually follow a series of consistent steps:

  • Deal with the person of interest and photograph the scene
  • Identify the computer system of interest, power it off, and document the details
  • Transport the hardware to a secure location for analysis, and record the process by video or other log
  • Document the system times and dates as well as the data dates and times
  • Make and verify bit-for-bit copies of hard disks, external drives, CDs or DVDs and flash memory
  • Examine the data for keywords, images, and activity
  • Examine the swap and temp files, file slack and unallocated space
  • Identify data anomalies that might expose hidden encrypted data
  • Document findings and prosecute

Network forensics people tend to box the whole previous process as "host forensics" and look further for activity in the environment where the system was situated or through which it passed. They'll usually have a look at:

  • Network devices to find where and when a system was present
  • ARP table entries to verify systems' presence and activity
  • Dates & times to correlate activity with other sources
  • Log files showing connections or sockets
  • Analyzer traces, along with any tap and trace results
  • Traffic pattern recognition to identify use patterns and anomalies
  • Data or patterns identifiable from network hashes
  • Reconstruction of sessions to derive activities and context

A lot of this assumes that systems are not mobile, and that network communications are consistent or identifiable by timing or traffic patterns. That's a good place to start.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jon Espenschied

Computerworld
Show Comments

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?