Defense Fails To Rattle Computer Forensics Expert In UBS Trial
The prosecution's forensics expert and star witness sparred with the defense Wednesday, taking on often heated questions about hackers and the validity of his analysis.
Newark, N.J. - The government's forensics investigator stood up to an aggressive cross-examination from the defense Wednesday during his fourth day on the stand in the computer sabotage trial of a former systems administrator.
Forensics investigator Keith Jones has plotted a digital trail from the UBS network to the defendant's home computer.
Keith Jones, director of computer forensics and incident response at Mandiant, an information security company based in Alexandria, Va., withstood an hour and a half of often contentious questioning from Chris Adams, the lead defense attorney for Roger Duronio, who is being tried on federal charges for allegedly building and planting malicious code that took down the main host server, along with about 2,000 branch servers, at UBS PaineWebber four years ago. The attack knocked the investment firm's brokers offline for a day to several weeks in some cases.
But before being cross-examined, Jones wrapped up his more than 10 hours on the stand by pulling together the conclusions he formed from his forensics investigation that had him wading through months of UBS VPN logs, IP addresses, root access logs, and login/logout records. For days now, he has testified about piecing together a digital trail that led from Duronio's home in Bogota, N.J., into the UBS network where the components of the logic bomb were created.
''What would the person who did this have to know?'' asked Assistant U.S. Attorney Mauro Wolfe, lead prosecutor in this four-week-old trial.
''You would have to know that the [UBS] VPN exists,'' said Jones, who had previously testified that all forensics roads led to Duronio. ''You would have to know where the VPN is. Where to get the VPN software to connect. Where the branch servers are and their importance. You'd have to know Unix, and how to script in Unix, and C programming, and specifically C programming for Unix. You'd have to know Roger Duronio's username and his password. You'd have to have physical access to UBS [on one particular day]. And you'd have to have physical access to Mr. Duronio's house.''
He also testified that the culprit had to specifically have had Duronio's VPN username and password, along with his Unix username and password.
2014 Next-Gen WAN SurveyWhile 68% say demand for WAN bandwidth will increase, just 15% are in the process of bringing new services or more capacity online now. For 26%, cost is the problem. Enter vendors from Aryaka to Cisco to Pertino, all looking to use cloud to transform how IT delivers wide-area connectivity.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
Join InformationWeek’s Lorna Garey and Mike Healey, president of Yeoman Technology Group, an engineering and research firm focused on maximizing technology investments, to discuss the right way to go digital.