iTnews

The illusion of accuracy

By Nick Barron on Sep 19, 2007 3:44PM
The illusion of accuracy

Don't take log files as absolute truth. They're only as reliable as the systems that generated them.

It seems likely that I am one of the vanishingly small people in the country who has no interest at all in the latest Harry Potter book.

The last in a phenomenally successful series, its release was accompanied by midnight openings of bookstores, queues of fans in costumes and the like. In true 21st-century style there was also a copy leaked on the internet.

There were, of course, plenty of spyware-baited fake editions floating around but, apparently, some copies of the printed book were "accidentally" released early, and one enterprising fan decided to photograph them and distribute them online.

Although released only a week or so before the genuine article, it soon became a highly desired download on the peer-to-peer networking scene.

Presumably unknown to the budding literary pirate, the end result included some unseen and unwanted additions: metadata accompanying each image included details of the date, time, exposure and, crucially, the serial number of the camera used. This in turn means that, at least in theory, the camera can be traced to its original owner.

This sort of data creep is becoming more common, and day-to-day applications leave silent and hidden trails of activity all over the place. Usually the intentions behind this activity are entirely benign, but they can be troublesome nonetheless.

For example, Microsoft Word's habit of including much more data than you expect in its document files has caused plenty of high-profile embarrassment.

Blind trust in computer data can have serious consequences too. In the early hours of the morning on 11 March, a US school received a bomb threat to their student hotline.

The call was traced, and a 15-year-old boy, was arrested and detained for 12 days. The school's telephone system had logged the caller ID of his phone at the time the bomb threat was delivered. The school principal was confident that a dangerous criminal had been apprehended.

But the boy was innocent. The school had neglected to implement the Daylight Savings Time change to their logging system's clock, so their logs were an hour out. This is a very simple but serious example of how blindly trusting log data (or indeed any single source of evidence) can be a dangerous pastime.

Interpreting computer evidence such as log files and metadata needs careful handling. It is all too easy to be seduced by the precision offered; the exact time and date a web page was accessed, the specific "click trail" a user followed while browsing a suspicious site and so on. But this precision is illusionary. While the data is usually valid, its link to the real world, from the keyboard to the user, is often tenuous.

Log files don't show the real user, they give the network address or the user's authentication mechanism (username, password etc). Times listed are not the times the event happened, but the time indicated by the logging system. There is a subtle and fragile chain of evidence between event and logging data, and understanding it is essential to accurately interpreting the data. While things usually are what they seem, they can be very different.

When discussing the accuracy of artillery, the military uses the concept of "circular error probable" (CEP), which is an imaginary circle into which there's a 50 per cent chance your munitions will fall. The larger the CEP, the less accurate the system. Like weapons, logging systems have their own CEP equivalents, but it is rare to see any discussion of such errors.

On the occasions where I have had to present log evidence, one of the first things I put in any report is a summary of potential sources of errors.

Like all evidence, computer evidence is open to interpretation and error, but the very nature of computing can make it appear precise and reliable. Although in the legal world, strict standards are applied regarding its admissibility, in the corporate world things are often not so clear cut. It is essential to know the difference between precision and accuracy and to act accordingly.

Nick Barron is a security consultant. He can be contacted at nikb@virus.org.
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
accuracyillusionofsecuritythe

Partner Content

5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
Don't miss Australia’s premiere IoT Conference on 9th June
Promoted Content Don't miss Australia’s premiere IoT Conference on 9th June
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Nick Barron
Sep 19 2007
3:44PM
0 Comments

Related Articles

  • Geolocation threats rise following demonstration of router hacking that can pinpoint a person's home
  • Popular Python and PHP software repo-jacked
  • Quad countries to boost CERT cooperation
  • Don't miss Australia’s premiere IoT Conference on 9th June
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NSW digital driver's licences 'easily forgeable'

NSW digital driver's licences 'easily forgeable'

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

Kmart Australia re-platforms ecommerce site to AWS

Kmart Australia re-platforms ecommerce site to AWS

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

Digital Nation

CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.