150 likes | 248 Views
Information Terrorism from IT Forensics Perspective. Zsolt Illési illesi.zsolt@mail.duf.hu. Topics. terrorism & information technology forensic investigation issues to-do-list. Terrorism & Information Technology. definition uncertainties: information| cyber| computer
E N D
Information TerrorismfromIT Forensics Perspective Zsolt Illésiillesi.zsolt@mail.duf.hu
Topics • terrorism & information technology • forensic investigation issues • to-do-list
Terrorism &Information Technology • definition uncertainties: • information| cyber| computer • crime| terrorism| war[fare] • hacking, cracking, hacktivism
Security Players defender attacker user pathfinder
Locard’s Exchange Principle • ‚everywhere you go,you take something with you,and you leavesomething behind’ • provide link between • crime scene(s) • victim(s) • perpetrator(s)
Computers, Crime, and Criminal Investigations all IT resources can be: • target • implementation/commitment tool/environment • symbol • witness of a (computer) crime
Computer Investigation Target • DEO ≡ digital evidence object • files • data structures • data elements (metadata) • configuration elements (control data, settings etc.) DEO serves as evidence element.
Evidence in general • data relates to relevant points of a case • all together suitable establishing the facts (supporting the claims), ex-post reconstructions
Problems • ‚questions & answers’ • ‚needle in a haystack’ • constant development in IT
Investigator Questions& Answers • who? individual(s) involved • what? nature of events that occurred • where? crime scene • when? timeline of events • why? motivation of the offense • how? used tools or exploits
Data Flux Issue • Windows 7 • size on a hdd: 16GB+ • number of files: 80,000+ • number of folders: 18,000+ And that’s only the operating on one computer…
Analysis Care Issue • thoroughness → time consuming • time money • inaccuracy → missing important data • cannot prove guilt • cannot prove innocence
Recent Methodology Evolution dead systems • well defined analysis steps • copy of memory or storage • trusted (forensic) environment • trusted tools live systems • evolvinganalysissteps • original memory or storage content • unclean (live) environment • undecided tools
Future Methodology Evolution • cloud • encryption • artificial ignorance • artificial intelligence • data mining
To-Do List • IT forensics support & research initiation • ‚hash factory’ set up • methodologies • tools • organisational cooperation improvement • national • EU • international • funding forensic experts • complex toolset • full-time professional (forensics) engagement