150 likes | 259 Vues
This study delves into the critical connection between terrorism and information technology, emphasizing forensic investigation challenges. By examining the nuances of cybercrime, including hacking and hacktivism, the research highlights how digital evidence can be instrumental in resolving cases. Key issues such as data management, evidence collection, and the evolution of forensic methodologies in relation to cloud computing and AI are addressed. With an emphasis on collaboration and resource enhancement, this paper aims to improve forensic practices within the context of modern threats.
E N D
Information TerrorismfromIT Forensics Perspective Zsolt Illésiillesi.zsolt@mail.duf.hu
Topics • terrorism & information technology • forensic investigation issues • to-do-list
Terrorism &Information Technology • definition uncertainties: • information| cyber| computer • crime| terrorism| war[fare] • hacking, cracking, hacktivism
Security Players defender attacker user pathfinder
Locard’s Exchange Principle • ‚everywhere you go,you take something with you,and you leavesomething behind’ • provide link between • crime scene(s) • victim(s) • perpetrator(s)
Computers, Crime, and Criminal Investigations all IT resources can be: • target • implementation/commitment tool/environment • symbol • witness of a (computer) crime
Computer Investigation Target • DEO ≡ digital evidence object • files • data structures • data elements (metadata) • configuration elements (control data, settings etc.) DEO serves as evidence element.
Evidence in general • data relates to relevant points of a case • all together suitable establishing the facts (supporting the claims), ex-post reconstructions
Problems • ‚questions & answers’ • ‚needle in a haystack’ • constant development in IT
Investigator Questions& Answers • who? individual(s) involved • what? nature of events that occurred • where? crime scene • when? timeline of events • why? motivation of the offense • how? used tools or exploits
Data Flux Issue • Windows 7 • size on a hdd: 16GB+ • number of files: 80,000+ • number of folders: 18,000+ And that’s only the operating on one computer…
Analysis Care Issue • thoroughness → time consuming • time money • inaccuracy → missing important data • cannot prove guilt • cannot prove innocence
Recent Methodology Evolution dead systems • well defined analysis steps • copy of memory or storage • trusted (forensic) environment • trusted tools live systems • evolvinganalysissteps • original memory or storage content • unclean (live) environment • undecided tools
Future Methodology Evolution • cloud • encryption • artificial ignorance • artificial intelligence • data mining
To-Do List • IT forensics support & research initiation • ‚hash factory’ set up • methodologies • tools • organisational cooperation improvement • national • EU • international • funding forensic experts • complex toolset • full-time professional (forensics) engagement