CONSIDERATIONS FOR E-FORENSICS: INSIGHTS INTO IMPLICATIONS OF UNCOORDINATED TECHNICAL, ORGANISATIONAL AND LEGAL RESPONSES TO ILLEGAL OR INAPPROPRIATE ON-LINE BEHAVIOURS

Authors

  • Vlasti Broucek
  • Paul Turner

DOI:

https://doi.org/10.47839/ijc.4.2.333

Keywords:

Behaviour, Computer Misuse, e-Crime, e-Forensics, e-Security, Law, Privacy

Abstract

The growing incidence of e-crime and computer misuse has increased demand for effective defensive and offensive solutions. Most responses have tended to focus on discrete sets of technical, organisational or legal challenges, but there is increasing recognition of the need for more integrated solutions that balance security, individual privacy and the generation of legally admissible digital evidence. More importantly, there is also proof to indicate that these fragmented approaches are impairing their own effectiveness due to the inter-relatedness of challenges faced. This research paper adopts an e-forensic approach to examine the links between technical, organisational and legal responses to the challenges posed by illegal or inappropriate on-line behaviour. The paper acknowledges some of the numerous challenges that remain unresolved in each approach and argues that future developments must be focused on integrated and balanced solutions that are calibrated to address the dynamic and multi-faceted nature of the forensic computing domain.

References

D. E. Denning, Activism, Hacktivism, and Cyberterrorism: The Internet as a Tool for Influencing Foreign Policy, 1999.

B. Etter, Evaluating the Capacity to Respond to E-Crime, Australasian Centre For Policing Research, 2000.

B. Etter, Working in Partnership: The Australasian Response to Electronic Crime, Australasian Centre For Policing Research, 2000.

B. Etter, The Challenges of E-Crime for Australasian Law Enforcement, Australasian Centre For Policing Research, 2000.

Australian Computer Emergency Response Team, The Australian Computer Crime and Security Survey 2004, 2004.

B. Etter, The Forensic Challenges of E-Crime, Australasian Centre For Policing Research, 2001.

V. Broucek and P. Turner, Forensic Computing: Developing a Conceptual Approach for an Emerging Academic Discipline, in H. Armstrong, ed., 5th Australian Security Research Symposium, School of Computer and Information Sciences, Faculty of Communications, Health and Science, Edith Cowan University, Western Australia, Perth, Australia, 2001, pp. 55-68.

V. Broucek and P. Turner, Forensic Computing: Developing a Conceptual Approach in the Era of Information Warfare, Journal of Information Warfare, 1 (2001), pp. 95-108.

M. Hannan, S. Frings, V. Broucek and P. Turner, Forensic Computing Theory & Practice: Towards developing a methodology for a standardised approach to Computer misuse, in S.-A. Kinght, ed., 1st Australian Computer, Network & Information Forensics Conference, Perth, WA, Australia, 2003.

M. Hannan, P. Turner and V. Broucek, Refining the Taxonomy of Forensic Computing in the Era of E-crime: Insights from a Survey of Australian Forensic Computing Investigation (FCI) Teams., 4th Australian Information Warfare and IT Security Conference, Adelaide, SA, Australia, 2003, pp. 151-158.

V. Broucek, P. Turner and S. Frings, Music piracy, universities and the Australian Federal Court: Issues for forensic computing specialists, Computer Law & Security Report, 21 (2005), pp. 30-37.

M. Hannan and P. Turner, The Last Mile: Applying Traditional Methods for Perpetrator Identification in Forensic Computing Investigations, 3rd European Conference on Information Warfare and Security, Royal Holloway, University of London, 2004.

A. Rathmell and L. Valeri, Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries, 2003.

V. Broucek and P. Turner, Intrusion Detection: Issues and Challenges in Evidence Acquisition, International Review of Law, Computers and Technology, 18 (2004), pp. 149-164.

V. Broucek and P. Turner, Risks and Solutions to problems arising from illegal or Inappropriate On-line Behaviours: Two Core Debates within Forensic Computing., in U. E. Gattiker, ed., EICAR Conference Best Paper Proceedings, EICAR, Berlin, Germany, 2002, pp. 206-219.

P. Sommer, Intrusion Detection Systems as Evidence, Recent Advances in Intrusion Detection - RAID'98, Louvain-la-Neuve, Belgium, 1998.

P. Sommer, Digital Footprints: Assessing Computer Evidence, Criminal Law Review Special Edition (1998), pp. 61-78.

P. Sommer, Intrusion Detection Systems as Evidence, Computer Networks, 31 (1999), pp. 2477-2487.

A. Arona, D. Bruschi and E. Rosti, Adding availability to log services of untrusted machines, 15th Annual Computer Security Applications Conference (ACSAC'99), IEEE Comput. Soc, Los Alamitos, CA, USA, Phoenix, AZ, USA, 1999, pp. 199-206.

M. Handley, V. Paxson and C. Kreibich, Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics, 10th USENIX Security Symposium, Washington, DC, USA, 2001.

J. Biskup and U. Flegel, On Pseudonymization of Audit Data for Intrusion Detection, Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, Berlin, Heidelberg, Berkeley, California, 2000, pp. 161-180.

J. Biskup and U. Flegel, Transaction-Based Pseudonyms in Audit-Data for Privacy Respecting Intrusion Detection, Third International Workshop on Recent Advances in Intrusion Detection (RAID 2000), Springer-Verlag, Berlin, Heidelberg, Toulouse, France, 2000, pp. 28-48.

J. Biskup and U. Flegel, Threshold-Based Identity Recovery for Privacy Enhanced Applications, 7th ACM Conference on Computer and Communications Security (CCS 2000), ACM, Athens, Greece, 2000, pp. 71-79.

E. Lundin, Anomaly-based intrusion detection: privacy concerns and other problems, Computer Networks, 34 (2000), pp. 623-640.

E. Lundin and E. Jonsson, Privacy vs Intrusion Detection Analysis, The 2nd International Workshop on Recent Advances in Intrusion Detection (RAID'99), Lafayette, Indiana, USA, 1999.

H. Kvarnstrom, E. Lundin and E. Jonsson, Combining fraud and intrusion detection - meeting new requirements, The fifth Nordic Workshop on Secure IT systems (NordSec2000), Reykjavik, Iceland, 2000.

M. Sobirey, S. Fischer-Hubner and K. Rannenberg, Pseudonymous audit for privacy enhanced intrusion detection, in L. Yngstrom and J. Carlsen, eds., IFIP TC11 13th International Conference on Information Security (SEC'97), Chapman & Hall, London, UK, Copenhagen, Denmark, 1997, pp. 151-163.

V. Broucek and P. Turner, E-mail and WWW browsers: A Forensic Computing perspective on the need for improved user education for information systems security management., in M. Khosrow-Pour, ed., 2002 Information Resources Management Association International Conference, IDEA Group, Seattle Washington, USA, 2002, pp. 931-932.

M. T. Dishaw, Monitoring Internet Use In the Workplace: Caution is Advised, in M. Khosrow-Pour, ed., 2002 Information Resources Management Association International Conference, Idea Group Publishing, Seattle, WA, USA, 2002, pp. 175-178.

V. Broucek and P. Turner, Computer Incident Investigations: e-forensic Insights on Evidence Acquisition, in U. E. Gattiker, ed., EICAR Conference Best Paper Proceedings, EICAR, Luxembourg, Grand Duchy of Luxembourg, 2004.

V. Broucek and P. Turner, Bridging the Divide: Rising Awareness of Forensic Issues amongst Systems Administrators, 3rd International System Administration and Networking Conference, Maastricht, The Netherlands, 2002.

V. Broucek, S. Frings and P. Turner, The Federal Court, the Music Industry and the Universities: Lessons for Forensic Computing Specialists, in C. Valli and M. Warren, eds., 1st Australian Computer, Network & Information Forensics Conference, Perth, WA, Australia, 2003.

Downloads

Published

2014-08-01

How to Cite

Broucek, V., & Turner, P. (2014). CONSIDERATIONS FOR E-FORENSICS: INSIGHTS INTO IMPLICATIONS OF UNCOORDINATED TECHNICAL, ORGANISATIONAL AND LEGAL RESPONSES TO ILLEGAL OR INAPPROPRIATE ON-LINE BEHAVIOURS. International Journal of Computing, 4(2), 17-25. https://doi.org/10.47839/ijc.4.2.333

Issue

Section

Articles