Automating Aspects of Forensic Case Management 1 G Nor, I Sutherland, AJC Blyth

Automating Aspects of Forensic Case Management 1 G Nor, I Sutherland, AJC Blyth

Volume 17, Issue 4, Fall 2018 ISSN 1445-3312 (Printed Journal) JOURNAL OF INFORMATION WARFARE ISSN 1445-3347 (Online Journal) Journal of Vo Information lume 17 Issue 4 Warfare Fall 2018 Journal of Information Warfare (JIW) www.jinfowar.com Journal Staff Authors’ Responsibilities & Copyright Chief Editor Authors are to ensure the accuracy of their papers. This Dr. Leigh Armistead journal does not accept any responsibility for statements made by authors in their written papers. Where Assistant Editor relevant, authors are to ensure that the contents Dr. William Hutchinson of their papers are cleared for publication, for example, by their employer, their client, the funding organization, Deputy Editor in Chief and/or copyright owner of any material that is Dr. Diane Silver reproduced. Technical Editor Copyright of the article is retained by the authors who Dr. Marla Weitzman warrant that they are the copyright owner and have in no way infringed any third- party copyright. In submitting Editorial and Technical Advisor the article for publication, the above warrant is implied as Zachary Hubbard is the grant of a non-exclusive copyright license by the author to the Journal of Information Warfare to publish Administrative and Editorial the work as determined by the Editorial Board. Assistant Angel Linzy The views expressed by contributors do not necessarily represent those of the editors, advisory board, or the Editorial Board publishers. S. Furnell J. Lopez J. Slay P. Williams Subscriptions H. Armstrong C. Irvine The Journal of Information Warfare is published four C. Bolan A. Jones times per year and is available both online and in hard G. Duczynski W. Mahoney copy. A. Ahmad C. Valli M. Henson A. Liaropoulos Individual; Individual, Student; and Corporate subscriptions are available. For current pricing, see Advisory Board http://www.jinforwar.com/subscribe/. Dr. Corey Schou Idaho State University, Idaho, United States Individual A one-year subscription to the journal for individual Professor Matthew Warren subscribers. Both online-only and, online and print Deakin University, Melbourne, Australia subscriptions are available. Dr. Brett van Niekerk Individual, Student University of KwaZulu-Natal, Durban, SA A one-year subscription to the journal for students. Evidence of full-time study must be provided. Both Scope online-only and, online and print subscriptions are The journal has been created to provide a forum for available. discussion, information, and interaction between practitioners and academics in the broad discipline of Corporate information warfare/operations. It is of interest to A one-year subscription to the journal for professionals from the military, government, commerce, corporate/library subscribers. Both online-only and, industry, education, and academy. online and print subscriptions are available. A single subscription covers unlimited use for a single A full gambit of topics is covered—from the physical campus/geographic location. destruction of information systems to the psychological aspects of information use. The aim is to provide a Note: Individual print copies of the journal are definitive publication that makes available the latest generally available for purchase only to subscribers thinking and research in the critical area of information and contributors. warfare. All advertisements in this journal are printed free of Submissions charge as a service to readers. The journal welcomes submissions. To learn more about preparing articles for submission, authors should visit the Journal cover design, concept, and layout by Laima Croft. JIW website. Articles may be submitted to Diane Silver at [email protected] or Angel Linzy at [email protected]. Journal of Information Warfare Volume 17, Issue 4 Fall 2018 Contents From the Editor i L. Armistead Authors ii Automating Aspects of Forensic Case Management 1 G Nor, I Sutherland, AJC Blyth Towards a Literature Review on Cyber Counterintelligence 11 PC Duvenage, VJ Jaquire, SH von Solms Conducting Investigations on the Dark Web 26 C Easttom On the Use of Ontology Data for Protecting Critical Infrastructures 38 J Henriques, F Caldeira, T Cruz, P Simões A Cultural Exploration of Social Media Manipulators 56 C Sample, J McAlaney, JZ Bakdash, H Thackray Implications of Privacy & Security Research for the Upcoming Battlefield ofThings 72 L Fritsch, S Fischer-Hübner Behavioral Profiling for Transparent Verification in Cloud Storage Services 88 B Al-Bayati, N Clarke, P Haskell-Dowland, F Li Cyber-Securing Super Bowl 50: What Can a Live-Fire Football Match Teach Students 106 about Becoming Better Cyber Security Professionals? MW Bovee, HOL Read Journal of Information Warfare © Copyright 2019 Published by Peregrine Technical Solutions, LLC Yorktown, Virginia, USA Print Version ISSN 1445-3312 Online Version ISSN 1445-3347 From the Editor Fall 2019 Information has always been regarded as an element of power. Too often, however, it has been seen as an enabling or supporting component rather than as the mission-critical element it frequently is in conducting operations. Indeed, the very nature of modern-day operations, with its persuasive and never-ending 24-7 global media coverage, has time and again demonstrated the need for actors and nation-states to utilise all the tools or elements of power at their disposal. To be sure, information must be considered a vital compo- nent in any sort of influence type of operations. However, the factors that make information useful as an element of power are also adding to the difficul- ties nation-states face in their efforts to conduct information campaigns, or IO, on a successful basis. The shifting of power away from a centralised authority, the loss of control from the federal bureaucracy, and the low cost as well as ease of entry into this domain have combined to create a fundamental change in the ways that information is and can be utilised around the world. The advent of new information-technology capabilities has certainly benefited elements of society: non-gov- ernmental organisations, non-state actors, corporations, individuals, and—unfortunately—terrorists. But it has also radically altered the methods by which the administration and other branches of the federal govern- ment can interact with their counterparts around the world. At the centre of the issue is a lack of control— control of content, flow, and paths of communication. Consequently, despite the heightened expectations understandably fostered by the increased capabilities inherent in IO, governmental entities struggle and often fail to construct successful information campaigns and operations. There is no coherent theoretical construct, definition, or taxonomy—instead, there is a virtual smorgasbord of training classes with varying curricula and content, none of which are integrated or coordinated. In general, too much is expected, and too much has been promised. With no radical changes in funding across these agencies, it is no surprise that progress has overall been disappointing. While the Journal of Information Warfare cannot solve all of these issues, it can and will continue to provide a forum for voices and theories and research and especially conversations that can and will contribute to the real and significant progress we have every reason to expect. Join the conversation with us at one or more of the professional conferences slated for the coming year. The next event is the 18th European Conference on Cyber Warfare & Security, which will be held at the University of Coimbra in Portugal in July 2019. The Australians usually host their Edith Cowan University Security Research Institute in Perth, Australia, in early December of each year, with an event that hosts five different security-based conferences over these three days. In March 2020, the 15th ICCWS will convene at Old Dominion University in Norfolk, VA. Finally, we are always looking for good reviewers for JIW. If you are interested, please contact me (larmi- [email protected]) or email our staff at [email protected]. Members of our review board help us conduct our double-blind, peer- reviewed assessment; appear on the journal’s masthead; and get a free online subscrip- tion during each year of their service. Cheers, Dr Leigh Armistead, CISSP Chief Editor, Journal of Information Warfare [email protected] Journal of Information Warfare i Authors Burhan Al-Bayati is currently a Dr. Matthew Bovee is the As- final-year PhD candidate at the sociate Director of the Comput- Centre for Security, Commu- er Science/Computer Security nications & Network Research & Information Assurance pro- at the University of Plymouth gram at the Norwich Universi- (UK). He holds a BSC in com- ty School of Business & Man- puting from Baghdad Universi- agement. As Lecturer there, he ty (Iraq), 2002, and an MSC in teaches general and specialist computing from Pune University courses in computer science, (India), 2008-2010. Burhan’s re- digital forensics, and comput- search interests include information security, biomet- er security. In addition to cyber security and digital ric authentication, and cloud security. forensics, Dr. Bovee’s background includes research, publications, and degrees in accounting and informa- tion systems and exercise physiology. Jonathan Z. Bakdash received the PhD degree in psychology in Filipe Caldeira is an Adjunct 2010 from the University of Vir- Professor at the Informatics ginia. He is a Research Psychol- Department of the Polytechnic ogist with the Human Research Institute of Viseu, Portugal. He and Engineering Directorate, obtained his PhD degree in In- U.S. Army Research Laborato- formatics Engineering in 2014 ry, South Field Element, at the from the Faculty of Sciences University of Texas, Dallas. His and Technology of the Universi- research interests include human ty of Coimbra. He has acted as decision-making, human-machine interaction, and cy- program director of the Infor- ber security. matics Engineering program since 2014. He is also a researcher at the Centre for Informatics and Systems of the University of Coimbra and at the CI&DETS re- Dr. Andrew Blyth, formally search center of the Polytechnic Institute of Viseu.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    127 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us