12.11.2012 Views

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

Examination of Firearms Review: 2007 to 2010 - Interpol

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.3 Security and Encryption<br />

Blue<strong>to</strong>oth enabled devices have become widely available and readily<br />

accessible <strong>to</strong> consumers in the form <strong>of</strong> mobile phones, lap<strong>to</strong>p computers<br />

and GPS navigation systems. Browning has described Blue<strong>to</strong>oth<br />

technology <strong>to</strong> be vulnerable <strong>to</strong> hacking measures (9). In the case <strong>of</strong><br />

mobile phones, Blue<strong>to</strong>oth technology may provide an opportunity for<br />

someone <strong>to</strong> listen <strong>to</strong> phone conversations or read text messages without<br />

the authorized user’s knowledge. Moreover, calls or texts may be made<br />

without authorization (10).<br />

Wireless access points have also emerged rapidly <strong>to</strong> provide consumers<br />

with widely accessible, immediate ad in many cases free and unrestricted<br />

access <strong>to</strong> the internet. Inherent in this technology is the vulnerability <strong>of</strong> the<br />

network provider and consumer <strong>to</strong> criminal liability or violation. Network<br />

users may be exposed <strong>to</strong> security vulnerabilities and unwittingly place<br />

personal information at risk <strong>of</strong> discovery or manipulation. The network<br />

provider may be exposed by providing a network <strong>to</strong> be abused for criminal<br />

purposes. Herein lies a further challenge <strong>to</strong> the digital forensic<br />

investiga<strong>to</strong>r. Takahashia reports that network pro<strong>to</strong>col analyzers, typically<br />

developed for network performance analyses, may provide an investigative<br />

<strong>to</strong>ol <strong>to</strong> investigate such network criminality (11). Takahashia reports that<br />

some characteristics in IEEE 802. (11) Traffic particularly help identify<br />

network users. Like actual human fingerprints, there are also unique traffic<br />

characteristics for each network user. They are called network user<br />

fingerprints, by tracking which more than half <strong>of</strong> network users can be<br />

connected <strong>to</strong> their traffic even with medium access control (MAC) layer<br />

pseudonyms. The concept <strong>of</strong> network user fingerprints is likely <strong>to</strong> be a<br />

powerful <strong>to</strong>ol for intrusion detection and digital forensics in the future (12.)<br />

Growth in the use <strong>of</strong> and sophistication <strong>of</strong> digital encryption will require law<br />

enforcement agencies <strong>to</strong> develop critical investigative skills. Dr Glen<br />

Dardick, Longwood University states that current level <strong>of</strong> sophistication and<br />

potential for spoliation and tampering with evidence going undiscovered is<br />

a cause for concern (13). Applications and systems are increasingly<br />

becoming more sensitive <strong>to</strong> the privacy needs <strong>of</strong> individuals. These<br />

systems may not necessarily be deleting evidence. They may not be<br />

creating evidence in the first place. Applications with the specific purpose<br />

<strong>of</strong> deleting evidence (e.g. Evidence Elimina<strong>to</strong>r, Times<strong>to</strong>mp) have now<br />

become <strong>of</strong>f the shelf s<strong>of</strong>tware. Dardick argues that if the digital forensic<br />

expert is a finder <strong>of</strong> fact, then that expert may be finding those facts more<br />

difficult <strong>to</strong> discover. The role <strong>of</strong> the digital forensics expert is now much<br />

more than a finder <strong>of</strong> fact. The expert needs <strong>to</strong> develop further critical<br />

investigative skill relevant <strong>to</strong> counter anti forensics. It maybe necessary <strong>to</strong><br />

locate evidence <strong>of</strong> spoliation rather than the evidence itself. A clever<br />

analogy presented was one involving the needle in a haystack. In a digital<br />

world it maybe that a copy <strong>of</strong> a haystack is used <strong>to</strong> cover the needle (e.g.<br />

overwriting). It is the haystack and not the needle that becomes crucial<br />

evidence.<br />

401

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!