01.12.2012 Views

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

Proceedings of the 11th European Conference on Information ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

much interested in <str<strong>on</strong>g>the</str<strong>on</strong>g> machines used for surfing <str<strong>on</strong>g>the</str<strong>on</strong>g> Internet as <str<strong>on</strong>g>the</str<strong>on</strong>g> machines<br />

used for accounting <str<strong>on</strong>g>of</str<strong>on</strong>g> drug deals and emailing to co-c<strong>on</strong>spirators.<br />

We are doing research <strong>on</strong> tools to enable investigators to more quickly find<br />

such relevant informati<strong>on</strong>. We focus <strong>on</strong> <str<strong>on</strong>g>the</str<strong>on</strong>g> directory metadata <str<strong>on</strong>g>of</str<strong>on</strong>g> a computer<br />

drive, <str<strong>on</strong>g>the</str<strong>on</strong>g> listing <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> stored files and directories and <str<strong>on</strong>g>the</str<strong>on</strong>g>ir properties,<br />

since examining it requires much less time than examining file c<strong>on</strong>tents.<br />

We discuss first what ways people try to hide things <strong>on</strong> drives. We<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g>n discuss clues that suggest c<strong>on</strong>cealment or atypical usage <str<strong>on</strong>g>of</str<strong>on</strong>g> a drive,<br />

including encrypti<strong>on</strong>, oddities in file names, clusters <str<strong>on</strong>g>of</str<strong>on</strong>g> deleti<strong>on</strong>s, atypical<br />

average values, and atypical clusters <str<strong>on</strong>g>of</str<strong>on</strong>g> files. We report <strong>on</strong> experiments we<br />

have c<strong>on</strong>ducted with a corpus <str<strong>on</strong>g>of</str<strong>on</strong>g> drives purchased from a range <str<strong>on</strong>g>of</str<strong>on</strong>g> countries.<br />

Processing extracted <str<strong>on</strong>g>the</str<strong>on</strong>g> directory metadata, classified each file, and<br />

calculated suspiciousness metrics <strong>on</strong> <str<strong>on</strong>g>the</str<strong>on</strong>g> drives. Experimental results<br />

showed we could identify some suspicious drives within our corpus but<br />

with a certain number <str<strong>on</strong>g>of</str<strong>on</strong>g> false alarms.<br />

Keywords: digital forensics, law enforcement, drive classificati<strong>on</strong>, metadata,<br />

suspici<strong>on</strong><br />

The Comprehensive Approach as a Strategic Design<br />

to run <str<strong>on</strong>g>the</str<strong>on</strong>g> Military-Industrial Complex in Operati<strong>on</strong>s<br />

Mirva Salminen 1 and Aki-Mauri Huhtinen 2<br />

1<br />

Department <str<strong>on</strong>g>of</str<strong>on</strong>g> Social Sciences, University <str<strong>on</strong>g>of</str<strong>on</strong>g> Lapland, Finland<br />

2<br />

Department <str<strong>on</strong>g>of</str<strong>on</strong>g> Leadership and Military Pedagogy, Nati<strong>on</strong>al Defence University,<br />

Finland<br />

Abstract: How to steer <str<strong>on</strong>g>the</str<strong>on</strong>g> 21st century military acti<strong>on</strong>s that are c<strong>on</strong>current<br />

both in <str<strong>on</strong>g>the</str<strong>on</strong>g> real world and in virtual networks? The 20th century saw<br />

immense struggles between nati<strong>on</strong> states that c<strong>on</strong>tained a level <str<strong>on</strong>g>of</str<strong>on</strong>g> unprecedented<br />

material and human destructi<strong>on</strong>. After <str<strong>on</strong>g>the</str<strong>on</strong>g> great wars, <str<strong>on</strong>g>the</str<strong>on</strong>g> Cold<br />

War and nuclear weap<strong>on</strong>s paralysed <str<strong>on</strong>g>the</str<strong>on</strong>g> applicati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> military plans in <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

organisati<strong>on</strong>. The new wars and global threats that emerged towards <str<strong>on</strong>g>the</str<strong>on</strong>g><br />

change <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> millennium required <str<strong>on</strong>g>the</str<strong>on</strong>g> re-thinking <str<strong>on</strong>g>of</str<strong>on</strong>g> military organisati<strong>on</strong>,<br />

planning and c<strong>on</strong>duct. Simultaneously, <str<strong>on</strong>g>the</str<strong>on</strong>g> informati<strong>on</strong> revoluti<strong>on</strong> penetrated<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> battle space. These developments have lead to an increasingly<br />

complex security space, in which <str<strong>on</strong>g>the</str<strong>on</strong>g> military-industrial complex influences<br />

both virtual and material aspects <str<strong>on</strong>g>of</str<strong>on</strong>g> warfare, politics and ec<strong>on</strong>omy. The<br />

27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!