Professional Documents
Culture Documents
BY : -
ANIL KUMAR(10/PBT/02)
PRASHANT KUMAR(I0/PBT/012)
SARVESH RUSTAGI(10/PBT/018)
SHASHANK MATHUR(10/PBT/019)
M.TECH(BIOTECH)2 YEAR
OVERVIEW
• Definition
• Typologies
• Goal
• Tactics
• Effectiveness
• Ineffectiveness
• Predisposing Conditions
• Characteristics
• History
• Psychology
• Fighting Back
DEFINITION
Terrorist:
•A complicated phenomenon
•Specialized form of political violence
• International v. domestic
(There is cross-over)
Dr. Post’s Classification System:
1. Political terrorists*
2. Criminal terrorists
3. Psychopathological terrorists
Political Terrorism:
1. State: The state uses weapons of the state
against its own people. (Hitler, Saddam
Hussein)
1. Social revolutionary
2. National separatist
3. Religious Fundamental
4. New Religious
5. Right wing
6. Single issue
Sub-state Terrorism
(Loyalty of family to regime)
Thousands were
injured in the gas
attack.
Sub-state Terrorism:
5. Right Wing: They see the government as the
enemy and illegitimate. (e.g. Neo-Nazis,
Timothy McVeigh, Klu Klux Klan)
Sub-state Terrorism:
6. Single Issue: e.g. animal rights, ecologic terrorism
(Usually single people willing to kill.)
South Korean
animal rights
activists protest in
Seoul .
GOAL
What is the goal of terrorism?
“ The cause is not the cause”
They are convinced that they’re acting on behalf
•
potent/ strong.
Psychological Goals:
• Violence as
communication
•Viscous species, a
virus
INEFFECTIVENESS
What makes terrorism ineffective?
• Virus analogy: eventually
burn themselves out
- The WTC center attack is
even more so a virus
analogy.
- The terrorists literally used
our own technology against
us. [New York Times
analogy]
•Symbolic, non-violent,
inanimate object
1. Theories on Aggression
2. Terrorist Profile
Freud:
“ Homo homini lupus”
• Keys to paradise
• Direct path to heaven
• Promise of no pain
• Rewards to family
• Martyrdom
72 Black-Eyed Virgins
-Interviewed terrorist
Terrorist Profile: Old vs. New
• Israel Bombers • New Terrorists
- 17-22 yrs old - 28-35 yrs old
- Male, single, young - Male, married, older
- Uneducated - Had higher education
- Unemployed - Financially comfortable
- Unmarried - From middle class families
- Dispirited youth - Lived in West (sometimes for
- Bleak future years) exposed to opportunity
- Recruited hours before - Blended in with society
- “Brainwashed” for honor - Ignored the dress, customs and
and family status grooming of traditional Muslims
- Not left alone until act - Left alone, far away, for years.
complete Not “brainwashed,” but rather
“true believers”
What makes them kill after they
have tasted the American life?
• “Necessity permits the forbidden.”
from Denning , P., (2001) ‘The profession of IT’ in Communications of the ACM, Vol 44
Components of
Professionalism in Computer
Forensics
Competence – relevant up to date skills; relevant
experience, knowledge and understanding; relevant
qualifications; CPD
Personal integrity – code of ethics, responsibility and
accountability – beyond contractual obligation to
employer
Components of
Professionalism in Computer
Forensics
Public obligation – public good, social responsibility,
contribution to the profession
Part of a recognised professional body – being part of
that community is an essential part of being a
professional
Computer Forensics as a
Profession?
To be a professional one needs to be aware
that the rest of the world is not part of that
profession !
Majority of the general public are excluded
from computer forensics
Majority of computer professionals are not
skilled in computer forensics
Many computer forensics practitioners come
from other disciplines (of computing and from
other areas, eg audit)
Computer Forensics as a
Profession?
Attitudes to computer forensics
Academic
Application of computer science
Application of forensic science
Narrow specialism
Aligned to computer security
Core discipline
Ethical Behaviour in Computer
Forensics
There is a very fine line between what is acceptable
and what is deemed to be malpractice
Computer Forensics exists in an ethical grey area
Often need to balance self motivation versus legal
constraints and procedural considerations
Ethical Behaviour in Computer
Forensics
Need to understand the ethical responsibility
in Computer Forensics work is to:
Self
Profession
Clients
Subjects
Courts
Society
Computer Forensics Ethical
Standards
What is worse?
Failing to convict the guilty
Convicting the innocent
The role of the investigator is to expose the
evidence from a neutral point of view
The Auld Report states that
“It is the duty of an expert to help the court on the
matters within his expertise. The duty overrides
any obligation to the person from whom he has
received instruction or by whom he is paid”
Psychology of Investigation
Evaluate the allegation
Who made it ?
Is there a hidden agenda ?
Avoid presumption of guilt
Avoid desire to win
Show all the evidence both contrary and supporting
the accusation
Psychology of Investigation
Ask yourself the questions
Could the person be innocent ?
Could someone else have done it ?
Keep an open mind
Be impartial
Be rigorous and professional
Computer Forensics
Practitioners Require
Awareness
To help in making decisions about “doing the right
thing”.
To provide material in defending or justifying a
particular position.
To protect you as a practitioner.
To consider in terms of practitioner and system
liability.
To maintain evidential integrity.
Questioning the Law
Is the law always ethical ?
Is the law good and just ?
Was apartheid legislation ethical ?
Just because an act or set of circumstances is
permitted in computing does not mean that it is
ethical.
Areas of Knowledge
What laws to consider ?
What impact the laws might have on a particular
activity
Critical analysis
Are the laws appropriate ?
Are there contradictions in legal provision?
Can the laws be applied to computer forensics ?
Should the laws be challenged ?
Example of Regulations to
Consider
Data Protection Act 1998
Right of access, Right to prevent processing, Right to
compensation
Computer Misuse Act 1990 and Computer Misuse
(Amendment) Act 2002
Regulation of Investigatory Powers Act 2000
Example of Regulations to
Consider
Human Rights Act 1998
Disability Discrimination Act (1995) and Special
Educational Needs and Disability Act 2001
Example of Regulations to
Consider
Anti-terrorism, Crime and Security Act 2001
ISPs (Internet Service Providers) keep track of their
customers’ activities over a period of 12 months
Freedom of Information Act 2000 and Freedom of
Information (Scotland) Act 2002
Example of Regulations to
Consider
Theft Act 1968, 1978
Protection from Harassment Act 1997
Obscene Publications Act 1959
Protection of Children Act 1978
Criminal Justice Act 1988
Example of Regulations to
Consider
Sexual Offences Act 2003
Anti-terrorism, Crime and Security Act 2001
Patents Act 1977 and the Copyright, Designs and
Patents Act 1988
Intellectual Property, Copyright Law, Patent Law,
Trademarks and Passing-off
Design Right (Semiconductor Regulations) 1989
Professional Behaviour in
Computer Forensics
Enhance the resolution of crime involving
computers and reduce cyber crime
Ensure robust, reliable, valid and safe processes and
procedures
Comply with ethical and legal expectations
Professional Behaviour in
Computer Forensics
Enhance public confidence in computer forensics
Enhance computer security
Promote awareness and understanding
Requires the ability and competence to make
appropriate decisions
Areas of Professional
Responsibility
Litigation and Liability
Certification and Licence to practice
Compliance
For example web sites with Disability Discrimination Act
Audit
Dealing with contradictions
Professional and ethical responsibility
Organisational regulation and policy
computing action may be legal but against company
policy, e.g. Internet transactions on work computers, e-
mail language
Certification and Licence to
Practice
Should computer forensics practitioners be
certified or accredited through a licence to
practice?
What does accreditation mean ?
Who would benefit from certification ?
What would be the impact of a statutory computer
forensics licence
What is the role of experience ?
Should an accrediting body have power of licence
Attempts have been made in the State of Texas
(see Bagert 2002)