Skip to main content
Top

2019 | OriginalPaper | Chapter

A Digital Forensic Investigation and Verification Model for Industrial Espionage

Authors : Jieun Dokko, Michael Shin

Published in: Digital Forensics and Cyber Crime

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper describes a digital forensic investigation and verification model for industrial espionage (DEIV-IE) focusing on insider data thefts at the company level. This model aims to advance the state-of practice in forensic investigation and to verify evidence sufficiency of industrial espionage cases by incorporating the crime specific features and analysis techniques of digital evidence. The model is structured with six phases: file reduction, file classification, crime feature identification, evidence mapping, evidence sufficiency verification, and documentations. In particular, we focus on characterizing crime features that have multiple aspects of commonalities in crime patterns in industrial espionage; and the evidence sufficiency verification that is a verification procedure for digital evidence sufficiency for court decision using these crime features. This model has been developed based on analysis of five industrial espionage cases and the literature review, being validated with three additional cases in terms of the effectiveness of the model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Montasari, R.: Review and assessment of the existing digital forensic investigation process models. Int. J. Comput. Appl. 147, 7 (2016) Montasari, R.: Review and assessment of the existing digital forensic investigation process models. Int. J. Comput. Appl. 147, 7 (2016)
2.
go back to reference Boddington, R., Hobbs, V., Mann, G.: Validating digital evidence for legal argument. In: Australian Digital Forensics Conference (2008) Boddington, R., Hobbs, V., Mann, G.: Validating digital evidence for legal argument. In: Australian Digital Forensics Conference (2008)
3.
go back to reference Karie, N.M., Venter, H.S.: Towards a framework for enhancing potential digital evidence presentation. In: Information Security for South Africa. IEEE (2013) Karie, N.M., Venter, H.S.: Towards a framework for enhancing potential digital evidence presentation. In: Information Security for South Africa. IEEE (2013)
4.
go back to reference Ieong, R.S.C.: FORZA–digital forensics investigation framework that incorporate legal issues. Digit. Investig. 3, 29–36 (2006)CrossRef Ieong, R.S.C.: FORZA–digital forensics investigation framework that incorporate legal issues. Digit. Investig. 3, 29–36 (2006)CrossRef
5.
go back to reference Søilen, K.S.: Economic and industrial espionage at the start of the 21st century–Status quaestionis. J. Intell. Stud. Bus. 6, 3 (2016) Søilen, K.S.: Economic and industrial espionage at the start of the 21st century–Status quaestionis. J. Intell. Stud. Bus. 6, 3 (2016)
6.
go back to reference Marturana, F., et al.: A quantitative approach to triaging in mobile forensics. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE (2011) Marturana, F., et al.: A quantitative approach to triaging in mobile forensics. In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE (2011)
7.
go back to reference McClelland, D., Marturana, F.: A digital forensics triage methodology based on feature manipulation techniques. In: IEEE International Conference on Communications Workshops (ICC). IEEE (2014) McClelland, D., Marturana, F.: A digital forensics triage methodology based on feature manipulation techniques. In: IEEE International Conference on Communications Workshops (ICC). IEEE (2014)
8.
go back to reference Cantrell, G., et al.: Research toward a partially-automated, and crime specific digital triage process model. Comput. Inf. Sci. 5(2), 29 (2012) Cantrell, G., et al.: Research toward a partially-automated, and crime specific digital triage process model. Comput. Inf. Sci. 5(2), 29 (2012)
9.
go back to reference James, J.I., Gladyshev, P.: A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview. Digit. Invest. 10(2), 148–157 (2013)CrossRef James, J.I., Gladyshev, P.: A survey of digital forensic investigator decision processes and measurement of decisions based on enhanced preview. Digit. Invest. 10(2), 148–157 (2013)CrossRef
10.
go back to reference Karie, N., Venter, H.: A generic framework for enhancing the quality digital evidence reports. In: 13th European Conference on Cyber Warfare and Security ECCWS-2014 the University of Piraeus Piraeus, Greece (2014) Karie, N., Venter, H.: A generic framework for enhancing the quality digital evidence reports. In: 13th European Conference on Cyber Warfare and Security ECCWS-2014 the University of Piraeus Piraeus, Greece (2014)
11.
go back to reference Karie, N.M., Venter, H.S.: Towards a framework for enhancing potential digital evidence presentation. In: Information Security for South Africa 2013. IEEE (2013) Karie, N.M., Venter, H.S.: Towards a framework for enhancing potential digital evidence presentation. In: Information Security for South Africa 2013. IEEE (2013)
12.
go back to reference Mohamed, I.A., Manaf, A.B.: An enhancement of traceability model based-on scenario for digital forensic investigation process. In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2014) Mohamed, I.A., Manaf, A.B.: An enhancement of traceability model based-on scenario for digital forensic investigation process. In: Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2014)
13.
go back to reference Karie, N., Kebande, V., Venter, H.: A generic framework for digital evidence traceability. In: European Conference on Cyber Warfare and Security. Academic Conferences International Limited (2016) Karie, N., Kebande, V., Venter, H.: A generic framework for digital evidence traceability. In: European Conference on Cyber Warfare and Security. Academic Conferences International Limited (2016)
15.
go back to reference Holt, T.J., Bossler, A.M., Seigfried-Spellar, K.C.: Cybercrime and Digital Forensics: An Introduction. Routledge, Abingdon (2015)CrossRef Holt, T.J., Bossler, A.M., Seigfried-Spellar, K.C.: Cybercrime and Digital Forensics: An Introduction. Routledge, Abingdon (2015)CrossRef
16.
go back to reference Bruce, C., Santos, R.B.: Crime Pattern Definitions for Tactical Analysis (2011) Bruce, C., Santos, R.B.: Crime Pattern Definitions for Tactical Analysis (2011)
17.
go back to reference Raghavan, S., Raghavan, S.V.: A study of forensic & analysis tools. In: Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE (2013) Raghavan, S., Raghavan, S.V.: A study of forensic & analysis tools. In: Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE (2013)
18.
go back to reference Teppler, S.W.: Testable reliability: a modernized approach to ESI admissibility. Ave Maria L. Rev. 12, 213 (2014) Teppler, S.W.: Testable reliability: a modernized approach to ESI admissibility. Ave Maria L. Rev. 12, 213 (2014)
20.
go back to reference United States v. Hamilton, 413 F.3d 1138, 1142 (10th Cir. 2005) United States v. Hamilton, 413 F.3d 1138, 1142 (10th Cir. 2005)
21.
go back to reference Records of Regularly Conducted Activity, Rule 803(6), Federal Rule of Evidence Records of Regularly Conducted Activity, Rule 803(6), Federal Rule of Evidence
22.
go back to reference Carvey, H.: Windows forensic analysis DVD toolkit. Syngress, Amsterdam (2009) Carvey, H.: Windows forensic analysis DVD toolkit. Syngress, Amsterdam (2009)
23.
go back to reference United States v. Washington, 498 F.3d 225, 233 (4th Cir. 2007) United States v. Washington, 498 F.3d 225, 233 (4th Cir. 2007)
24.
go back to reference Casey, E.: Error, uncertainty, and loss in digital evidence. Int. J. Digit. Evid. 1(2), 1–45 (2002) Casey, E.: Error, uncertainty, and loss in digital evidence. Int. J. Digit. Evid. 1(2), 1–45 (2002)
25.
go back to reference Sinha, S.: Understanding industrial espionage for greater technological and economic security. IEEE Potentials 31(3), 37–41 (2012)CrossRef Sinha, S.: Understanding industrial espionage for greater technological and economic security. IEEE Potentials 31(3), 37–41 (2012)CrossRef
27.
go back to reference EC-Council: Computer Forensics: Investigating Network Intrusions and Cyber Crime. Nelson Education (2009) EC-Council: Computer Forensics: Investigating Network Intrusions and Cyber Crime. Nelson Education (2009)
28.
go back to reference Carrier, B., Spafford, E.H.: An event-based digital forensic investigation framework. In: Digital Forensic Research Workshop (2004) Carrier, B., Spafford, E.H.: An event-based digital forensic investigation framework. In: Digital Forensic Research Workshop (2004)
29.
go back to reference Bhatti, H.J., Alymenko, A.: A Literature Review: Industrial Espionage (2017) Bhatti, H.J., Alymenko, A.: A Literature Review: Industrial Espionage (2017)
30.
go back to reference EC-Council: Computer Forensics: Hard disk and Operating Systems. Nelson Education (2009) EC-Council: Computer Forensics: Hard disk and Operating Systems. Nelson Education (2009)
31.
go back to reference Hultquist, J.: Distinguishing cyber espionage activity to prioritize threats. In: 13th European Conference on Cyber Warfare and Security ECCWS-2014, The University of Piraeus Piraeus, Greece (2014) Hultquist, J.: Distinguishing cyber espionage activity to prioritize threats. In: 13th European Conference on Cyber Warfare and Security ECCWS-2014, The University of Piraeus Piraeus, Greece (2014)
32.
go back to reference Tun, T., et al.: Verifiable limited disclosure: reporting and handling digital evidence in police investigations. In: IEEE International Conference on Requirements Engineering Conference Workshops (REW). IEEE (2016) Tun, T., et al.: Verifiable limited disclosure: reporting and handling digital evidence in police investigations. In: IEEE International Conference on Requirements Engineering Conference Workshops (REW). IEEE (2016)
33.
go back to reference Chung, H., et al.: Digital forensic investigation of cloud storage services. Digit. Investig. 9(2), 81–95 (2012)CrossRef Chung, H., et al.: Digital forensic investigation of cloud storage services. Digit. Investig. 9(2), 81–95 (2012)CrossRef
34.
go back to reference Sammons, J.: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Elsevier, Waltham (2012) Sammons, J.: The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Elsevier, Waltham (2012)
35.
go back to reference Al Mutawa, N., et al.: Forensic investigation of cyberstalking cases using behavioural evidence analysis. Digit. Investig. 16, S96–S103 (2016)CrossRef Al Mutawa, N., et al.: Forensic investigation of cyberstalking cases using behavioural evidence analysis. Digit. Investig. 16, S96–S103 (2016)CrossRef
36.
go back to reference Al Mutawa, N., et al.: Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks. In: 10th International Conference on Availability, Reliability and Security (ARES) 2015. IEEE (2015) Al Mutawa, N., et al.: Behavioural evidence analysis applied to digital forensics: an empirical analysis of child pornography cases using P2P networks. In: 10th International Conference on Availability, Reliability and Security (ARES) 2015. IEEE (2015)
Metadata
Title
A Digital Forensic Investigation and Verification Model for Industrial Espionage
Authors
Jieun Dokko
Michael Shin
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-05487-8_7

Premium Partner