Skip to main content

Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law

  • Chapter
  • First Online:
Computational Intelligence for Privacy and Security

Part of the book series: Studies in Computational Intelligence ((SCI,volume 394))

Abstract

Computational Intelligence (CI) techniques have been widely used in the domains of computer security and computer forensics. One problem that normative discussions of technologies face is that the technical capabilities under investigation tend to be unclear and that the experts in normative questions do not tend to be experts in technical developments and vice versa. The present paper therefore sets out to chart the ethical and legal problems arising from a new and fast moving field, namely that of computational intelligence and its application to computer security and forensics. Using artificial neural networks (ANNs) as an example of computational intelligence, the paper’s main aim is to create a link between what can now be perceived as technical developments and established discourses in ethics and the law. It aims to chart the territory to highlight likely ethical and legal problems related to ANNs and point in the direction of future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. DFWRS, A road map for digital forensics research. Digital Forensics Re-search Workshop (August 2001), http://www.dfrws.org/2001/dfrws-rm-final.pdf

  2. Pachghare, V.K., Kulkarni, P., Nikam, D.M.: Intrusion Detection System using Self Organizing Maps. In: International Conference on Intelligent Agent & Multimedia-Agent Systems, IAMA (2009)

    Google Scholar 

  3. Salvador, P., et al.: Framework for Zombie Detection Using Neural Networks. In: Fourth International Conference on Internet Monitoring and Protection, ICIMP (2009)

    Google Scholar 

  4. Wei, P., Zhang, W., Yang, H., Huang, S.: Combining neural networks and chaotic map to construct blind digital watermarking scheme. In: Proceeding of the Sixth International Conference on Intelligent Systems Design and Applications, ISDA (2006)

    Google Scholar 

  5. Lafferty, P., Ahmed, F.: Texture based steganalysis: results for color images. In: Mathematics of Data/Image Coding. Compression and Encryption VII. The Catholic University of America, 620 Michigan Avenue, NE, Washington DC, (2006)

    Google Scholar 

  6. Ciaramella, A., D’Arco, P., De Santis, A., et al.: Neural Network Techniques for proac-tive passwords checking. IEEE Transactions on Dependable and Secure Computing 3(4), 327–339 (2006)

    Article  Google Scholar 

  7. Wang, S., Wang, H.: Password authentication using Hopfield neural networks. IEEE Transactions on Systems Man and Cybernetics – Part C: Applications and Reviews 38(2), 265–268 (2008)

    Article  Google Scholar 

  8. Fei, B.K.L., Eloff, J.H.P., Olivier, M.S., Venter, H.: The use of self-organizing maps of anomalous behaviour detection in a digital investigation. Forensic Science International 162, 33–37 (2006)

    Article  Google Scholar 

  9. Beebe, N.L., Clark, J.: Digital Forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results. Digital Investigation 4S, S49–S54 (2007)

    Article  Google Scholar 

  10. Chen, H., Huang, S., Kuo, C.: Using the artificial neural networks to predict fraud litigation: Some empirical evidence from emerging markets. Expert Systems with Applications 36, 1478–1484 (2009)

    Article  Google Scholar 

  11. McClelland, J., Rumelhart, D.E.: And The PDP Research group, Parallel distributed processing: explorations in the microstructure of cognition. Foundations I (1986A)

    Google Scholar 

  12. McClelland, J., Rumelhart, D.E.: And The PDP Research group, Parallel distributed processing: explorations in the microstructure of cognition. Psychological and Biological Models ll (1986B)

    Google Scholar 

  13. Quinn, M.J.: Ethics for the Information Age, 2nd edn. Pearson International Edition (2006)

    Google Scholar 

  14. Floridi, L. (ed.): The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press (2010)

    Google Scholar 

  15. Himma, K.E., Tavani, H.T. (eds.): The Handbook of Information and Computer Ethics. Wiley, Hoboken (2008)

    Google Scholar 

  16. Hoven, J.V.D., Weckert, J. (eds.): Information Technology and Moral Philosophy. Cambridge University Press, Cambridge (2008)

    Google Scholar 

  17. Brown, W.S.: Ontological Security, Existential Anxiety and Workplace Privacy. Journal of Business Ethics 23(1), 61–65 (2000)

    Article  Google Scholar 

  18. Conger, S., Landry, B.J.: The Intersection of Privacy and Security. Presented at the Association of Information Systems SIGSEC Workshop on Information Security & Privacy (WISP 2008), Paris (2008)

    Google Scholar 

  19. Myyry, L., Siponen, M., Pahnila, S., Vartiainen, T., Vance, A.: What levels of moral reasoning and values explain adherence to information security rules? An empirical study. European Journal of Information Systems 18(2), 126–139 (2009)

    Article  Google Scholar 

  20. Lyon, D.: Surveillance society: Monitoring everyday life. Open University Press (2001)

    Google Scholar 

  21. Introna, L.D.: Workplace Surveillance ‘is’ Unethical and Unfair [Opin-ion]. Surveillance & Society 1(2), 210–216 (2003)

    Google Scholar 

  22. Stahl, B.C.: Forensic Computing in the Workplace: Hegemony, Ideology, and the Perfect Panopticon? Journal of Workplace Rights 13(2), 167–183 (2008)

    Article  Google Scholar 

  23. Wiener, N.: The human use of human beings. Doubleday (1954)

    Google Scholar 

  24. Weizenbaum, J.: Computer Power and Human Reason. W. H. Freeman and Company, San Francisco (1976)

    Google Scholar 

  25. Introna, L.D., Wood, D.: Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. In: Norris, McCahill, Wood (eds.) Surveillance and Society CCTV Special, vol. 2(2/3) (2004)

    Google Scholar 

  26. Peisert, S., Bishop, M.: Computer Forensics In Forensis (2007), http://www.cs.ucdavis.edu/~peisert/research/2008-SADFE-ForensicsInForensis-PBM.pdf

  27. Jansen, W., Delaitre, A.: NIST, Mobile Forensic Reference Materials: A Methodology and Reifica-tion (2009)

    Google Scholar 

  28. Hu, V.C., et al.: NIST, Interagency Report 7316 Access to Access Control Systems (2006), http://csrc.nist.gov/publications/nistir/7316/NISTIR-7316.pdf

  29. NIST Homepage, http://www.necam.com/IDS/Validation/

  30. NEC Corporation of America (2011), NIST Validation, http://www.necam.com/IDS/Validation/

  31. Sommer, P.: Scientific, Technological and Expert Evidence in Law and Legal Proceedings. In: Artificial Intelligence and Forensic Computing Workshop (2009), http://www.ktn.qinetiq-tim.net/content/files/groups/aiforensics/2009-04-02_PeterSommer.pdf

  32. Robinson, et al: (RAND) Review of Data Protection Directive: Summary prepared for the Information Commisioner’s (2009), http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/review_of_eu_dp_directive_summary.pdf

  33. Delacroix, S.: You’d better be committed: legal norms and normativity. American Journal of Jurisprudence (December 2009)

    Google Scholar 

  34. Gardner, J.: Nearly natural law. American Journal of Jurisprudence 52(1), 1–24 (2007)

    Google Scholar 

  35. Carley, K.: Dynamic Network Analysis in Counterterrorism Research. In: Proceedings of a Workshop on Statistics on Networks, Board of Mathematical Sciences (2007), http://books.nap.edu/openbook.php?record_id=12083&page=169

  36. Carley, K., Behrman, R.: Social Network Influences on Strategic Choices (2004), http://www.casos.cs.cmu.edu/publications/papers/behrman_2004_socialnetworkinfluences.pdf

  37. Hurwitz, E., Marwala, T.: State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation (2009)

    Google Scholar 

  38. Kasabov, N.: Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering. The MIT Press Cambridge, Massachusetts (1998)

    Google Scholar 

  39. Kenneally, E.: Gatekeeping Out Of The Box: Open Source Software As A Mechanism To Assess Reliability For Digital Evidence. Virginia Journal of Law and Technology (Fall 2001), http://www.vjolt.net/vol6/issue3/v6i3-a13-Kenneally.html

  40. Krieger, C.: Neural Networks in Data Mining (1996), http://www.cs.uml.edu/~ckrieger/user/Neural_Networks.pdf (retrieved on June 28, 2010)

  41. Cavoukian, A.: Privacy in the clouds. Identity in Information Society (1), 89–108 (2008)

    Article  Google Scholar 

  42. Gill, S.: AI & Society 22, 265–270 (2008), http://people.na.infn.it/~tamburrini/pub/Guest%20editorial.pdf

    Article  Google Scholar 

  43. Kosko, Bart: Neural Networks and Fuzzy Systems. Prentice Hall, New Jersey (1992)

    MATH  Google Scholar 

  44. Carroll-Mayer, M., Fairweather, B., Carsten Stahl, B.: CCTV Identity Management and Implications for Criminal Justice. Some Considerations in Surveillance and Society 5(1), 33–50 (2008) http://surveillance-and-society.org/articles/identity.pdf

  45. Salmon, F., Stokes, J.: Algorithms Take Control of Wall Street. In: WIRED (January 2011)

    Google Scholar 

  46. Al-Zarouni, M.: Mobile Handset Forensic Evidence. A Challenge to Law Enforcement (2006)

    Google Scholar 

  47. Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics (2006), http://csrc.nist.gov/publications/drafts/DraftSP800101

  48. Shirk, E.: The Dangers of Do-It-Yourself Computer Forensics. In: Law Practice Today, The American Bar Association (2007)

    Google Scholar 

  49. Carroll, O. (2008) Computer Forensics: Digital Forensics Analysis and Methodology, US Attorneys’ Bulletin (January 2007)

    Google Scholar 

  50. Vacca, J.: Computer Forensics: Computer Crime Scene Investigation, vol. 1. Charles River Media (2005)

    Google Scholar 

  51. Bainbridge, D.: Intellectual Property. Pearson (2009)

    Google Scholar 

  52. Omenn, G.: Enhancing the Role of the Scientific Expert Witness 102(8) (August 1994)

    Google Scholar 

  53. Bharadwaj, A.: Integrating Positivist and Interpretive Approaches to IS Research (2005)

    Google Scholar 

  54. Stephen, B.: Review of The Diffusion of Military Technology and Ideas. In: Goldman, E., Eliason, L. (eds.) Perspectives on Politics, vol. 3(3). Stanford University Press, Stanford (2004)

    Google Scholar 

  55. Leveson, L.J.: Expert Evidence in Criminal Courts. The Problem (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernd Stahl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Stahl, B., Carroll-Mayer, M., Elizondo, D., Wakunuma, K., Zheng, Y. (2012). Intelligence Techniques in Computer Security and Forensics: At the Boundaries of Ethics and Law. In: Elizondo, D., Solanas, A., Martinez-Balleste, A. (eds) Computational Intelligence for Privacy and Security. Studies in Computational Intelligence, vol 394. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25237-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25237-2_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25236-5

  • Online ISBN: 978-3-642-25237-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics