Research on emergin...
 
Notifications
Clear all

Research on emerging technologies and distribution of exploi

6 Posts
5 Users
0 Reactions
253 Views
(@terrydutton)
New Member
Joined: 14 years ago
Posts: 2
Topic starter  

I've been tasked to collect information on emerging technologies in the context of digital forensics and on the distribution of exploitable technologies worldwide. To this end, I’m contacting the principle players in the digital forensics world to include DOD and civilian agencies/organizations, to determine if they have the type of information we’re looking for.

We want to be able to present a comprehensive picture of exploitable technologies worldwide (broken out by continent and only getting “into the weeds” on exception). For example, we’re not looking for specific phones but the dominate types (CDMA, GSM, traditional, smart phones, etc.); the same goes for other technologies.

Anyone know where I can find this type of information?


   
Quote
(@xennith)
Estimable Member
Joined: 15 years ago
Posts: 177
 

Defcon.


   
ReplyQuote
(@fuzed)
Trusted Member
Joined: 16 years ago
Posts: 93
 

I don't think you'll find that info easily, defcon as the previous poster mentioned is good, sans etc… but the majority of hardware/software out there will be exploitable, its all down to the people that write the exploits releasing them, alot of 'hackers' have 0 day exploits that they do not or will not release into the wild, I know of ATM's being exploited (rooted) etc etc.

might be worth having a look on http//www.ethicalhacker.net/


   
ReplyQuote
binarybod
(@binarybod)
Reputable Member
Joined: 18 years ago
Posts: 272
 

I've been tasked to collect information on emerging technologies in the context of digital forensics and on the distribution of exploitable technologies worldwide.

I guess your tutor or examiner comes at digital forensics from the standpoint of security then. In my world, digital forensics and exploitable technologies are as far apart as cheese and wine - only brought together at parties you don't really want to be seen at.

Exploits are a concern for forensic analysts but only one part of the equation for which there are many, many variables.

For me digital forensics is about presenting scientific evidence in a court (disciplinary, civil, criminal, whatever…) I get really cheesed off when security professionals present themselves as forensic experts, go to a university and create a course that is a security course with law as a bolt-on. Of course I could be wrong…

Of course none of the above answers your question for which I apologize, I just needed to vent - please ignore.

Paul


   
ReplyQuote
(@terrydutton)
New Member
Joined: 14 years ago
Posts: 2
Topic starter  

I guess I should have been more specific. Exploitable technologies = technologies that you can conduct digital forensics on…extract usable information that you can exploit (use for further actions)…basically an intelligence activity. Digital forensics is NOT just for evidence gathering to be used in court…open your mind to other uses.


   
ReplyQuote
(@patrick4n6)
Honorable Member
Joined: 16 years ago
Posts: 650
 

I guess I should have been more specific. Exploitable technologies = technologies that you can conduct digital forensics on…extract usable information that you can exploit (use for further actions)…basically an intelligence activity. Digital forensics is NOT just for evidence gathering to be used in court…open your mind to other uses.

What you're talking about is digital intelligence (or perhaps SIGINT) not digital forensics. They are separate fields, albeit sometimes applying the same techniques and technologies. "Forensics" means pertaining to courts and evidence. I think Binarybod was correct in that you need to be precise in the phrasing of your questions.

Good luck with your research.


   
ReplyQuote
Share: