Nicolas HughesTitles: A time of reckoning? Changing regulatory and judicial attitudes and the potential impact on digital forensics

Summary: The release of the report “Strengthening Forensic Science: A Path Forward” in 2009 had international impact, sending a shock through the forensic community. The report had a slower influence on the judicial community, however the 2009 report and subsequent reports are starting to more frequently shape judicial opinions that limit or reject forensic evidence. Many of the Court’s findings supporting the judicial opinions, including a lack of empirical data supporting the accuracy of the field, a lack of formal methodologies, and a lack of suitable validation for analytical methods, are problems that exist in the largely unregulated discipline of digital forensics. This talk looks to current and emerging issues in digital forensics from a legal perspective, tracks efforts to better address the foundations of the discipline, and seeks to predict how future research can help support the scientific underpinning and admissibility of digital evidence.

Bio: Nicolas Hughes is a proud career indigent defense lawyer and is the deputy director of the Harris County Office of Managed Assigned Counsel. In his previous roles at the Harris County Public Defender’s Office and State Counsel for Offenders, Nicolas won numerous post-conviction cases, appeals, secured many dismissals, and helped secure several not guilty verdicts. Not all of Nicolas’s work has been inside the Courtroom – Nicolas advocates for the rights of the accused before the Texas Forensic Science Commission, the Texas Legislature, and on forensic advisory boards. Nicolas particularly enjoys preparing defensive strategies that involve DNA, chemistry, and digital forensic evidence. Beyond his legal work, Nicolas has a master’s degree in digital forensics and has published several conference papers and an article in the field of digital forensics.

 

Ahmet KoltuksuzTitles: Cyber Warfare: Changing Doctrines of Warfare, From Sun Tzu to Cyberspace

Summary: In his two thousand years old but very famous and influential war strategy & tactics book, The Art of War, the master strategist and a tactician Sun Tzu (544BC-496BC) elaborated on one-dimensional war strategies. The actual war arena is considered either the line of attack/defense or an area to control. Hence the degrees of freedom, which is the number of dimensions, is two or is just one, most of the time.
Another master strategist considered the war zone -again- either as a line (=one dimension) or as an area with two dimensions in yet another celebrated war strategy book named “On War” which was written by a Prussian Major General, Carl von Clausewitz (1780–1831).
Defining the war theatre in strict two dimensions was underlined by M.K. Atatürk in 1921 as “There is no line of defense but an area of defense. Furthermore, that area is the whole of the country.”
The second world war was dominated by the third dimension as the airplanes and submarines dictated the action & the winning side in the whole war theatre.
As the history of War clearly shows us that the more dimensions one controls, the more powerful one is. In another way of saying, with each added dimension one has under control, the other dimensions are readily controlled as well, i.e., with the air force which acts in three dimensions, the line (= one dimension) and the land (= two dimensions) are controlled along the way as well.
In terms of war doctrines, the twenty-first century has been underlined by a concept of cyberspace that has four dimensions, and possibly none as well. Therefore, the war arena is not confined either to land, sea, air, or space anymore, but rather, something much larger and much more complicated than any of them. This time, the old concepts of warfare have been transported to a virtual domain. This new type of warfare is called appropriately cyber warfare, which resembles nothing, and is something no one has seen or experienced before.
Cyberspace is now officially regarded as a distinct military domain worldwide, along with the land, sea, air, and space as the 5th dimension. Many nations are developing defensive and offensive information operation capabilities for this domain. The nature of warfare in cyberspace is radically different than kinetic warfare such as; the attacks are free of time and space, remote and under covered. Cyber warfare incidents that are starting from Estonian DDOS attacks in 2007, Georgia – Russia War in 2008, the cyber espionage on Google and Lockheed-Martin state that the cyber warfare is now inevitable and nations have to be ready for the future wars of this new theater.
This speech will identify the differences between cyber warfare strategies and conventional warfare strategies by providing already experienced cyber warfares worldwide. Moreover, the attempts to define a rule set for cyber warfare, a cyber warfare law, will be evaluated.

Bio: Dr. Koltuksuz was born in 1961, earned his Ph.D. from the Computer Engineering Department of Aegean University with a dissertation thesis of “Cryptanalytical Measures of Turkey Turkish for Symmetrical Cryptosystems” in 1995, and subsequently appointed as an Assistant Professor.
He moved to Izmir Institute of Technology, Department of Computer Engineering in 1996 and became a full-time, tenured Associate Professor within the same institution in 1999. Dr. Koltuksuz had established & run the Information Systems Strategy and Security Laboratory (IS3 Lab) in this university.
He joined the Department of Computer Engineering of the School of Engineering of Yaşar University in September 2009. He runs the chair of the Department of Computer Engineering at Yaşar University for six consecutive years.
In the same institution, Dr. Koltuksuz has initiated the Cyber Security Graduate level program in 2012. He established the Computer Emergency Response Team for Yaşar University (Yaşar-CERT, Yaşar-SOME) in 2014 and is currently heading it.
His research interests are Cryptology, Theory of Numbers, Information Theory, Theory of Computation, Operating Systems, Multicore Architectures, Cyberspace Defense & Security, Cyber Intelligence, Open Sources Intelligence Analysis, and Computer Forensics.