- Exhaust the data collection in open sources (OSINT) or closed sources (CSINT, AML Intelligence);
- Hidden monitoring and tracking measures (SIGINT, HUMINT...);
- With concrete evidence of the practices investigated and exhaustion of remote possibilities, launch the operation itself with the publication of the investigation. At this stage, search and seizure warrants, temporary or preventive arrest and statements will be taken.
Interesting information
• Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)
• Burn, drown, or smash your phone: Forensics can extract data anyway
• How law enforcement gets around your smartphone’s encryption
• Cellphone data used to solve murder case from 2 years ago, police say
• The Stingray: How Law Enforcement Can Track Your Every Move
• Police are tracking you and your license plates
• SCOTUS: Police Need Search Warrant to Ping cell Phones
• Motion to Suppress Aerial Surveillance Evidence in U.S. vs Muhammed Momtaz Alazhari
• Researchers Find Way to Steal Encrypted Data - NYT (2008)
• As UN Human Rights Chief Urges Stricter Rules, Snowden Calls for End to Spyware Trade (2021)
Comparison between Drive Badger (GitHub) with other lawful interception platforms. Visit: Official sheet or the PDF version in our repo. Credits for the panel: Tomasz Klim.
Zero-day Exploit (2023) | Associated Spyware Vendor |
CVE-2023-28205 and CVE-2023-28206 (Apple iOS) | Variston (BridgeHead) |
CVE-2023-2033 (Google Chrome) | Intellexa/Cytrox (Predator) |
CVE-2023-2136 (Google Chrome) | Intellexa/Cytrox (Predator) |
CVE-2023-32409 (Apple iOS) | Variston (BridgeHead) |
CVE-2023-3079 (Google Chrome) | Intellexa/Cytrox (Predator) |
CVE-2023-41061 and CVE-2023-41064 (Apple iOS) | NSO Group (Pegasus) |
CVE-2023-41991, CVE-2023-41992, and CVE-2023-41993 (Apple iOS) | Intellexa/Cytrox (Predator) |
CVE-2023-5217 (Google Chrome) | Candiru (DevilsTongue) |
CVE-2023-4211 (Arm Mali GPU) | Cy4Gate (Epeius) |
CVE-2023-33063 (Qualcomm Adreno GPU) | Variston (BridgeHead) |
CVE-2023-33106 and CVE-2023-33107 (Qualcomm Adreno GPU) | Cy4Gate (Epeius) |
CVE-2023-42916 and CVE-2023-42917 (Apple iOS) | PARS Defense |
CVE-2023-7024 (Google Chrome) | NSO Group (Pegasus) |
👷🛠️UNDER CONSTRUCTION🚧🏗
1.01 Forensic standards
Visit our repo tree: 2.FORENSIC
Standards
NIST — National Institute of Standards and Technology
Visit: https://nist.gov/standards
ASTM International
Subcommittee E30.12 on Digital and Multimedia Evidence
Visit: https://www.astm.org/get-involved/technical-committees/committee-e30/subcommittee-e30/jurisdiction-e3012
The PCI Security Standards Council (PCI SSC)
Visit: https://www.pcisecuritystandards.org
ISO/IEC — International Electrotechnical Commission
Visit: https://iso27001security.com
Official - Information security, cybersecurity and privacy protection — https://iso.org/standard/27001
- ISO/IEC 27000 — ISO27k overview & glossary
- ISO/IEC 27001 — formal ISMS specification
- ISO/IEC 27002 — infosec controls catalogue
- ISO/IEC 27003 — ISMS implementation guide
- ISO/IEC 27004 — infosec measurement [metrics]
- ISO/IEC 27005 — info[sec] risk management
- ISO/IEC 27006-n — ISMS & PIMS certification
- ISO/IEC 27007 — management system auditing
- ISO/IEC TS 27008 — security controls auditing
- ISO/IEC 27009 — sector variants of ISO27k
- ISO/IEC 27010 — for inter-org comms
- ISO/IEC 27011 — ISMS for telecoms
- ISO/IEC 27013 — ISMS & ITIL/service mgmt
- ISO/IEC 27014 — infosec governance
- ISO/IEC TR 27016 — infosec economics
- ISO/IEC 27017 — cloud security controls
- ISO/IEC 27018 — cloud privacy
- ISO/IEC 27019 — process control in energy industry
- ISO/IEC 27021 — competences for ISMS pro’s
- ISO/IEC TS 27022 — ISMS processes
- ISO/IEC 27031 — ICT element of business continuity
- ISO/IEC 27032 — Internet security
- ISO/IEC 27033-n — network security
- ISO/IEC 27034-n — application security
- ISO/IEC 27035-n — incident management
- ISO/IEC 27036-n — ICT supply chain & cloud
- ISO/IEC 27037 — digital evidence [eForensics]
- ISO/IEC 27038 — document redaction
- ISO/IEC 27039 — intrusion prevention
- ISO/IEC 27040 — storage security
- ISO/IEC 27041 — incident investigation assurance
- ISO/IEC 27042 — analysing digital evidence
- ISO/IEC 27043 — incident investigation
- ISO/IEC 27050-n — digital forensics
- ISO/IEC 27070 — virtual roots of trust
- ISO/IEC 27071 — trusted connections
- ISO/IEC 27099 — ISMS for PKI
- ISO/IEC TS 27100 — cybersecurity overview/concepts
- ISO/IEC 27102 — cyber-insurance
- ISO/IEC 27103 — ISMS for cybersecurity
- ISO/IEC TS 27110 — cybersecurity frameworks
- ISO/IEC 27400 — IoT security and privacy
- ISO/IEC TR 27550 — privacy engineering
- ISO/IEC 27553-n — mobile device biometrics
- ISO/IEC 27555 — deleting PII/personal data
- ISO/IEC 27556 — privacy preferences
- ISO/IEC 27557 — privacy risk management
- ISO/IEC 27559 — de-identification of personal data
- ISO/IEC TS 27560 — privacy consent record structure
- ISO/IEC TR 27563 — AI use case security & privacy
- ISO/IEC TS 27570 — smart city privacy
- ISO/IEC 27701 — managing privacy with an ISMS
- ISO 27799 — information security in healthcare
RFC
Best Current Practices (BCP)
- RFC 1918 / BCP 5: Address Allocation for Private Internets
- RFC 2350 / BCP 21: Expectations for Computer Security Incident Response
- RFC 2505 / BCP 30: Anti-Spam Recommendations for SMTP MTAs
- RFC 2644 / BCP 34: Changing the Default for Directed Broadcasts in Routers
- RFC 2827 / BCP 38: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
- RFC 3013 / BCP 46: Recommended Internet Service Provider Security Services and Procedures
- RFC 3227 / BCP 55: Guidelines for Evidence Collection and Archiving
- RFC 3360 / BCP 60: Inappropriate TCP Resets Considered Harmful
- RFC 3365 / BCP 61: Strong Security Requirements for Internet Engineering Task Force Standard Protocols
- RFC 4086 / BCP 106: Randomness Requirements for Security
- RFC 4107 / BCP 107: Guidelines for Cryptographic Key Management
- RFC 5068 / BCP 134: Email Submission Operations: Access and Accountability Requirements
- RFC 5358 / BCP 140: Preventing Use of Recursive Nameservers in Reflector Attacks
- RFC 5406 / BCP 146: Guidelines for Specifying the Use of IPsec Version 2
Standards
- RFC 2142: Mailbox Names for Common Services, Roles and Functions
- RFC 2246: The TLS Protocol Version 1.0
- RFC 2554: SMTP Service Extension for Authentication
- RFC 3168: The Addition of Explicit Congestion Notification (ECN) to IP
- RFC 3207: SMTP Service Extension for Secure SMTP over Transport Layer Security
- RFC 3369: Cryptographic Message Syntax (CMS)
- RFC 3370: Cryptographic Message Syntax (CMS) Algorithms
- RFC 3834: Recommendations for Automatic Responses to Electronic Mail
- RFC 4033: DNS Security Introduction and Requirements
- RFC 4034: Resource Records for the DNS Security Extensions
- RFC 4035: Protocol Modifications for the DNS Security Extensions
- RFC 4051: Additional XML Security Uniform Resource Identifiers (URIs)
- RFC 4055: Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
- RFC 4056: Use of the RSASSA-PSS Signature Algorithm in Cryptographic Message Syntax (CMS)
- RFC 4109: Algorithms for Internet Key Exchange version 1 (IKEv1)
- RFC 4217: Securing FTP with TLS
- RFC 4250: The Secure Shell (SSH) Protocol Assigned Numbers
- RFC 4251: The Secure Shell (SSH) Protocol Architecture
- RFC 4252: The Secure Shell (SSH) Authentication Protocol
- RFC 4253: The Secure Shell (SSH) Transport Layer Protocol
- RFC 4254: The Secure Shell (SSH) Connection Protocol
- RFC 4255: Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
- RFC 4256: Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
- RFC 4301: Security Architecture for the Internet Protocol
- RFC 4302: IP Authentication Header
- RFC 4303: IP Encapsulating Security Payload (ESP)
- RFC 4308: Cryptographic Suites for IPsec
- RFC 4344: The Secure Shell (SSH) Transport Layer Encryption Modes
- RFC 4346: The Transport Layer Security (TLS) Protocol Version 1.1
- RFC 4359: The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH)
- RFC 4366: Transport Layer Security (TLS) Extensions
- RFC 4513: Lightweight Directory Access Protocol (LDAP): Authentication Methods and Security Mechanisms
- RFC 4871: DomainKeys Identified Mail (DKIM) Signatures
- RFC 4959: IMAP Extension for Simple Authentication and Security Layer (SASL) Initial Client Response
- RFC 4985: Internet X.509 Public Key Infrastructure Subject Alternative Name for Expression of Service Name
- RFC 5070: The Incident Object Description Exchange Format
- RFC 5321: Simple Mail Transfer Protocol
- RFC 5322: Internet Message Format
- RFC 5901: Extensions to the IODEF-Document Class for Reporting Phishing
- RFC 6045: Real-time Inter-network Defense (RID)
- RFC 6409: Message Submission for Mail
- RFC 6528: Defending against Sequence Number Attacks
Informational
- RFC 1281: Guidelines for the Secure Operation of the Internet
- RFC 1321: The MD5 Message-Digest Algorithm
- RFC 1470: Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices
- RFC 1750: Randomness Recommendations for Security
- RFC 2076: Common Internet Message Headers
- RFC 2196: Site Security Handbook
- RFC 2411: IP Security Document Roadmap
- RFC 2504: Users Security Handbook
- RFC 2577: FTP Security Considerations
- RFC 2979: Behavior of and Requirements for Internet Firewalls
- RFC 3067: TERENA's Incident Object Description and Exchange Format Requirements
- RFC 3098: How to Advertise Responsibly Using E-Mail and Newsgroups or — how NOT to $$$$$ MAKE ENEMIES FAST! $$$$$
- RFC 3164: The BSD syslog Protocol
- RFC 3174: US Secure Hash Algorithm 1 (SHA1)
- RFC 3330: Special-Use IPv4 Addresses
- RFC 3511: Benchmarking Methodology for Firewall Performance
- RFC 3631: Security Mechanisms for the Internet
- RFC 3833: Threat Analysis of the Domain Name System (DNS)
- RFC 3871: Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure
- RFC 3964: Security Considerations for 6to4
- RFC 4096: Policy-Mandated Labels Such as "Adv:" in Email Subject Headers Considered Ineffective At Best
- RFC 4270: Attacks on Cryptographic Hashes in Internet Protocols
- RFC 4272: BGP Security Vulnerabilities Analysis
- RFC 4381: Analysis of the Security of BGP/MPLS IP Virtual Private Networks (VPNs)
- RFC 4641: DNSSEC Operational Practices
- RFC 4686: Analysis of Threats Motivating DomainKeys Identified Mail (DKIM)
- RFC 4766: Intrusion Detection Message Exchange Requirements
- RFC 4772: Security Implications of Using the Data Encryption Standard (DES)
- RFC 4778: Current Operational Security Practices in Internet Service Provider Environments
- RFC 4890: Recommendations for Filtering ICMPv6 Messages in Firewalls
- RFC 4891: Using IPsec to Secure IPv6-in-IPv4 Tunnels
- RFC 4942: IPv6 Transition/Coexistence Security Considerations
- RFC 4986: Requirements Related to DNS Security (DNSSEC) Trust Anchor Rollover
- RFC 4949: Internet Security Glossary, Version 2
- RFC 6092: Recommended Simple Security Capabilities in Customer Premises Equipment (CPE) for Providing Residential IPv6 Internet Service
- RFC 6274: Security Assessment of the Internet Protocol Version 4
- RFC 6305: I'm Being Attacked by PRISONER.IANA.ORG!
- RFC 6471: Overview of Best Email DNS-Based List (DNSBL) Operational Practices
- RFC 6480: An Infrastructure to Support Secure Internet Routing
- RFC 6561: Recommendations for the Remediation of Bots in ISP Networks
- RFC 7123: Security Implications of IPv6 on IPv4 Networks
Experimental / Historic
- RFC 4406: Sender ID: Authenticating E-Mail
- RFC 4408: Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1
- RFC 4765: The Intrusion Detection Message Exchange Format (IDMEF)
- RFC 4767: The Intrusion Detection Exchange Protocol (IDXP)
- RFC 6541: DomainKeys Identified Mail (DKIM) Authorized Third-Party Signatures
- RFC 6587: Transmission of Syslog Messages over TCP
1.02 Forensic certs & training
1.03 Online tools
- Malpedia
- Exploit Database
- CVE Details
- FileInfo
- xCyclopedia
- The Windows Binary Index
- Palo Alto Applipedia
- Windows Security Logs
- National Vulnerability Database (NVD)
- IPVOID
- AbuseIPDB
- Grabify IP Logger
- IP Logger
- IP Tracker
- IP Location Tracker
- IP Location
- URL Checker
- MAC Address Lookup
- MAC Vendor
- Ip-api
- Ipify
- Ipapi
- Vpnapi
- Ipapi
- The ZMap Project
- WiGLE
- Shodan
- Censys
- urlscan.io
- Virus Total
- Hybrid Analysis
- Cuckoo Sandbox
- AlienVault OTX
- IBM X-Force Exchange
- Cisco Talos
- Maltiverse
- GreyNoise
- SANS Internet Storm Center
- Intelligence X
- MetaDefender Cloud
- RiskIQ Community Edition
- Pulsedive
- Valhalla YARA Rules
- ANY.RUN
- Binvis
- JoeSandbox
- Verexif
- Reverse Shell Generator
- Rainbow Tables (Hashes)
- File Signatures ("Magic Numbers")
- List of File Signatures
- CyberChef
- explainshell
- VirusShare
- Reverse.IT
- Commonly Used Software Development Tools
- DeHashed
- Dencode
- Text Fixer
- SS64 Syntax Utils
- Cryptii
- MD5Hashing
- Tools4noobs
- RegExr
- Regex Generator
- Regex101
- Cron Expression Generator
- Epoch Converter
- Text to ASCII Art Generator
- DeepL
- Markdown Toolbox
- Online LaTeX Equation Editor
- Mermaid
- Table Convert
- Table Editor 2
- Div Table
- ffmpeg buddy
- Kutt your links shorter
- Grammarly
For OSINT tools visit our repository: My-OSINT
1.04 Forensic tools
Evidence Project - https://dftoolscatalogue.eu
NIST - https://toolcatalog.nist.gov
S&T partners and NIST - Computer Forensic Tool Testing (CFTT) - https://dhs.gov/science-and-technology/nist-cftt-reports
- The Sleuth Kit (TSK) (GitHub)
- Autopsy
- ImHex
- Hashcat
- John the Ripper
- Drive Badger — Covert Data Exfiltration Operations
- Making Maps for Investigators
- Offensive Google framework
- Bitlocker Key Finder
- SIFT
- RegRipper
- No More Ransom
- MS Sysinternals
- WinFE
• Ppscayl
• ImageJ
• Upscalers
• fSpy
- Find the key.
- Guess the key.
- Compel the key.
- Exploit a flaw in the encryption software.
- Access plaintext while the device is in use.
- Locate another plaintext copy.
Encryption: | Seize the encrypted files and decrypt them using a password or key and the appropriate decryption software. |
Virtualization: | Seize the virtual image file and open it with the correct password. OR Log into the virtual machine and seize the data while the virtual machine is turned on and in an unencrypted state. |
Relational Database: | Seize all the files containing records. Obtain a copy of the database software and rebuild the database. OR Log into the database while it is live and employ the application used to create and manage the database as a search tool. Download the data using the method allowed by the application, either in the form of printouts or data files. |
1.05 Cryptography
Visit our repo tree: 3.DOCUMENTS/Encryption
Encryption workarounds:
- Find the key.
- Guess the key.
- Compel the key.
- Exploit a flaw in the encryption software.
- Access plaintext while the device is in use.
- Locate another plaintext copy.
Read the thread Brute Force Attacks
Visit our repo tree: 03_DOCUMENTS/Cryptanalysis
1.06 Memory analysis
• Volatility
https://volatilityfoundation.org/releases
• Linux Memory Extractor (LiME)
https://github.com/504ensicsLabs/LiME
• Memory Analysis<br
https://www.memoryanalysis.net/amf
• Cobalt Strike in memory
https://andreafortuna.org/2020/11/22/how-to-detect-cobalt-strike-activity-in-memory-forensics/
https://teeltech.com/ufaqs/what-is-jtag-chip-off-and-isp
https://cellebritelearningcenter.com/mod/page/view.php?id=11903
https://fletc.gov/jtag-chipoff-smartphones-training-program
https://gillware.com/phone-data-recovery-services/jtag-chip-off-forensics
https://gillware.com/phone-data-recovery-services/chip-off-forensics-services
https://medusabox.com
https://riffbox.org
https://easy-jtag.com
https://z3x-team.com
1.07 Cryptocurrencies analysis
https://github.com/OffcierCia/On-Chain-Investigations-Tools-List
https://github.com/aaarghhh/awesome_osint_criypto_web3_stuff
https://blocksherlock.com/home/blockchain-explorers
https://tronscan.org
https://etherscan.io
https://algoexplorer.io
https://explorer.solana.com
https://stellar.expert
https://snowtrace.io
https://flowscan.org
https://polygonscan.com
https://github.com/demining/CryptoDeepTools
https://github.com/demining/bitcoindigger
https://github.com/graphsense
https://github.com/demining/Dao-Exploit
https://github.com/immunefi-team/Web3-Security-Library/blob/main/Tools/README.md#blockchain-analysis
https://chainalysis.com
https://elliptic.co
https://ciphertrace.com
https://coinmetrics.io
https://whitestream.io
https://elementus.io
https://trmlabs.com
https://bitok.org/investigations
👷🛠️UNDER CONSTRUCTION🚧🏗
2.01 Police hacking
Visit our repo tree:
04_POLICE_HACKING
• MITRE ATT&CK — ICS Techniques
https://attack.mitre.org/techniques/ics
• MITRE ATT&CK — Enterprise Techniques
https://attack.mitre.org/techniques/enterprise/
• MITRE ATT&CK — Mobile Techniques
https://attack.mitre.org/techniques/mobile/
• OWASP MAS - Mobile Application Security
https://mas.owasp.org
• Metasploit - Penetration testing framework
https://metasploit.com
∙ Rootme — https://root-me.org
∙ Vulnhub — https://vulnhub.com
∙ Hacker101 — https://hacker101.com
∙ Crackmes — https://crackmes.one
∙ Attack Defense — https://attackdefense.com
2.02 Law Enforcement Agency (LEA)
*First of all, consult court cases to see how laws are (mis)applied.
GE Constitution 🇩
https://gesetze-im-internet.de/englisch_gg/index.html
US Constitution 🇺
https://constitution.congress.gov
We are still reflecting on this point.
Security Bodies (Judiciary Police) |
Administration of Justice (Criminal Procedural Law) |
Intelligence Services |
---|---|---|
• Conducts criminal investigations, carries out whatever steps it deems appropriate to elucidate the facts, with a view to discovering evidence of the existence of the crime and signs of its authorship. • Criminal police bodies act as a precautionary measure, such as in the case of preserving evidence or in the case of a flagrant crime. • Has an obligation to preserve the confidentiality of the investigation, therefore the right to adversarial proceedings is limited. • In general, the investigation is already a procedural phase. |
• • In general, the criminal investigation can be directly initiated by other institutions, such as the Public Prosecutor's Office. • Full exercise of the right to adversarial proceedings • Follow due legal process, the criminal procedural law. |
• Production of knowledge, with production of intelligence reports, to support decision making. • Their main objectives are to collect information and provide analyses, as well as anticipate and counteract external threats. • Compartmentalization princpiple: the production of information is separate from decision making, it ensures no single spy knows everything, meaning if they're captured, spies won’t know enough to compromise a mission. • In general, intelligence activity does not follow due legal process, intelligence agencies do not conduct criminal proceedings, although they can combat terrorism. • Related to military activities of national defense and conquest against foreign enemies. |
*Informational separation of powers: in Germany, where the Gestapo of National Socialism existed, the separation between intelligence (knowledge) and police (power) was one of the denazification measures imposed by the allies in 1949.
*There is some controversy as to whether intelligence can be considered security.
∙ UN — Library of Resources
https://unodc.org/e4j/en/resdb/index.html
∙ UN — Course Catalogue
https://unodc.org/elearning/en/courses/course-catalogue.html
∙ ICRC - Cyber operations during armed conflicts
https://icrc.org/en/war-and-law/conduct-hostilities/cyber-warfare
∙ ICRC - New technologies and IHL
https://icrc.org/en/war-and-law/weapons/ihl-and-new-technologies
∙ The Cyber Law Toolkit - The intersection of international law and cyber operations
https://cyberlaw.ccdcoe.org/wiki/Main_Page
∙ Budapest Convention (Cybercrime)
https://coe.int/en/web/cybercrime/the-budapest-convention
∙ Octopus Project
https://coe.int/en/web/cybercrime/octopus-project
PUBLIC INTERNATIONAL LAW | |||
---|---|---|---|
LAWS OF WAR | LAWS OF PEACE | ||
"Jus ad bellum" | "Jus in bello" | Occupation and "Jus Post Bellum" | Human Rights Law |
The international rules pertaining to which extent the use of military force against another state is allowed. | The international rules pertaining to how armed conflict must be conducted. | The Justice at the end of the war, helps move from conflict to peace.Reasonable peace treaties, civilian population should be protected, leaders who broke Hague/Geneva laws must face prosecution, cities must be reconstructed. |
International Bill on Human Rights. Treaties and Conventions. Covenats and Declarations. |
Charter of the United Nations. Chapter VII — Action with respect to Threats to the Peace, Breaches of the Peace, and Acts of Aggression - Article 51
“Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defence shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.”
Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I)
“Article 3 of the Geneva Conventions and Article 44 Additional Protocol I
In order to promote the protection of the civilian population from the effects of hostilities, combatants are obliged to distinguish themselves from the civilian population while they are engaged in an attack or in a military operation preparatory to an attack. Recognizing, however, that there are situations in armed conflicts where, owing to the nature of the hostilities an armed combatant cannot so distinguish himself, he shall retain his status as a combatant, provided that, in such situations, he carries his arms openly:(a) During each military engagement, and
(b) During such time as he is visible to the adversary while he is engaged in a military deployment preceding the launching of an attack in which he is to participate.
(c) Acts which comply with the requirements of this paragraph shall not be considered as perfidious within the meaning of Article 37, paragraph 1."
References:
UN - https://legal.un.org/repertory/art1.shtml
ICRC - https://icrc.org/en/document/what-are-jus-ad-bellum-and-jus-bello-0
ICRC - https://ihl-databases.icrc.org/en/ihl-treaties/api-1977?activeTab=undefined
ICRC - https://casebook.icrc.org/a_to_z/glossary/direct-participation-hostilities
∙ Cybercrime — https://coe.int/cybercrime
∙ GLACY+ — https://coe.int/en/web/cybercrime/glacyplus
∙ iPROCEEDS-2 — https://coe.int/en/web/cybercrime/iproceeds-2
∙ Octopus Project — https://coe.int/en/web/cybercrime/octopus-project
∙ CyberSouth — https://coe.int/en/web/cybercrime/cybersouth
∙ CyberEast — https://coe.int/en/web/cybercrime/cybereast
- Council of Europe – Cybercrime Digest and Cybercrime@CoE Update: a bi-weekly selection of news relevant to the current areas of interest to the Cybercrime Programme Office of CoE (C-PROC) and a quarterly review of the work carried out by the Cybercrime Convention Committee (T-CY).
- Council of Europe – Cybercrime Newsletter: subscribe to receive the latest updates on the topic.
- CERT-EU: access quarterly Threat Landscape Reports and monthly Cyber Security Briefs from the Computer Emergency Response Team for the EU institutions, bodies and agencies.
- CEPOL – Publications: find the latest documents on trainings for law enforcement officials including the European Law Enforcement Research Bulletin.
- ENISA Newsroom: follow the most recent news on cybersecurity.
- ENISA Publications: sort the latest publications on cybersecurity by topic (and download copies).
- EUROJUST Newsletter: news from the European Union Agency for Criminal Justice Cooperation.
- European Commission’s DG HOME Newsletter: spotlight on Schengen and borders, internal security and relevant European funds.
- Europol – Email alerts: ranging from news to upcoming publications and vacancies, choose what alerts to receive.
- Organisation for Security and Co-operation in Europe (OSCE) Newsletter: hand-picked updates and in-depth information bundles on OSCE activities, with possibility to choose countries of interest.
- SIRIUS project publications: co-implemented by Europol and Eurojust, in close partnership with the European Judicial Network, the SIRIUS project is a central reference point in the EU for knowledge sharing on cross-border access to electronic evidence and allows to download, among other publications, the yearly EU Digital Evidence Situation Report.
∙ US — Federal Rules — Criminal Procedure — Overview — Link
∙ US — Federal Rules — Criminal Procedure — Rule 41 — Search and Seizure — Link
On a Network in a Single District |
On a Network in Multiple Districts | On a Network with Data Stored Internationally | Unknown Where the Data is Stored (Cloud) |
Search under Rule 41; consider noting in affidavit the possibility of other locations | Multiple search warrants for each district with data or §2703 Warrant served on service provider | Use legal process required in country hosting the data, or consider accessing data remotely with a search warrant under Rule 41 | Search under Rule 41 for subject computers, and concurrently search under §2703 served on service provider |
∙ EU — Criminal procedural laws across the European Union – A comparative analysis — Link
∙ NL - National Coordinator for Security and Counterterrorism - https://english.nctv.nl
∙ GE — German Criminal Code (Strafgesetzbuch — StGB) — Link
∙ GE — German Code of Criminal Procedure (Strafprozeßordnung — StPO) — Link
∙ GE — German Code of Criminal Procedure - StPO, Section 100a - Telecommunications surveillance — Link
∙ GE — Law on the Federal Criminal Police Office and cooperation between the federal and state governments in criminal police matters (Federal Criminal Police Office Act - BKAG) - § 49 Covert intervention in information technology systems — Link
∙ UK — Crime, justice and law — Law and practice — Link
∙ UK — Public General Acts — Investigatory Powers Act 2016 — Link
∙ UNODC — Case Law Database — https://sherloc.unodc.org/cld/v3/sherloc/cldb/index.html?lng=en
∙ UNODC — Cyber Organized Crime — https://unodc.org/e4j/en/cybercrime/module-13/additional-teaching-tools.html
∙ US Cases — https://courtlistener.com/opinion
∙ US Federal Cases — https://pacer.uscourts.gov/find-case
∙ US Dod - Computer Crime and Intellectual Property Section (CCIPS) - https://justice.gov/criminal/criminal-ccips
∙ US FBI - Internet Crime Complaint Center (IC3) - https://ic3.gov
∙ Computer Crime Research Center - https://crime-research.org
∙ EUR-Lex https://eur-lex.europa.eu/homepage.html
∙ European Court of Justice https://curia.europa.eu
∙ EU Common Portal of Case Law — https://network-presidents.eu/cpcl
∙ Casetext (Thomson Reuters) - https://casetext.com
∙ Council of Europe - COE Cybercrime - https://coe.int/en/web/cybercrime
∙ Council of Europe - Octopus Cybercrime Community - Materials - https://coe.int/en/web/octopus/training
Countries | Five Eyes | Nine Eyes | Fourteen Eyes | Other |
United Kingdom | ✔️ | ✔️ | ✔️ | |
United States | ✔️ | ✔️ | ✔️ | |
Australia | ✔️ | ✔️ | ✔️ | |
Canada | ✔️ | ✔️ | ✔️ | |
New Zealand | ✔️ | ✔️ | ✔️ | |
Denmark | ✔️ | ✔️ | ||
Netherlands | ✔️ | ✔️ | ||
France | ✔️ | ✔️ | ||
Norway | ✔️ | |||
Germany | ✔️ | |||
Belgium | ✔️ | |||
Spain | ✔️ | |||
Sweden | ✔️ | |||
Italy | ✔️ | |||
Israel | ✔️ | |||
Japan | ✔️ | |||
Singapore | ✔️ | |||
South Korea | ✔️ |
"Apart from these methods of cooperation, there are a number of equally secretive bilateral and multilateral agreements in other regions of the globe – such as the Club of Berne (an intelligence-sharing arrangement among the EU intelligence services) and the Shanghai Cooperation Organizations (an affiliation among the People’s Republic of China (‘China’), India, Kazakhstan, Kyrgyzstan, Pakistan, the Russian Federation (‘Russia’), Tajikistan and Uzbekistan) – together with intelligence exchange arrangements within a group of states comprising Russia, Iraq, Iran and Syria to facilitate the fight against the Islamic State."
(Ref.: WATT, Eliza. State Sponsored Cyber Surveillance: The Right to Privacy of Communications and International Law. Edward Elgar Publishing, 2021.)
2.03 Liability for Contents
TorrentFreak
https://torrentfreak.comhttps://torrentfreak.com/category/lawsuits
https://torrentfreak.com/category/law-politics
TorrentFreak - Newsletter
https://torrentfreak.com/subscriptionshttps://t.me/torrentfreaks
https://defcon.social/@torrentfreak
https://torrentfreak.com/feed
Where are torrents permitted? (2024)
- How to start your own ISP
- UK ISP Court Orders
- Web Sheriff
- A new bill could punish web platforms for using end-to-end encryption
- French court rules that Steam’s ban on reselling used games is contrary to European law
- MEPs approve sweeping changes to copyright law
- The Legalities of Linking
- COPYRIGHT LIABILITY FOR LINKING AND EMBEDDING — Klaris Law (.PDF)
- EU court says linking to copyrighted material isn't illegal
- IP Address is Not Enough to Identify Pirate, US Court of Appeals Rules — (.PDF)
- New EU Piracy Watchlist Targets Key Pirate Sites and Cloudflare — (.PDF)
- Domain Registrar Can be Held Liable for Pirate Site, Court Rules
- Reporting When Pirate Releases Hit The Internet is Apparently Illegal Now
- Swiss Copyright Law: Downloading Stays Legal, No Site Blocking
- List of websites blocked in the United Kingdom
- Major US ISPs Refuse to Discuss Repeat Infringer Policies
- Who Watches the Watchmen: Exploring Complaints on the Web
- British ISPs throw in the towel, give up sending out toothless copyright infringement warnings
2.04 Tor Fingerprint
• TOR Fingerprinting — https://blog.torproject.org/browser-fingerprinting-introduction-and-challenges-ahead
• Attacks on Tor — https://github.com/Attacks-on-Tor/Attacks-on-Tor
• EFF Test — https://coveryourtracks.eff.org/learn
2.06 Supply Chain Attack
• https://reproducible-builds.org
• https://github.com/SAP/risk-explorer-for-software-supply-chains
• https://github.com/ossillate-inc/packj
2.07 APT & Cybercriminal Campagin Collections
• https://attack.mitre.org/groups
• https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
2.08 Man In The Middle (MitM)
• https://github.com/frostbits-security/MITM-cheatsheet
• https://github.com/mitmproxy/mitmproxy
• https://mitmproxy.org
• https://github.com/andreafortuna/MITMInjector
• https://github.com/KoreLogicSecurity/wmkick
• https://github.com/jakev/mitm-helper-wifi
• https://github.com/jakev/mitm-helper-vpn
2.09 Network Analysis (SIGINT)
• Snort — https://github.com/snort3
• Wireshark — https://wireshark.org
• NMAP — https://nmap.org
Live System Based
2.10 Metadata
∙ ExifTool — https://github.com/exiftool/exiftool
∙ PhotoDNA — https://anishathalye.com/inverting-photodna
∙ Geo-tags — https://tool.geoimgr.com
2.12 Social Engineeringg
- Social Engineering Fundamentals, Part I: Hacker Tactics, SecurityFocus
- Social Engineering Fundamentals, Part II: Combat Strategies, SecurityFocus
- Awesome Social Engineering — GitHub
- Social Engineer Toolkit — GitHub
${\color{Yellow}\textbf{PHONE SNIFFING}}$
• DEFCON Safe Mode - Cooper Quintin - Detecting Fake 4G Base Stations in Real-Time
https://youtube.com/watch?v=siCk4pGGcqA
• SRLabs - Warn you about threats like fake base stations (IMSI Catchers)
https://github.com/srlabs/snoopsnitch
• Android IMSI-Catcher Detector (suspended)
https://github.com/CellularPrivacy/Android-IMSI-Catcher-Detector
• Telecom Exploits - Signalling System 7 (SS7)
https://github.com/SigPloiter/SigPloit
• Telecom Exploits - HLR Lookups
https://github.com/SigPloiter/HLR-Lookups
Useful Websites
— OpenCellID — Link
— Cell Tower Locator (Cell2GPS) — Link
— Cell Phone Trackers — Link
— International Numbering Plans — Link
— GSM World Coverage Map and GSM Country List — Link
— Imei Info — https://imei.info
— GSMArena Phones Ref.- https://gsmarena.com
— Phonescoop Phones Ref.- https://phonescoop.com
— Cell Towers — https://opencellid.org
Information & Explanations
— IMSI-catcher — Link
— GSM frequency bands — Link
— List of software-defined radios — Link
Useful Apps
— Mobile Software
— AIMSICD — Link
— SnoopSnitch — Link
— Desktop Software
— GsmEvil 2 — Link
— IMSI-catcher — Link
Equipment
GSM 900 / GSM 1800 MHz are used in most parts of the world: Europe, Asia, Australia, Middle East, Africa. GSM 850 / GSM 1900 MHz are used in the United States, Canada, Mexico and most countries of S. America.
— SDR
— RTL-SDR (65MHz-2.3GHz) — Link
— Antenna
— Antenna — Link
Equipment
— Catching IMSI Catchers — Link
GSM Sniffing Install/Setup Guide
Install
$ sudo apt install python3-numpy python3-scipy python3-scapy gr-gsm $ git clone https://github.com/Oros42/IMSI-catcher && cd IMSI-catcher $ sudo grgsm_livemon && python3 simple_IMSI-catcher.py --sniff
GSM Install Error? Try this!
$ sudo apt-get install -y \ cmake \ autoconf \ libtool \ pkg-config \ build-essential \ docutils \ libcppunit-dev \ swig \ doxygen \ liblog4cpp5-dev \ gnuradio-dev \ gr-osmosdr \ libosmocore-dev \ liborc-0.4-dev \ swig $ gnuradio-config-info -v
Tips
$ sudo grgsm_scanner -l # List your SDR connected. $ sudo grgsm_scanner # Scan for cell towers near you. $ sudo grgsm_livemon # Live radio scanning.
${\color{Green}\textbf{BRUTE FORCE ATTACKS}}$
Brute Force Attacks
The speed at which your password is cracked depends on the entropy of your password and the power of the computer.
Computer programs used for brute force attacks can check anywhere from 10,000 to 1 billion passwords per second. A Pentium 100 can try 10.000 passwords a second. A supercomputer can try 1.000.000.000 per second.
Complex sheet:
Simplified sheet:
Types of brute force attacks
Simple Brute Force Attack
The attacker relies on trying out commonly used, weak passwords such as 123456, qwerty, admin, changeme, qazwsxedc etc.
Dictionary attack
Software that can make thousands of guesses every second using dictionary databases, hence the name of the attack.
Hybrid Brute Force Attack
A hybrid attack is utilized once the attacker already knows the username of its prey.
Reverse Brute Force Attack
A reverse brute force attack requires the attacker to know the password beforehand and then attempt to guess the username.
Credential stuffing
Hackers can get entire databases of stolen login credentials and then try to apply them to the account they’re trying to access. This kind of attack can be especially devastating if the attacked user reuses passwords across multiple accounts.
Rainbow Table Attack
A rainbow table attack is a method of password cracking that employs rainbow tables to break the password hashes in a database. Websites or apps don’t store passwords in plain text; instead, they encrypt passwords with hashes. Once the password is used for logging in, it is immediately converted to a hash. The next time the user logs in using their passwords, the server checks whether the password matches the previously created hash. If the two hashes match, the user is then authenticated. The tables used to store password hashes are known as rainbow tables.
Multi Factor Authenticator (MFA) or Two-factor Authenticator (2FA)
Set up MFA whenever possible, It's an extra layer of security that requires additional steps to verify the user's identity.
Encryption workarounds:
- Find the key.
- Guess the key.
- Compel the key.
- Exploit a flaw in the encryption software.
- Access plaintext while the device is in use.
- Locate another plaintext copy.
Forensic Publications
Search parameters example:
police hacking intext:illegal intext:abusive intext:law
You could set keyword alerts: Google Scholar Alerts
- List of Academic Databases and Search Engines - Wikipedia
- Lists of Academic Journals - Wikipedia
- List of Open-Access Journals - Wikipedia
- Science Direct — Forensic Science International: Digital Investigation
- Forensic Science — Application of Science to Criminal and Civil Laws
- University of London - SAS Open Journals - Digital Evidence and Electronic Signature Law Review
- IEEE Intelligence and Security Informatics (IEEE-ISI)
- USENIX Conferences
- International Journal of Intelligence and CounterIntelligence
- Australian Journal of Forensic Sciences
- Advancing Technology, Research and Collaboration
- Communications in Computer and Information Science — Springer
- IEEE Open Journal of Circuits and Systems
- IEEE Open Journal of the Communications Society
- IEEE Open Journal of the Computer Society
- IEEE Open Journal of Signal Processing
Sites of Interest
- https://cve.org
- https://cvedetails.com
- https://attack.mitre.org
- https://civicert.org
- https://openwall.com
- https://lkrg.org
- https://exterro.com
- https://eforensicsmag.com
- https://csrc.nist.gov/projects
- https://nvd.nist.gov
- https://cisa.gov/news-events/cybersecurity-advisories
- https://nsa.gov/Press-Room/Press-Releases-Statements
- https://nsa.gov/ia/mitigation_guidance/security_configuration_guides/index.shtml
- https://malware.lu
- https://securelist.com
- https://eucybernet.eu
- https://oval.mitre.org
- https://w3.org/Security/Faq/www-security-faq.html
- https://nowsecure.com
- https://htcia.org
- https://digitalcitizensalliance.org/get-informed/digital-citizens-investigative-reports
- https://reddit.com/r/InfoSecNews
- https://reddit.com/r/digitalforensics
- https://reddit.com/r/computerforensics
- https://reddit.com/r/antiforensics
- https://reddit.com/r/Smartphoneforensics
- https://reddit.com/r/privacy
- https://reddit.com/r/restorethefourth
- BlueTeamSec
- Computer Forensics
- CyberSecurity
- NetSec
- NetSec Students
- Network Security News & Information
- Reverse Engineering
- pwned
- https://github.com/yeahhub/Hacking-Security-Ebooks
- https://github.com/InfoSecIITR/reading-material
- https://forensicfocus.com
- https://forensicscijournal.com
- https://www.swgde.org/documents/published-complete-listing
- https://book.hacktricks.xyz
- https://hackthebox.com
- https://hackerone
- https://hackread.com
- https://htcia.org
- https://osforensics.com
- https://magnetforensics.com
- FTK Lite
- SSAC Publications
- Botnets as a Vehicle for Online Crime — CERT
- Security Audit
- SANS Institute
- Internet Storm Center — SANS Institute
- COAST Hotlist: Computer Security, Law and Privacy — CERIAS, Purdue University
- DFIR Training —
- https://evasions.checkpoint.com —
- https://www.nsa.gov/Research/Featured-Publications-by-NSA-Researchers
Law Publications
- German Legal Research Guide - Georgetown Law
- German Law Research - Harvard Law School Library Research Services
- The German Law Journal (open-access) - Cambridge University Press
- Foreign Law Translations - The University of Texas at Austin
- Harvard Journal of Law and Technology
- Berkeley Law Technology Journal
- European Journal of Law and Technology
- International Review of Law, Computers & Technology (Open Access)
- Northwestern Journal of Technology and Intellectual Property
- Ohio State Technology Law Journal (Moritz College of Law)
- Science Direct — Computer Law & Security Review
- The Digital Evidence and Electronic Signature Law Review (DEESLR) (Open Access)
- The Duke Law & Technology Review (DLTR)
- Carnegie Endowment for International Peace
- CIS - Stanford Center for Internet and Society
- The Berkman Klein Center for Internet & Society at Harvard University
- The Center for Security and Emerging Technology (CSET) - Georgetown University's Walsh School of Foreign Service
- Bad Internet Bills
- Computer Crime Research Center
- ETSI - European Telecommunications Standards Institute
- Intelligence Oversight
- Internet Crime Complaint Center (IC3)
- Software Freedom Law Center
- Techdirt
- The APWG Symposium on Electronic Crime Research (APWG eCrime)
- UN Internet Governance Forum
- Tilburg: TILT Law & Technology Working Paper Series
- AIDP-IAPL Publications
- European Journal of Criminology
- Information Security Journal: A Global Perspective
- Information Systems Security
- Journal of Applied Security Research
- Journal of Computer Information Systems
- Police Practice and Research — An International Journal
- Policing and Society — An International Journal of Research and Policy
- Digital Commons @ USF
- NIST Computer Security Resource Center
- SHERLOC UNODC
- U.S. Department of Justice - Cybercrime
- Council of Europe - Cybercrime
- European Union Agency for Cybersecurity (ENISA)
- FBI
Libraries
Take care with scams!
Take care with scams!
Take care with scams!
- Internet Archive
- Anna's Archive - Search engine for major libraries
- Z-Library (Web)
- Z-Library (App)
- Z-Library (Telegram)
- Libgen Desktop - Browse local LibGen catalog
- Library Genesis (.rs alias)
- Library Genesis (.is alias)
- Library Genesis (.st alias)
- Library Genesis (ONION)
- Imperial Library (ONION)
- Trantor - Darkweb e-Book resource
- Flibusta - Russian e-Book site
- Rave Book Search Engine - Indexes comic and ebook sites
- Free Computer Books
- Freetechbooks
- Programmer Books
- RIP Tutorial
- E-Books Directory
- Open Courses
- Open Textbooks
- Sci-Hub - Access articles through various domains
- SciMag - Scientific Articles section of LibGen
- Free Full PDF
- r/Scholar - Request articles
- Open Access Button - Search engine for research articles
- Unpaywall - Browser extension for research articles
- LibriVox - Free Audiobooks
- Mobilism (.me)
- AudioBookBay
- Galaxy Audiobooks
- LibriVox - Legally free audiobooks
- DeDRM - Remove DRM from e-Books
- Virus Total - Free virus, malware and URL online scanning
- IRChighway.net/eBooks - Use this guide for commands
- Rippedpiracy Literature e-Books
Activism, Nonprofit Initiatives and Private Initiatives
- AFSC and Economic Activism
- BBW
- Bugged Planet
- Citizenlab
- Cops in Cyberspace
- EFF
- EPIC
- Eye on Surveillance
- Necessary and Proportionate
- No Tech For Apartheid
- Privacy International
- S&S
- The Bureau of Investigative Journalism
- Stiftung Neue Verantwortung (SNV)
- The Tor Project
- GUARDINT
- Surveillance Oversight Database
- Intelligence Oversight
- about:intel
- Safe and Free
Intelligence, Conflict and Warfare Publications
- The NATO Cooperative Cyber Defence Centre of Excellence
- Council on Foreign Relations (CFR)
- International Security Studies Section (ISSS)
- Taylor & Francis - Intelligence and National Security - Open access articles
- The Journal of Intelligence, Conflict, and Warfare - Archive of past issues
- DCAF - Geneva Centre for Security Sector Governance - Publications on security sector governance
- E-International Relations - Open access scholarly books
- CIA.gov - Center for the Study of Intelligence - Studies in Intelligence
- Journal of Strategic Studies - Scholarly articles on strategic studies, intelligence, and military affairs
- International Journal of Intelligence and CounterIntelligence - Articles on intelligence operations, security, and counterintelligence
- RAND Corporation - Research and analysis on security, defense, and intelligence
- Chatham House - International Security Programme - Publications on international security and conflict
- Brookings Institution - Foreign Policy - Articles and research on global security and intelligence
- Foreign Affairs - Articles and analyses on international affairs, security, and intelligence
- Small Wars Journal - Discussions on military strategy, defense policy, and irregular warfare
- The International Journal of Intelligence, Security, and Public Affairs - Research on intelligence, security, and public affairs
- Irregular Warfare
- Bundeswehr University Munich - Metis Institute for Strategy and Foresight - Research on strategy, security, and military affairs
- Real Instituto Elcano - Elcano Royal Institute - Publications on international and strategic studies
- Institute for National Defense and Security Research (INDSR) - Research and analysis on security and defense
- Strategic Research Center - Expediency Discernment Council - Research papers and publications on strategic issues (limited English content)
- Venezuelan Institute for Social and Political Studies (INVESP) - Publications on political and social issues (limited English content)
- Russian International Affairs Council (RIAC) - Articles and analysis on international relations and security
- Centre for Strategic and International Studies (CSIS) Indonesia - Research and publications on security and international affairs
- Cambodian Institute for Cooperation and Peace (CICP) - Publications on peace, security, and cooperation
- Institute for Southeast Asian Studies (ISEAS) - Vietnam Academy of Social Sciences - Research on regional security and international relations
YouTube Conferences
- BlackHat Official YT
- DEFCON Conference
- Ekoparty Conference
- reconmtl
- TROOPERScon
- OffensiveCon
- hitbsecconf
- mediacccde
- secwestnet
- DebConf Videos
- 44contv
- mentalOutlaw
- Seytonic
- DoingFedTime
- Hak5
- The 8-Bit Guy
- Computerphile