SlideShare a Scribd company logo
1 of 15
Digital Forensic
Presented by –
Komal Nagre
Computer
Forensic
Tools
1. Image creation: FTK imager
• Data Preview & Imaging
1. FTK® Imager is a data preview and imaging tool that lets you
quickly assess electronic evidence to determine if further
analysis with a forensic tool such as Forensic Toolkit (FTK®) is
warranted.
2. Create forensic images of local hard drives, CDs and DVDs,
thumb drives or other USB devices, entire folders, or individual
files from various places within the media
• Perfect Copies & Forensic Images
1. FTK® Imager can create perfect copies, or forensic images of
computer data without making changes to the original evidence
2. The forensic image is identical in every way to the original,
including file slack and unallocated space or drive free space
3. This allows you to store the original media away, safe from harm
while the investigation proceeds using the image.
1. Generate hash reports for regular files and disk images to use as a benchmark to prove the
integrity of your case evidence.
2. When a full drive is imaged, a hash generated by FTK® Imager can be used to verify that the
image hash and the drive hash match after the image is created, and that the image has
remained unchanged since acquisition.
1. Mount an image for a read-only view that leverages Windows® Internet Explorer® to see the
content of the image exactly as the user saw it on the original drive.
2. See and recover files that have been deleted from the Recycle Bin, but have not yet been
overwritten on the drive.
• Image Mounting
• Hash Reports
2.Network analysis: Wireshark
Features :
• Free and open source.
• Live capture and offline analysis
• Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many
others
• Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
• Rich VoIP analysis
• Output can be exported to XML, PostScript®, CSV, or plain text
Email Forensic Tools
• Email forensic tools (also known as email analysis software) are digital tools that process, clean, parse,
visualise and extract information from emails to provide analysts with the information they need to conduct
and solve investigations.
Tools :
ETL / Data preparation
• Xtraxtor
• Aid4Mail
Investigations and Analysis
• Sintelix
• MailXaminer
Cyber Forensics
• MailPro+
• Autopsy
1.Sintelix
• Sintelix – an advanced text intelligence software used by world-leading
intelligence agencies for over a decade – is, without doubt, the most advanced
tool for visualisation and network association discovery for email investigations.
• Sintelix provides a dedicated solution for easy email analysis allowing analysts to
import email data (drag and drop) then instantly create visualisations and
networks with a few clicks.
Best used for
• Visualising email data
• Link and network analysis
• Investigation discovery
• Search email and file search
Category
• Investigation and analysis
Platforms
• Windows, Linux
Features :
• Powerful network analysis
• Automatic and customisable entity extraction
• Email de-duping and processing
• Search across both e-mails and all other data from a single
place
2.AId4mail (Email Forensics)
Aid4Mail is a fast, accurate, and easy-to-learn email forensics software
solution.
It features a detailed file inspector allowing quick analysis of suspect
emails and attachments.
Best used for
• Evidence gathering and reporting
• Low-level file inspection (hex views, file hashes)
• Preserves hidden metadata
Category
• Cyber Forensics
Platforms
• Windows
Features :
• Feature-rich File inspector
• Email de-duping and processing
• File search
• Reporting
Computer Forensic Analysis
• Checklist of Computer Forensics Analysis Discovery Of Electronic Evidence
• Do not alter discovered information.
• Always back up discovered information.
• Document all investigative activities.
• Accumulate the computer hardware and storage media necessary for the search circumstances.
• Prepare the electronic means needed to document the search.
• Ensure that specialists are aware of the overall forms of information evidence that are expected to be encountered as well as the proper
handling of this information
• Evaluate the current legal ramifications of information discovery searches.
• Back up the information discovery file or file
• Start the lab evidence log.
• Mathematically authenticate the information discovery file or files.
• Proceed with the forensic examination.
• Find the MD5 message digest for the original information discovery file or files.
• Log all message digest values in the lab evidence log.
• Briefly compare the physical search and seizure with its logical (data-oriented)
counterpart, information discovery.
Information Warfare Arsenal
• Information war has been described as "the use of information to achieve our national objectives.
• Information warfare (IW) (as different from cyber warfare that attacks computers, software, and command
control systems) is a concept involving the battlespace use and management of information and
communication technology (ICT) in pursuit of a competitive advantage over an opponent.
• Information warfare is the manipulation of information trusted by a target without the target's awareness so
that the target will make decisions against their interest but in the interest of the one conducting information
warfare.
• As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.
• Information warfare is closely linked to psychological warfar
Information warfare can take many forms:
1. Television, internet and radio transmission(s) can be jammed.
2. Television, internet and radio transmission(s) can be hijacked for a disinformation campaign.
3. Logistics networks can be disabled.
4. Enemy communications networks can be disabled or spoofed, especially online social
community in modern days.
5. Stock exchange transactions can be sabotaged, either with electronic intervention, by leaking
sensitive information or by placing disinformation.
6. The use of drones and other surveillance robots or webcams.
Thank You !

More Related Content

Similar to Computer Forensic Tools.pptx

mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptxAmbuj Kumar
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1Jinalkakadiya
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libinlibinp
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolsN.Jagadish Kumar
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowWinston & Strawn LLP
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docxsmile790243
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons Amr Nasr
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 
computer forensics
computer forensicscomputer forensics
computer forensicsAmit Singh
 

Similar to Computer Forensic Tools.pptx (20)

mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer forensics 1
Computer forensics 1Computer forensics 1
Computer forensics 1
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Dracos forensic flavor
Dracos forensic flavorDracos forensic flavor
Dracos forensic flavor
 
DracOs Forensic Flavor
DracOs Forensic FlavorDracOs Forensic Flavor
DracOs Forensic Flavor
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Computer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to KnowComputer Forensics – What Every Lawyer Needs to Know
Computer Forensics – What Every Lawyer Needs to Know
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Quality of information
Quality of informationQuality of information
Quality of information
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
s07_bhavesh_ppt
s07_bhavesh_ppts07_bhavesh_ppt
s07_bhavesh_ppt
 
3871778
38717783871778
3871778
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Digital forensics lessons
Digital forensics lessons   Digital forensics lessons
Digital forensics lessons
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Latest presentation
Latest presentationLatest presentation
Latest presentation
 
computer forensics
computer forensicscomputer forensics
computer forensics
 

Recently uploaded

AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Computer Forensic Tools.pptx

  • 2. Computer Forensic Tools 1. Image creation: FTK imager • Data Preview & Imaging 1. FTK® Imager is a data preview and imaging tool that lets you quickly assess electronic evidence to determine if further analysis with a forensic tool such as Forensic Toolkit (FTK®) is warranted. 2. Create forensic images of local hard drives, CDs and DVDs, thumb drives or other USB devices, entire folders, or individual files from various places within the media • Perfect Copies & Forensic Images 1. FTK® Imager can create perfect copies, or forensic images of computer data without making changes to the original evidence 2. The forensic image is identical in every way to the original, including file slack and unallocated space or drive free space 3. This allows you to store the original media away, safe from harm while the investigation proceeds using the image.
  • 3. 1. Generate hash reports for regular files and disk images to use as a benchmark to prove the integrity of your case evidence. 2. When a full drive is imaged, a hash generated by FTK® Imager can be used to verify that the image hash and the drive hash match after the image is created, and that the image has remained unchanged since acquisition. 1. Mount an image for a read-only view that leverages Windows® Internet Explorer® to see the content of the image exactly as the user saw it on the original drive. 2. See and recover files that have been deleted from the Recycle Bin, but have not yet been overwritten on the drive. • Image Mounting • Hash Reports
  • 5. Features : • Free and open source. • Live capture and offline analysis • Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility • Rich VoIP analysis • Output can be exported to XML, PostScript®, CSV, or plain text
  • 6. Email Forensic Tools • Email forensic tools (also known as email analysis software) are digital tools that process, clean, parse, visualise and extract information from emails to provide analysts with the information they need to conduct and solve investigations. Tools : ETL / Data preparation • Xtraxtor • Aid4Mail Investigations and Analysis • Sintelix • MailXaminer Cyber Forensics • MailPro+ • Autopsy
  • 7. 1.Sintelix • Sintelix – an advanced text intelligence software used by world-leading intelligence agencies for over a decade – is, without doubt, the most advanced tool for visualisation and network association discovery for email investigations. • Sintelix provides a dedicated solution for easy email analysis allowing analysts to import email data (drag and drop) then instantly create visualisations and networks with a few clicks. Best used for • Visualising email data • Link and network analysis • Investigation discovery • Search email and file search
  • 8. Category • Investigation and analysis Platforms • Windows, Linux Features : • Powerful network analysis • Automatic and customisable entity extraction • Email de-duping and processing • Search across both e-mails and all other data from a single place
  • 9. 2.AId4mail (Email Forensics) Aid4Mail is a fast, accurate, and easy-to-learn email forensics software solution. It features a detailed file inspector allowing quick analysis of suspect emails and attachments. Best used for • Evidence gathering and reporting • Low-level file inspection (hex views, file hashes) • Preserves hidden metadata
  • 10. Category • Cyber Forensics Platforms • Windows Features : • Feature-rich File inspector • Email de-duping and processing • File search • Reporting
  • 11. Computer Forensic Analysis • Checklist of Computer Forensics Analysis Discovery Of Electronic Evidence • Do not alter discovered information. • Always back up discovered information. • Document all investigative activities. • Accumulate the computer hardware and storage media necessary for the search circumstances. • Prepare the electronic means needed to document the search. • Ensure that specialists are aware of the overall forms of information evidence that are expected to be encountered as well as the proper handling of this information • Evaluate the current legal ramifications of information discovery searches.
  • 12. • Back up the information discovery file or file • Start the lab evidence log. • Mathematically authenticate the information discovery file or files. • Proceed with the forensic examination. • Find the MD5 message digest for the original information discovery file or files. • Log all message digest values in the lab evidence log. • Briefly compare the physical search and seizure with its logical (data-oriented) counterpart, information discovery.
  • 13. Information Warfare Arsenal • Information war has been described as "the use of information to achieve our national objectives. • Information warfare (IW) (as different from cyber warfare that attacks computers, software, and command control systems) is a concept involving the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. • Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. • As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is. • Information warfare is closely linked to psychological warfar
  • 14. Information warfare can take many forms: 1. Television, internet and radio transmission(s) can be jammed. 2. Television, internet and radio transmission(s) can be hijacked for a disinformation campaign. 3. Logistics networks can be disabled. 4. Enemy communications networks can be disabled or spoofed, especially online social community in modern days. 5. Stock exchange transactions can be sabotaged, either with electronic intervention, by leaking sensitive information or by placing disinformation. 6. The use of drones and other surveillance robots or webcams.