WELCOME !

THANK YOU FOR VISITING THIS SITE. I HAVE BEEN USING BOTH SWAHILI AND ENGLISH LANGUAGE TO EXPRESS ISSUES - I HAVE ATTACHED ENGLISH VERSION TO SOME OF THE SWAHILI NEWS/STORY AT THE END.

Saturday 4 January 2014

WRITING AN INVESTIGATION REPORT

Mr. Kileo - Cyber security and digital forensics investigation expert.
                           


The above document will guide you to the short forensic report sample on a fragment case that will help you understand how to perform Forensics investigation and how to write Forensics investigation report.
This sample report should be used for study purposes.

DR. TOURÉ RECENTLY DELIVERED AT THE GENEVA PRESS CLUB - THE ANALYSIS.

This issue is particularly topical, it is of rising importance globally and affects all of us – whether we realise it or not.

In terms of global communications, we are living through the most exciting period in human history. There are almost as many mobile subscriptions as there are people on the planet and by the end of 2013, 2.7 billion people will be using the internet; with 2.1 billion active mobile-broadband subscriptions.

The internet is a global resource, a basic commodity and a valuable international platform for exchange where everyone is able to participate. Many of us will recognise benefits such as; the exchange of ideas, access to healthcare and education, the buying and selling of products and services, and keeping in touch with friends and family.

However, there is a dark side to this global resource which stems from the misuse of information and communication technologies, ICTs. Cyberthreats and cybercrime are a natural consequence of so many people globally embracing the advantages that ICTs bring to our world.

 But there are some startling facts from the 2013 Internet Security Threat Report from ITU-IMPACT;

- There was a 42% increase in targeted attacks in 2012.

- The number of phishing sites spoofing social networking sites increased 125%.

- Web-based attacks increased 30%.

Such trends are rising; high-profile attacks are continuing to hit major organisations, cybercriminals are becoming more skilled at penetrating organisations and avoiding detection. Hacker groups are increasingly trying to profit by abusing legitimate online revenue sources such as online advertising.

The job of the cybercriminal and hacker is made easier by the new generation of young social networkers as they are far more likely to reveal personal data online. Another worrying trend is the ‘crimeware-as-a-service’ market which allows even technically-unsophisticated criminals to cause maximum damage. It is frightening to discover that you can now hire someone to carry out a Denial of Service (DoS) attack for as little as two US dollars an hour! In the near future, it may not just be cybercriminals that use these approaches.


USALAMA WA KIMTANDAO

Ufafanuzi wa mikutano/Vikao kadhaa ambavyo vimejiri katika mataifa mbali mbali barani Afrika ulipata kuonekana kupitia magazeti kadhaa Nchini Tanzania ikiwemo gazeti la Annur. Kumekua na mazungumzo yanayopelekea jitihada mbali mbali katika sekta ya usalama mtandao yenye mlengo wa kuhakiki tunapata bara salama kimtandao ambapo Binafsi (YUSUPH KILEO) Nimekua si tu nahudhuria na kutoa mada mbali mbali, bali pia kuhakiki naongeza mchango wangu kufikiwa malengo ya kile tunacho kijadili.



Zaidi unaweza pitia taarifa hii katika Gazeti hapo chini.





ANGALIZO KWA WATUMIAJI WA WINDOW XP

Kampuni ya Microsoft imetoa angalizo kwa wateja wake ambao bado wanatumia “Window XP”. Kampuni hiyo imeeleza kuwa hapatakuwepo na “updates” zaidi kwenye “Window XP Service Pack 3” baada ya mwezi wanne mwaka 2014.
Akiongea na wataalam mbali mbali wa maswala ya ulinzi mtandao August 16 Mwaka 2013, Bwana Tim Rains alisema “Ingawa Window XP wakati imetolewa ilikua ni yenye ubora na yenye kupendwa zaidi,  kwa sasa imekua ni dhaifu  kutokana na ongezeko la uhaifu mtandao”

Aliongeza na kusema Mara baada ya kuacha kuendelea kuihudumia Window XP wahalifu mtandao “Hackers” watatumia mianya hiyo kuweza kuingilia Komputa za wateja wao ambao watakua wanaendelea na matumizi ya Windo XP huku akiendelea kusisitiza Windows mpya ambazo zimekua ziki endelea kutolewa na Kampuni hiyo Ya Microsoft zimeendelea kutafutiwa suluhu pale tu inapo onekana wahalifu mtandao wameweza kugundua namna ya kupenyeza na kuweza kuingia katika Komputa za watu bila ridhaa yao bodhaa zao za Microsoft.

“Kwa sasa Microsoft Security Response Center imekua ikotoa “Updates” kwa wateja wao ili kuwalinda dhidi ya wahalifu wenye nia ya kupenya kwenye komputa zinazotumia bidhaa zao. Ifikapo tarehe 8 ya Mwezi wa Nne mwaka Huu wa 2013, Makampuni ambayo bado yatakua yanatumia Window XP wahalifu mtandao “Attackers” wanaweza kuwa na namna ya kutafuta mapuungufu katika Window XP ambapo baadae wanaweza kutumia mapungufu hayo kuleta athari na Kampuni ya Microsoft haitakua na usaidizi wa bure au wa kulipia ndidi ya hali hiyo kwani tayari itakua imekwisha acha kutoa msaada dhidi ya Window XP” alisema bwana Tim Rains.

Wachangiaji wa mada hiyo waliweza kuonyesha Hisia tofauti dhidi ya angalizo hilo, Na tulipo zungumza na bwana Yusuph Kileo ndidi ya Taarifa hiyo alisema, “Naimani kabisa Tarehe zitafika nabado baadhi ya Makampuni yataendelea na matumizi Ya Window hiyo ambapo huwenda ikaongeza urahisi wa wahalifu kupenyeza katika mifumo mbali mbali inayo tumia window Hiyo ya XP ingawa Microsoft tayari wamesha tangaza ya kua msaada zaidi katika Window XP hautakuwepo na huwenda ikawa ndio sababu ya wahalifu kuanza kutumia mwanya huo kuingilia Komputa za watu wenye matumizi ya Window hiyo ya XP”

Aidha kwa taarifa nyingine, Tarehe 19 Ya Mwezi wa nane 2013 Jijini California Nchini Marekani Jaji Charles Breyer wa mahakama ya Wilaya jijini humo ametoa hukumu kwa watumiaji wa mitandao ambao wamekua na tabia ya kubadilisha IP (internet protocol) au kuwa na matumizi ya “Proxy server” kwa malengo ya kuzingilia Tovuti nyingine “Public Websites”.
Katika kesi hiyo iliyo husisha makampuni mawili ya nchi hiyo yaliyo jilikana kama “Craigslist” pamoja na “3taps” Jaji huyo Alifafanua kwa kusema mtumiaji anapokua na tabia hiyo atakua amekiuka kipengele cha katiba ya nchi hiyo kinachojulikana kama CFAA “Computer Fraud and Abuse Act”.

Alipo ulizwa bwana Yusuph Kileo kuhusiana na tukio hilo alizungumza na kusema “Kilichotokea katika kesi hiyo ni kwamba 3taps wali ingia kwenye Kampuni ya Craigslist kwa kubadilisha IP(Internet Protocol) yake na kutumia “Proxy server” ili kuficha utambulisho wake “Identity” huku wakichukua taarifa kutoka katika kampuni ya Craiglist  ndipo Graiglist walipo fungua mashtaka dhidi ya kampuni ya 3taps.



HOW TO RECOVER DELETED DATA FROM A COMPUTER


This Document is segregated into three main chapters which are the introduction, Investigation process and conclusion. The introduction highlights the main aspects of the thesis; the investigation process describes in detail the steps that the investigation team would take in investigating the above highlighted case and the forensic tools used.
It must be noted that different tools would be used at different phases of the investigation process; therefore for clarity usable tools for specific phases would be explained when describing activities of that particular phase.

The conclusion as the name suggests would summarize the main contents of the project as well as briefly outline the deducted lessons from the project and the challenges faced and how they were mitigated.

WATAALAM WA TEHAMA KATIKA NGAZI YA DUNIA WAKUTANA KUJADILI MASWALA MABALI MBALI

Mkutano Mkuu ulio washirikisha wataalam wa sekta ya teknologia katika ngazi ya kidunia umemalizika salama na kuna mengi ambayo yamepata kujadiliwa kwa kina .
Kwa kifupi yaliyojiri katika mkutano huo ni pamoja na :-
1.      Mapitio ya takwimu za makosa mtandao kwa kina katika mwaka huu. Mjadala ulibobea zaidi katika, nini hasa sababu ya makosa haya kuonekana kukua na nini kifanyike ili kupunguza kasi ya ukuwaji makosa haya.
2.      Namna ya utumaji wa “Key” ambazo zimetumika kuficha maneno “Encryption Key” ili kuweza kuongeza wigo wa usiri katika taarifa zinazo safirishwa kupitia mitandao.

TANZANIA NA HALI YA USALAMA WA KIMTANDAO - 2

Wiki iliyopita nilianza sehemu ya kwanza ya makala yangu kuhusu hali ya usalama wa kimtandao nchini, endelea… 

Bonyeza Link hapo Chini Kusoma Taarifa ya - 2.

Tanzania na hali ya usalama Kimtandao - 2 (MWANACHI - Gazeti)



TANZANIA NA HALI YA USALAMA WA KIMTANDAO - 1

Hivi karibuni kumekuwa na midahalo mbalimbali ambayo imekua ikiendelea katika nchi nyingi, ikiwamo Tanzania kuhusu masuala ya ulinzi wa huduma za mtandao.Binafsi nimepata kuhudhuria mijadala kama mwanachama wa kudumu wa kikundi kinachojihusisha na masuala ya ulinzi mtandao katika nchi za Afrika. Katika vikao tofauti, majadiliano yalikua ni mengi ambapo hali ya usalama wa kimtandao imechambuliwa kwa ngazi ya kidunia, na kudhihirika kuwa kumekuwepo na ongezeko kubwa la makosa ya kimtandao, hususan mwaka huu. 
Hadi sasa baadhi ya nchi tayari zimeweza kupiga hatua katika kukabiliana na hali hiyo. Taarifa iliyowasilishwa na Profesa Hamadoun Toure kutoka ITU (International Telecommunication Union) iliyo chini ya Umoja wa Kimataifa ilisema, kuna mategemeo mwishoni mwa mwaka huu pakawa na watumiaji biilioni 2.7 wa mtandao 
Aidha, ripoti iliyowasiilishwa na ITU huko Geneva ilisema, kumekuwepo na ongezeko kubwa la madhara ya uhalifu wa kimtandao, ambapo ilielezwa mitandao imekuwa ikiathiriwa kwa zaidi ya asilimia 30. Pia mitandao ijulikanayo kama “Phishing Sites spoofing social networks” imeongezeka kwa asilimia 125, na kuelezwa nusu ya vijana wenye umri kati ya miaka 13 hadi 17 uliimwenguni kote wamekua wakiathirrika na kilichotambulishwa kama “Cyberbulling”. 
Vile vile tafiti zilizowasilishwa katika ripoti ya “The World Federation of Exchanges and the International Organization of Securities Commissions” zimeeleza nusu ya taasisi za fedha duniani zimeweza kuathirika na uhalifu wa kimtandao ikiwamo wizi hadi kufikia mwaka jana mwishoni Kibaya zaidi ni kwamba takriban robo ya taasisi hizo zinaelezwa kushindwa kutatua changamoto hiyo. Kimsingi, jambo hili na mengine yaliyojadiliwa kwa kina yalionekana kuwa ni changamoto kubwa katika dunia ya sasa, ambapo kutakuwa na ugumu mgumu kukimbia utumiaji wa teknolojia katika maisha ya kila siku.
Hali ilivyo Tanzania
Kwa sasa hali ya utumiaji wa mitandao nchini imeongezeka katika sekta mbalimbali, kuanzia kufanya miamala ya biashara hadi katika sekta za elimu na maeneo mengine mengi. Hata hivyo, kuna wimbi kubwa la matumizi mabaya ya mitandao, hivyo kusababisha athari kubwa kwa jamii hasa katika masuala ya biashara na usalama wa nchi.