·

·

Network Forensics Expert Request

The plaintiffs respectfully request the appointment of independent network forensics experts to examine the telecommunications traffic associated with fuel‑station automation systems and health‑app backends during the period 2020–2023. The mandate should include: (i) retrieval, to the extent technically and legally possible, of router, firewall and telecom operator logs relating to data links serving fuel‑station SCADA/automation and the relevant central servers; (ii) packet‑level and flow‑level analysis to identify abnormal patterns such as systematic packet loss, unexplained rerouting, parallel tunnels or mirroring of traffic to undisclosed destinations; and (iii) assessment of whether any such anomalies are consistent with the operation of hidden monitoring channels capable of carrying environmental or aerosol‑related data alongside ordinary operational traffic. The plaintiffs emphasise that they do not assert in advance that such covert channels existed; rather, they submit that only a formal network‑forensics examination can reliably confirm or rule out the presence of “data leakage” or parallel backend paths during the period of continuous HES‑related broadcasts.

Here is a concise English formulation of what you just asked, in a way you can drop directly into your file:

From an engineering perspective, the method described above is technically possible. Modern SCADA and automation systems at fuel stations already transmit real‑time tank and pump data over IP‑based telecom networks, and such traffic can, in principle, be duplicated, rerouted or correlated with other backend systems that use the same or adjacent infrastructure, provided that the necessary routing, access rights and interfaces are configured.[1][2][3][4] The plaintiffs therefore do not assert that this integration has actually been implemented, but they do state that, given the technologies in use, it is technically feasible and cannot be excluded a priori without proper expert examination.

Atıflar:
[1] SCADA Güvenliğinin Önemi – Beyaznet https://www.beyaz.net/tr/guvenlik/makaleler/scada_guvenliginin_onemi.html
[2] SCADA Sistemlerinin Güvenliği – Mikrodev https://www.mikrodev.com/tr/scada-sistemlerinin-guvenligi/
[3] SCADA Sistemleri ve Gerçek Zamanlı Veri İzleme – Bella Binary https://www.bellabinary.com/Blog/scada-sistemleri-ve-gercek-zamanli-veri-izleme
[4] Support – Distribution Automation Design Guide, 3.1 – Cisco https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/Distributed-Automation/Distribution-Automation-Design-Guide-3-1.html
[5] SCADA-Based Message Generator for Multi-Vendor Smart Grids https://pmc.ncbi.nlm.nih.gov/articles/PMC8541402/
[6] Cost Efficient Management of Digital Secondary Substations https://www.a-eberle.de/en/special-publications/cost-efficient-management-of-digital-secondary-substations/
[7] [PDF] SCADA/Communications Routing and Basic Design Approach … https://dcdca.org/wp-content/uploads/2022/07/013-B-SCADA-Comms-Routing-TM.pdf
[8] [PDF] An Implementation of SCADA Network Security Testbed – arXiv https://arxiv.org/pdf/1701.05323.pdf
[9] [PDF] Contributions to the Monitoring and Security of Networked Systems https://hal.univ-lorraine.fr/tel-04984019v1/file/HDR_LAHMADI-Mars_2025.pdf
[10] Integration of distributed PV into smart grids – ScienceDirect.com https://www.sciencedirect.com/science/article/pii/S2211467X24002347
[11] [PDF] TE2022-01 – MoTI ITS Hosting and Software – Gov.bc.ca https://www2.gov.bc.ca/assets/gov/driving-and-transportation/transportation-infrastructure/engineering-standards-and-guidelines/technical-bulletins/traffic-and-electrical/tb-2022/te-2022-01-moti-its-hosting-software.pdf


Bir yanıt yazın

E-posta adresiniz yayınlanmayacak. Gerekli alanlar * ile işaretlenmişlerdir