Table Of Contents,
2011
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Column: The Consortium Of Digital Forensics Specialists (Cdfs),
2011
CDFS Board Chair
Column: The Consortium Of Digital Forensics Specialists (Cdfs), Christopher Kelly
Journal of Digital Forensics, Security and Law
Digital forensic practitioners are faced with an extraordinary opportunity. In fact, we may never again be faced with such an opportunity, and this opportunity will challenge us in ways we may never again be challenged. At this point in the history of the Digital Forensics profession, digital forensic specialists have the unique opportunity to help this profession emerge from its infancy. But for this profession to mature -- and to flourish -- individuals and organizations integral to the practice must assemble and shape its future. This is our opportunity. In fact, this is our mandate.
Column: The Physics Of Digital Information,
2011
CEO, Fred Cohen & Associates President, California Sciences Institute
Column: The Physics Of Digital Information, Fred Cohen
Journal of Digital Forensics, Security and Law
No abstract provided.
Analysis Of Data Remaining On Second Hand Adsl Routers,
2011
Edith Cowan University; Perth, Western Australia
Analysis Of Data Remaining On Second Hand Adsl Routers, Patryk Szewczyk
Journal of Digital Forensics, Security and Law
In theory, an ADSL router can provide an additional layer of security to a wired and wireless network through; access control, wireless encryption, firewall rule sets, and network event logging. An ADSL router may also contain the users’ usage habits and broadband account credentials. However, end-users may be unaware of the intricacies of the security measures available and the potentially confidential information stored on their device. As a result a second hand ADSL router may contain a wealth of user-specific information if not wiped and disposed of in a secure manner. This paper shows the data that was acquired from …
Exploring The Iphone Backup Made By Itunes,
2011
University of Brescia, Italy
Exploring The Iphone Backup Made By Itunes, Mario Piccinelli, Paolo Gubian
Journal of Digital Forensics, Security and Law
Apple’s™ iPhone™ is one of the widest selling mobile on the market, thanks to its simple and user-friendly interface and ever growing pool of available high quality applications for both personal and business use. The increasing use of the iPhone leads forensics practitioners towards the need for tools to access and analyze the information stored in the device. This research aims at describing the process to forensically analyze a logical backup of an iPhone made by the Apple iTunes™ utility, understanding the backup’s structure, and creating a simple tool to automate the process of decoding and analyzing the data. In …
A Survey Of Contemporary Enterprise Storage Technologies From A Digital Forensics Perspective,
2011
California State Polytechnic University
A Survey Of Contemporary Enterprise Storage Technologies From A Digital Forensics Perspective, Gregory H. Carlton, Joseph Matsumoto
Journal of Digital Forensics, Security and Law
As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each offering and then followed with a discussion of the impact of these technologies on digital forensics methods, particularly regarding forensic data acquisition. We offer a general opinion concerning a recommended data acquisition method when faced with the task of obtaining a forensic image of data contained within these technologies, we …
Book Review: Online Privacy: Issues In The Digital Age,
2011
Metropolitan State University
Book Review: Online Privacy: Issues In The Digital Age, Darlene M. Tester
Journal of Digital Forensics, Security and Law
This book is one of a series of books Currie has written about online areas of concern. This is the sixth book in the series. The purpose of the book is to act as a primer for people in the IT field who may need a point of reference for Internet issues such as gaming, security and privacy. The book takes a high level look at the complexities of privacy online from social networking to hackers and provides insight into what the most pressing issues of privacy are online today.
Technology Corner: Brute Force Password Generation -- Basic Iterative And Recursive Algorithms,
2011
University of New Mexico
Technology Corner: Brute Force Password Generation -- Basic Iterative And Recursive Algorithms, Nick V. Flor, Haile Shannon
Journal of Digital Forensics, Security and Law
Most information systems are secured at minimum by some form of password protection. For various reasons a password may be unavailable, requiring some form of password recovery procedure. One such procedure is software-based automated password recovery, where a program attempts to log into a system by repeatedly trying different password combinations. At the core of such software is a password generator. This article describes the basic iterative and recursive algorithms for generating all possible passwords of a given length, which is commonly referred to as brute-force password generation. The paper ends with a discussion of alternative password recovery procedures one …
Table Of Contents,
2011
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Column: File Cabinet Forensics,
2011
Naval Postgraduate School, California
Column: File Cabinet Forensics, Simson Garfinkel
Journal of Digital Forensics, Security and Law
Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face. Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones) to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky), the computers end up in the hands of law enforcement. Unfortunately the …
Book Review: Iphone And Ios Forensics: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices,
2011
EnCE & ACE, LuciData Inc
Book Review: Iphone And Ios Forensics: Investigation, Analysis And Mobile Security For Apple Iphone, Ipad And Ios Devices, Christopher Schulte
Journal of Digital Forensics, Security and Law
These are exciting times for Digital Forensics practitioners. While our examinations of mobile devices (including cell phones and tablet computers) continue to bring new and sometimes hair-pulling challenges into our labs and on-site engagements, research and understanding of these tiny computers is increasing at what seems an exponential rate. This is especially true in the iOS (Apple Computer’s mobile operating system that powers the iPhone, iPad, iPod Touch and Apple TV) space. The diligent work of talented computer scientists in this field allows examiners everywhere to reap the benefits of easier, faster and more effective examinations that yield more accurate …
Technology Corner: Virtual Crime Scene Reconstruction: The Basics Of 3d Modeling,
2011
University of New Mexico
Technology Corner: Virtual Crime Scene Reconstruction: The Basics Of 3d Modeling, Nick V. Flor
Journal of Digital Forensics, Security and Law
Digital crime scenes take place in the context of physical crime scenes. Virtual crime scene reconstruction is an activity where investigators create a 3- dimensional (3-D) model of an actual crime scene for the purpose of determining the events that lead to the crime. While virtual crime scene reconstruction is currently used for analyzing physical scenes, it can also help investigators visualize and explore ways digital media could have been used to perpetrate a crime. In this technology corner we explore one of the technologies underlying virtual crime scene reconstruction: 3-D modeling.
Table Of Contents,
2011
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Real-Time Beamforming Using High-Speed Fpgas At The Allen Telescope Array,
2011
Embry-Riddle Aeronautical University
Real-Time Beamforming Using High-Speed Fpgas At The Allen Telescope Array, William C. Barott, Oren Milgrome, Melvyn Wright, David Macmahon, Tom Kilsdonk, Peter Backus, Matt Dexter
Department of Electrical Engineering and Computer Science - Daytona Beach
The Allen Telescope Array (ATA) at the Hat Creek Radio Observatory (HCRO) is a wide‐field panchromatic radio telescope currently consisting of 42 offset‐Gregorian antennas each with a 6 m aperture, with plans to expand the array to 350 antennas. Through unique back‐end hardware, the ATA performs real‐time wideband beamforming with independent subarray capabilities and customizable beam shaping. The beamformers enable science observations requiring the full gain of the array, time domain (nonintegrated) output, and interference excision or orthogonal beamsets. In this paper we report on the design of this beamformer, including architecture and experimental results. Furthermore, we address some practical …
Column: Putting The Science In Digital Forensics,
2011
California Sciences Institute, Fred Cohen & Associates
Column: Putting The Science In Digital Forensics, Fred Cohen
Journal of Digital Forensics, Security and Law
In a recent study, digital forensics was found to lack a consensus around even the most basis notions and terminology of the field. To quote: “These two preliminary studies individually suggest that (1) scientific consensus in the area of digital forensic evidence examination is lacking in the broad sense, but that different groups within that overall community may have limited consensus around areas in which they have special expertise, and (2) that the current peerreviewed publication process is not acting to bring about the sorts of elements typically found in the advancement of a science toward such a consensus. ... …
Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram,
2011
University of South Australia, Australia
Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore
Journal of Digital Forensics, Security and Law
The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping is …
A Case Study In Forensic Analysis Of Control,
2011
California Sciences Institute, Fred Cohen & Associates
A Case Study In Forensic Analysis Of Control, Fred Cohen
Journal of Digital Forensics, Security and Law
This paper describes a case study in which a method for forensic analysis of control was applied to resolve probative technical issues in a legal action. It describes one instance in which the analysis was successfully applied without challenge, addresses the details of most of the different facets of the analysis method, and demonstrates how such analysis provides a systematic approach to using technical methods to address legal issues as a case study.
Judges’ Awareness, Understanding, And Application Of Digital Evidence,
2011
Gary Kessler Associates
Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler
Journal of Digital Forensics, Security and Law
As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence. This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the …
Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch,
2011
LuciData Inc, Minneapolis
Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte
Journal of Digital Forensics, Security and Law
As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch) is no exception to this rule.
Technology Corner: Internet Packet Sniffers,
2011
University of New Mexico
Technology Corner: Internet Packet Sniffers, Nick V. Flor, Kenneth Guillory
Journal of Digital Forensics, Security and Law
The best way to understand an internet packet sniffer, hereafter “packet sniffer”, is by analogy with a wiretap. A wiretap is a piece of hardware that allows a person to eavesdrop on phone conversations over a telephone network. Similarly, a packet sniffer is a piece of software that allows a person to eavesdrop on computer communications over the internet. A packet sniffer can be used as a diagnostic tool by network administrators or as a spying tool by hackers who can use it to steal passwords and other private information from computer users. Whether you are a network administrator or …