Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 41 of 41

Full-Text Articles in Entire DC Network

Automatic Detection Of Child Pornography, Glen Thompson Mar 2009

Automatic Detection Of Child Pornography, Glen Thompson

Australian Digital Forensics Conference

Before the introduction of the internet, the availability of child pornography was reported as on the decline (Jenkins 2001). Since its emergence, however, the internet has made child pornography a much more accessible and available means of trafficking across borders (Biegel 2001; Jenkins 2001; Wells, Finkelhor et al. 2007). The internet as it is at present is made up of a vast array of protocols and networks where traffickers can anonymously share large volumes of illegal material amongst each other from locations with relaxed or non-existent laws that prohibit the possession or trafficking of illegal material. Likewise the internet is …


The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi Mar 2009

The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi

Australian Digital Forensics Conference

The use of the USB storage device, also known as the USB drive, a thumb drive, a keychain drive and a flash drive has, for the most part, replaced the floppy disk and to some extent the Compact Disk (CD), the DVD (Digital Video Disk or Digital Versatile Disk) and the external hard disk. Their robustness, size and weight make them easy to transport, but also to lose or misplace. They are inexpensive and are often given away as promotional items by organisations. Over the last few years there has been a dramatic increase in the storage capacity of these …


Information Sharing: Hackers Vs Law Enforcement, David P. Biros, Mark Weiser, Jim Burkman, Jason Nichols Dec 2008

Information Sharing: Hackers Vs Law Enforcement, David P. Biros, Mark Weiser, Jim Burkman, Jason Nichols

Australian Information Warfare and Security Conference

The fields of information assurance and digital forensics continue to grow in both importance and complexity, spurred on by rapid advancement in digital crime. Contemporary law enforcement professionals facing such issues quickly discover that they cannot be successful while operating in a vacuum and turn to colleagues for assistance. However, there is a clear need for greater IT-based knowledge sharing capabilities amongst law enforcement organizations; an environment historically typified by a silo mentality. A number of efforts have attempted to provide such capabilities, only to be met with limited enthusiasm and difficulties in sustaining continued use. Conversely, the hacker community …


Digital Forensics And The Legal System: A Dilemma Of Our Times, James Tetteh Ami-Narh, Patricia A.H. Williams Mar 2008

Digital Forensics And The Legal System: A Dilemma Of Our Times, James Tetteh Ami-Narh, Patricia A.H. Williams

Australian Digital Forensics Conference

Computers have become an important part of our lives and are becoming fundamental to activities in the home and workplace. Individuals use computer technology to send emails, access banking information, pay taxes, purchase products, surf the internet and so on. Business also use computers and the Internet to perform accounting tasks, manage customer information, store trade secrets, and develop new products and services. State, Federal and Local government agencies use the computer and Internet to create and access information. Similarly, digital systems have become the mainstay of criminal activity. Legal proceedings have always been influenced by tradition and court decisions. …


Forensic Acquisition And Analysis Of The Tomtom One Satellite Navigation Unit, Peter Hannay Mar 2008

Forensic Acquisition And Analysis Of The Tomtom One Satellite Navigation Unit, Peter Hannay

Australian Digital Forensics Conference

Global Positioning Systems are becoming increasingly pervasive. The forensic acquisition and analysis of these units is of great interest as it has the potential to yield historic locational data for these units. Analysis of the TomTom one satellite navigation unit has resulted in a method to reliably extract historic data from these devices in a forensically sound manner.


Adsl Router Forensics Part 1: An Introduction To A New Source Of Electronic Evidence, Patryk Szewczyk Mar 2007

Adsl Router Forensics Part 1: An Introduction To A New Source Of Electronic Evidence, Patryk Szewczyk

Australian Digital Forensics Conference

Currently there appears to be a lack of research in the area of developing tools, testing methodologies, and creating standards for ADSL router forensics. The paper examines a wide range of literature and introduces the concept of ADSL router forensics as a new and potential field of research for digital forensics investigators. It begins by examining why there is a need for router forensics by detailing some of the more common threats which consumers may experience while online. An outline will be provided discussing the feasibility, limitations and potential risks of router forensics. The paper will then examine one possible …


Blogs: Anti-Forensics And Counter Anti-Forensics, Glenn S. Dardick, Claire R. La Roche, Mary A. Flanigan Mar 2007

Blogs: Anti-Forensics And Counter Anti-Forensics, Glenn S. Dardick, Claire R. La Roche, Mary A. Flanigan

Australian Digital Forensics Conference

Blogging gives an ordinary person the ability to have a conversation with a wide audience and has become one of the fastest growing uses of the Web. However, dozens of employee-bloggers have been terminated for exercising what they consider to be their First Amendment right to free speech and would-be consumer advocates face potential liability for voicing their opinions. To avoid identification and prevent retribution, bloggers have sought to maintain anonymity by taking advantage of various tools and procedures - anti-forensics. Unfortunately some anonymous bloggers also post content that is in violation of one or more laws. Some blogging content …


A Methodology For The Forensic Acquisition Of The Tomtom One Satellite Navigation System - A Research In Progress, Peter Hannay Jan 2007

A Methodology For The Forensic Acquisition Of The Tomtom One Satellite Navigation System - A Research In Progress, Peter Hannay

Australian Digital Forensics Conference

The use of Satellite Navigation Systems (SNS) has become increasingly common in recent years. The wide scale adoption of this technology has the potential to provide a valuable resource in forensic investigations. The potential of this resource is based on the ability to retrieve historical location data from the device in question while maintaining forensic integrity. This paper presents a methodology to acquire forensc images of the TomTom One satellite navigation unit. This methodology aims to be comprehensive and straightforward, while maintaining forensic integrity of the original evidence. However, in consideration of the aforementioned methodology, ti should be noted that …


A Methodology For The Examination Of The Effectiveness Of Secure Erasure Tools Running On Windows Xp - Research In Progress, Anthony Hadfield, Michael Ahern, Leo Sell, Andrew Woodward Apr 2006

A Methodology For The Examination Of The Effectiveness Of Secure Erasure Tools Running On Windows Xp - Research In Progress, Anthony Hadfield, Michael Ahern, Leo Sell, Andrew Woodward

Australian Digital Forensics Conference

Currently, there appears to be a lack of academic research in the area of testing the efficacy of secure erasure applications and utilities in regard to the activities of an average user in a home or small business context. This research in progress aims to develop a testing methodology that will provide a forensically sound base for which to analyse these tools. It involves the installation of various Internet related applications (for example browsers, instant messaging software and download clients), and the use of these applications for typical Internet activities (e.g. internet banking, instant messaging, web browsing and other activities …


Bitlocker - The End Of Digital Forensics?, Andrew Woodward Apr 2006

Bitlocker - The End Of Digital Forensics?, Andrew Woodward

Australian Digital Forensics Conference

Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all information on a hard drive. Previous versions of Windows have used the encrypting file system (EFS), allowing users to selectively encrypt files and folders on a drive. The technology is called BitLocker, and poses a problem for forensic investigators, as all information on the drive will be encrypted, and therefore unreadable. The technology has some limitations, such as only 2 versions out of the 5 available contain this technology and it also requires a trusted platform module (TPM) in order to operate. Other inherent limitations, along with …


Enterprise Computer Forensics: A Defensive And Offensive Strategy To Fight Computer Crime, Fahmid Imtiaz Apr 2006

Enterprise Computer Forensics: A Defensive And Offensive Strategy To Fight Computer Crime, Fahmid Imtiaz

Australian Digital Forensics Conference

As days pass and the cyber space grows, so does the number of computer crimes. The need for enterprise computer forensic capability is going to become a vital decision for the CEO’s of large or even medium sized corporations for information security and integrity over the next couple of years. Now days, most of the companies don’t have in house computer/digital forensic team to handle a specific incident or a corporate misconduct, but having digital forensic capability is very important and forensic auditing is very crucial even for small to medium sized organizations. Most of the corporations and organizations are …