Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (4)
- E-discovery (2)
- Electronic discovery (2)
- Federal Rules of Civil Procedure (2)
- Meet-and-confer (2)
-
- ADSL router forensics (1)
- Acquisition (1)
- Analysis (1)
- Automation (1)
- Bad blocks (1)
- Broadcom (1)
- Child abuse (1)
- Child pornography (1)
- Computer vision (1)
- Critical infrastructure (1)
- Cybercrime. Phishing. Eastern European Organised Crime (1)
- Data disposal (1)
- Data extraction (1)
- Data recovery (1)
- Dd (1)
- ECC (1)
- Electricity grid (1)
- Electronic data destruction (1)
- Embedded systems (1)
- Embedded systems flash memory (1)
- Eraser (1)
- Erotica (1)
- FTL (1)
- File carving (1)
- Flash translation layer (FTL) (1)
Articles 1 - 12 of 12
Full-Text Articles in Entire DC Network
Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk
Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk
Australian Digital Forensics Conference
The demand for high-speed Internet access is escalating high sales of ADSL routers. In-turn this has prompted individuals to attack and exploit the vulnerabilities in these devices. To respond to these threats, methods of acquisition and analysis are needed. The configuration data provides a wealth of information into the current state of the device. Hence, this data may be used to identify and interpret unlawful ways in which the device was used. This paper is centres around an empirical learning approach identifying techniques to address the device’s acquirable limitations taking into consideration that the owner may not willingly present login …
Satellite Navigation Forensics Techniques, Peter Hannay
Satellite Navigation Forensics Techniques, Peter Hannay
Australian Digital Forensics Conference
Satellite navigation systems are becoming increasingly common for automotive use within the civilian population. This increase in use is of interest to forensic investigators as satellite navigation devices have the potential to provide historical location data to investigators. The research in progress investigates the data sources and encoding on a number of common satellite navigation devices. The aim of this research is to develop a framework for the acquisition and analysis of common satellite navigation systems in a way that valid for multiple device
The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli
The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli
Australian Digital Forensics Conference
The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security …
Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters
Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters
Australian Digital Forensics Conference
Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on …
Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma
Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma
Australian Digital Forensics Conference
Common law countries have been struggling with electronic data in regard to their discovery rules from the first digital document. All major common law countries, including Australia, New Zealand, Australia, United Kingdom, Canada, South Africa and the United States have recently changed their rules of discovery in an attempt to make sense of all this data and determine what, when and how data should be disclosed by parties in litigation. Case law in these countries has been defining the responsibilities of potential parties and attorneys to prepare for litigation that might happen. The case that was the catalyst of change …
Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma
Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma
Australian Digital Forensics Conference
Electronic discovery has been the source of difficult challenges for courts, lawyers, and litigants from the beginning. The methods, document formats, and scope of electronic discovery have all contributed to the difficulties encountered. The seminal case in the United States that underscores the nature of the difficulties and challenges facing lawyers and courts in electronic discovery is Qualcomm v. Broadcom. While the case has been cited as an example of the ethical issues facing lawyers who do not follow the rules of discovery, the lessons go well beyond ethical issues. All major common law countries, including Australia, New Zealand, United …
Automatic Detection Of Child Pornography, Glen Thompson
Automatic Detection Of Child Pornography, Glen Thompson
Australian Digital Forensics Conference
Before the introduction of the internet, the availability of child pornography was reported as on the decline (Jenkins 2001). Since its emergence, however, the internet has made child pornography a much more accessible and available means of trafficking across borders (Biegel 2001; Jenkins 2001; Wells, Finkelhor et al. 2007). The internet as it is at present is made up of a vast array of protocols and networks where traffickers can anonymously share large volumes of illegal material amongst each other from locations with relaxed or non-existent laws that prohibit the possession or trafficking of illegal material. Likewise the internet is …
Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward
Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward
Australian Digital Forensics Conference
This paper discusses an experimental method for creating a 1st generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating system. This is an experimental method as there are currently no known malicious smart-phone worms. Honeyd emulates devices by mimicking the devices operating system fingerprint which is created by the unique responses each operating system sends to a discrete series of TCP and …
Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward
Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward
Australian Digital Forensics Conference
The research aimed to determine the efficacy and integrity of several hard-drive disk deletion tools on solid state drives (SSDs). SSDs contain new technologies such as wear-levelling and device under provisioning to provide efficient functionality and speed for data management, but the same technologies may also provide obstacles to ensuring that all information is fully removed from the drive. Furthermore SSDs stores files in 4KB pages, yet data can only be deleted in 512KB blocks. This function uses the disk controller to remove all the pages from the block a file is being deleted from, storing the pages in a …
The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi
The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi
Australian Digital Forensics Conference
The use of the USB storage device, also known as the USB drive, a thumb drive, a keychain drive and a flash drive has, for the most part, replaced the floppy disk and to some extent the Compact Disk (CD), the DVD (Digital Video Disk or Digital Versatile Disk) and the external hard disk. Their robustness, size and weight make them easy to transport, but also to lose or misplace. They are inexpensive and are often given away as promotional items by organisations. Over the last few years there has been a dramatic increase in the storage capacity of these …
Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo
Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo
Australian Digital Forensics Conference
This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators. Then will be presented an advanced test in which some brand new flash memories have been used to hide data in man-made bad blocks: the aim is to verify if forensic software tools are able to acquire data from such blocks, and to evaluate the possibility …
A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah
A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah
Australian Digital Forensics Conference
Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perform data extraction on a logical level and do not consider the type of storage media during data analysis. This report suggests different low level approaches for the forensic examination of flash memories and describes three lowlevel data acquisition methods for making full memory copies of flash memory devices. Results of a file system study in which USB memory sticks from 45 different make and models were used are presented. For different mobile phones, this paper shows how full memory copies of their flash memories can …