Publication: an ethical dilemma for digital forensics research?
First published June 2010 by Dr Chris Hargreaves, lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK Ethical issues in science are commonplace; examples such as...
View Article2010 report of digital forensic standards, processes and accuracy measurement
Joshua Isaac James, Pavel Gladyshev {Joshua.James, Pavel.Gladyshev}@UCD.ie Centre for Cybercrime Investigation University College Dublin Belfield, Dublin 4 Ireland 1. Introduction From December 7th...
View ArticleThe Grid for Crime Prevention (G4CP) in Wales
by Sian Haynes and Stilianos Vidalis University of Wales, Newport Fujitsu is set to bring high-performance computing (HPC) to Wales. They will provide a distributed grid which is a project set over...
View ArticleStandard Units in Digital Forensics
by Dr Chris Hargreaves Lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK. One of the earliest lectures in the MIT Openware programme in Physics begins with the...
View ArticleWeb History Visualisation for Forensic Investigations
Web History Visualisation for Forensic Investigations Sarah Lowman (1) and Ian Ferguson (2) (1) – sarah@lowmanio.co.uk (2) – University of Abertay I.Ferguson@abertay.ac.uk Abstract. Current tools for...
View ArticleAn in-depth analysis of the cold boot attack: Can it be used for sound...
Abstract The purpose of this technical memorandum is to examine the technical characteristics behind the cold boot attack technique and to understand when and how this technique should be applied to...
View ArticleAndroid Forensics Study of Password and Pattern Lock Protection
Let’s see what Pattern Lock is, how to access, determine or even get rid of it? We’ll also speak about Password Lock Protection and find out what it has in common with Pattern Lock. And finally we’ll...
View ArticleiPhone Tracking – from a forensic point of view
- Introduction - iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all...
View ArticleFirefox Cache Format and Extraction
Introduction In the forensic lab where I work, we frequently investigate malware-infected workstations. As our user population started shifting from Internet Explorer to Firefox, we observed that one...
View Article689 Published Cases Involving Social Media Evidence (with full case listing)
The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify...
View ArticleMobile Phone Forensic Challenges
Introduction A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts. More often it is not enough to be an experienced expert in...
View ArticleThe Role of Cyber Terrorism in the Future
By Michael Chance University of New Haven M.S. National Security ABSTRACT Since the events of September 11, 2001 terrorism has been an issue at the forefront of National Security. This paper will...
View ArticleWhy SSD Drives Destroy Court Evidence, and What Can Be Done About It
by Yuri Gubanov yug@belkasoft.com, Oleg Afonin aoleg@voicecallcentral.com Belkasoft Ltd. http://belkasoft.com Abstract Solid State drives (SSD) introduced dramatic changes to the principles of computer...
View ArticleWhat are ‘gdocs’? Google Drive Data
As “the Cloud” (a varied mix of internet based services ranging from web-based email accounts, on-line storage and services that synchronise data across multiple computers) becomes more relevant and...
View ArticleCategorization of embedded system forensic collection methodologies
There are many classifications as far as forensic data collection is concerned, but much of it is still a de facto and Wild West when it comes to naming convention. This is especially true in the...
View ArticleKS – an open source bash script for indexing data
KS – an open source bash script for indexing data ABSTRACT: This is a keywords searching tool working on the allocated, unallocated data and the slackspace, using an indexer software and a database...
View ArticleGeo-tagging & Photo Tracking On iOS
As you may already know, Apple has always been criticized for using their extremely popular devices to track users and use this information to expand their own databases. This tutorial assumes that you...
View ArticleCatching the ghost: how to discover ephemeral evidence with Live RAM analysis
Oleg Afonin and Yuri Gubanov, contact@belkasoft.com © Belkasoft Research, 2013 Belkador Dali. “Losing volatile Evidence”. All rights reserved. Ephemeral Evidence Until very recently, it was a standard...
View ArticleDetecting Forged (Altered) Images
Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and...
View ArticleCyber Security Challenge in Scotland
Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...
View Article