Quantcast
Browsing all 59 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Publication: an ethical dilemma for digital forensics research?

First published June 2010 by Dr Chris Hargreaves, lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK Ethical issues in science are commonplace; examples such as...

View Article


Image may be NSFW.
Clik here to view.

2010 report of digital forensic standards, processes and accuracy measurement

Joshua Isaac James, Pavel Gladyshev {Joshua.James, Pavel.Gladyshev}@UCD.ie Centre for Cybercrime Investigation University College Dublin Belfield, Dublin 4 Ireland 1. Introduction From December 7th...

View Article


Image may be NSFW.
Clik here to view.

The Grid for Crime Prevention (G4CP) in Wales

by Sian Haynes and Stilianos Vidalis University of Wales, Newport Fujitsu is set to bring high-performance computing (HPC) to Wales. They will provide a distributed grid which is a project set over...

View Article

Image may be NSFW.
Clik here to view.

Standard Units in Digital Forensics

by Dr Chris Hargreaves Lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK. One of the earliest lectures in the MIT Openware programme in Physics begins with the...

View Article

Image may be NSFW.
Clik here to view.

Web History Visualisation for Forensic Investigations

Web History Visualisation for Forensic Investigations Sarah Lowman (1) and Ian Ferguson (2) (1) – sarah@lowmanio.co.uk (2) – University of Abertay I.Ferguson@abertay.ac.uk Abstract. Current tools for...

View Article


Image may be NSFW.
Clik here to view.

An in-depth analysis of the cold boot attack: Can it be used for sound...

Abstract The purpose of this technical memorandum is to examine the technical characteristics behind the cold boot attack technique and to understand when and how this technique should be applied to...

View Article

Image may be NSFW.
Clik here to view.

Android Forensics Study of Password and Pattern Lock Protection

Let’s see what Pattern Lock is, how to access, determine or even get rid of it? We’ll also speak about Password Lock Protection and find out what it has in common with Pattern Lock. And finally we’ll...

View Article

Image may be NSFW.
Clik here to view.

iPhone Tracking – from a forensic point of view

- Introduction - iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all...

View Article


Image may be NSFW.
Clik here to view.

Firefox Cache Format and Extraction

Introduction In the forensic lab where I work, we frequently investigate malware-infected workstations.  As our user population started shifting from Internet Explorer to Firefox, we observed that one...

View Article


Image may be NSFW.
Clik here to view.

689 Published Cases Involving Social Media Evidence (with full case listing)

The torrent of social media evidence continues to grow. In November 2011 we, at X1 Discovery, searched online legal databases of state and federal court decisions across the United States to identify...

View Article

Image may be NSFW.
Clik here to view.

Mobile Phone Forensic Challenges

Introduction A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts.  More often it is not enough to be an experienced expert in...

View Article

Image may be NSFW.
Clik here to view.

The Role of Cyber Terrorism in the Future

By Michael Chance University of New Haven M.S. National Security ABSTRACT Since the events of September 11, 2001 terrorism has been an issue at the forefront of National Security.  This paper will...

View Article

Image may be NSFW.
Clik here to view.

Why SSD Drives Destroy Court Evidence, and What Can Be Done About It

by Yuri Gubanov yug@belkasoft.com, Oleg Afonin aoleg@voicecallcentral.com Belkasoft Ltd. http://belkasoft.com Abstract Solid State drives (SSD) introduced dramatic changes to the principles of computer...

View Article


Image may be NSFW.
Clik here to view.

What are ‘gdocs’? Google Drive Data

As “the Cloud” (a varied mix of internet based services ranging from web-based email accounts, on-line storage and services that synchronise data across multiple computers) becomes more relevant and...

View Article

Image may be NSFW.
Clik here to view.

Categorization of embedded system forensic collection methodologies

There are many classifications as far as forensic data collection is concerned, but much of it is still a de facto and Wild West when it comes to naming convention. This is especially true in the...

View Article


Image may be NSFW.
Clik here to view.

KS – an open source bash script for indexing data

KS – an open source bash script for indexing data ABSTRACT:  This is a keywords searching tool working on the allocated, unallocated data and the slackspace, using an indexer software and a database...

View Article

Image may be NSFW.
Clik here to view.

Geo-tagging & Photo Tracking On iOS

As you may already know, Apple has always been criticized for using their extremely popular devices to track users and use this information to expand their own databases. This tutorial assumes that you...

View Article


Image may be NSFW.
Clik here to view.

Catching the ghost: how to discover ephemeral evidence with Live RAM analysis

Oleg Afonin and Yuri Gubanov, contact@belkasoft.com © Belkasoft Research, 2013 Belkador Dali. “Losing volatile Evidence”. All rights reserved.  Ephemeral Evidence Until very recently, it was a standard...

View Article

Image may be NSFW.
Clik here to view.

Detecting Forged (Altered) Images

Are digital images submitted as court evidence genuine or have the pictures been altered or modified? We developed a range of algorithms performing automated authenticity analysis of JPEG images, and...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Challenge in Scotland

Towards the end of August, I was part of the team who were offered to help out and participate at an exciting event held at Glasgow Caledonian University. The event ran over five days with each day...

View Article
Browsing all 59 articles
Browse latest View live