-
1
-
-
85135431885
-
-
(n.d.). About AAFS. Retrieved February 4, 2011, from:
-
American Academy of Forensic Sciences. (n.d.). About AAFS. Retrieved February 4, 2011, from: . http://www.aafs.org/about-aafs.
-
-
-
-
2
-
-
85135422683
-
-
(n.d.). ABOUT: ASTM. Retrieved February 23, 2011, from:
-
ASTM. (n.d.). ABOUT: ASTM. Retrieved February 23, 2011, from: . http://www.astm.org/ABOUT/aboutASTM.html.
-
-
-
-
3
-
-
85135424166
-
-
(n.d.). E30. Retrieved February 23, 2011, from:
-
ASTM. (n.d.). E30. Retrieved February 23, 2011, from: . http://www.astm.org/COMMIT/SUBCOMMIT/E30.htm.
-
-
-
-
4
-
-
85135426550
-
-
(n.d.). Overview: ABOUT: ASTM. Retrieved February 23, 2011, from:
-
ASTM. (n.d.). Overview: ABOUT: ASTM. Retrieved February 23, 2011, from: . http://www.astm.org/ABOUT/overview.html.
-
-
-
-
5
-
-
84942620633
-
Locard's Exchange Principle in the Digital World: Windows Incident Response
-
January 27). Retrieved February 23, 2011, from:
-
Carvey, H. (2005, January 27). Locard's Exchange Principle in the Digital World: Windows Incident Response. Retrieved February 23, 2011, from: . http://windowsir.blogspot.com/2005/01/locards-exchange-principle-in-digital.html.
-
(2005)
-
-
Carvey, H.1
-
6
-
-
85135429380
-
-
(n.d.). Scientific Working Groups: Federal Bureau of Investigation. Retrieved February 19
-
Federal Bureau of Investigation. (n.d.). Scientific Working Groups: Federal Bureau of Investigation. Retrieved February 19, 2011, from: . http://www.fbi.gov/about-us/lab/swgs.
-
(2011)
-
-
-
7
-
-
85135428923
-
Government's Response to Court's Order on Computer and Email Evidence
-
September 4. Retrieved September 13, 2011, from :
-
Lawler, B. A. (2002, September 4). Government's Response to Court's Order on Computer and Email Evidence. Retrieved September 13, 2011, from: . http://news.findlaw.com/hdocs/docs/moussaoui/usmouss90402grsp.pdf.
-
(2002)
-
-
Lawler, B.A.1
-
8
-
-
84855303003
-
Size of the Data Universe: 1.2 Zettabytes and Growing Fast: ZDNet
-
May 12). Retrieved February 23, 2011, from:
-
McKendrick, J. (2010, May 12). Size of the Data Universe: 1.2 Zettabytes and Growing Fast: ZDNet. Retrieved February 23, 2011, from: . http://www.zdnet.com/blog/service-oriented/size-of-the-data-universe-12-zettabytes-and-growing-fast/4750.
-
(2010)
-
-
McKendrick, J.1
-
9
-
-
85135434694
-
-
(n.d.). RCFL: Regional Computer Forensics Laboratory. Retrieved February 4
-
Regional Computer Forensics Laboratory. (n.d.). RCFL: Regional Computer Forensics Laboratory. Retrieved February 4, 2011, from: . http://www.rcfl.gov/.
-
(2011)
-
-
-
11
-
-
85135434912
-
-
(n.d.). Scientific Working Group on Digital Evidence-About Us. Retrieved February 4
-
Scientific Working Group on Digital Evidence. (n.d.). Scientific Working Group on Digital Evidence-About Us. Retrieved February 4, 2011, from: . http://www.swgde.org.
-
(2011)
-
-
-
12
-
-
1942425700
-
Forensic Science: An Introduction to Scientific and Investigative Techniques
-
February 20, 2009 (3rd ed.). Boca Raton, FL: CRC Press.
-
Stuart, J., Nordby, J. J., & Bell, S. (2009). Forensic Science: An Introduction to Scientific and Investigative Techniques February 20, 2009 (3rd ed.). Boca Raton, FL: CRC Press.
-
(2009)
-
-
Stuart, J.1
Nordby, J.J.2
Bell, S.3
-
13
-
-
85135422249
-
-
(n.d.). Document and Media Exploitation (DOMEX): 2010 Army Posture Statement. Retrieved February 23, 2011, from:
-
U.S. Army. (n.d.). Document and Media Exploitation (DOMEX): 2010 Army Posture Statement. Retrieved February 23, 2011, from: . https://secureweb2.hqda.pentagon.mil/vdas_armyposturestatement/2010/information_papers/Document_and_Media_Exploitation_%28DOMEX%29.asp.
-
-
-
-
14
-
-
84882446982
-
-
U.S. Department of Justice, U.S. Department of Justice, Washington, DC
-
RCFL Annual Report for Fiscal Year 2009 2009, U.S. Department of Justice, U.S. Department of Justice, Washington, DC.
-
(2009)
RCFL Annual Report for Fiscal Year 2009
-
-
-
15
-
-
85135434129
-
-
(n.d.). Commentary: Defining Digital Forensics. Retrieved February 19
-
Zatyko, K. (n.d.). Commentary: Defining Digital Forensics. Retrieved February 19, 2011, from: . http://www.forensicmag.com/node/128.
-
(2011)
-
-
Zatyko, K.1
-
16
-
-
85135429627
-
-
(2004, March 5). Technical Note TN1150 HFS Plus Volume Format. Retrieved August 10
-
Apple, Inc. (2004, March 5). Technical Note TN1150 HFS Plus Volume Format. Retrieved August 10, 2011, from: . http://developer.apple.com/library/mac/#technotes/tn/tn1150.html.
-
(2011)
-
-
-
19
-
-
85135422281
-
-
August). What Is the Difference Between Memory and Storage? Retrieved August 10, 2011, from:
-
Cooper, B. (2004, August). What Is the Difference Between Memory and Storage? Retrieved August 10, 2011, from: . http://searchstorage.techtarget.com/answer/What-is-the-difference-between-memory-and-storage.
-
(2004)
-
-
Cooper, B.1
-
22
-
-
85135431744
-
-
(n.d.). Comparing NTFS and FAT File Systems. Retrieved August 10
-
Microsoft Corporation. (n.d.). Comparing NTFS and FAT File Systems. Retrieved August 10, 2011, from: . http://windows.microsoft.com/en-US/windows-vista/Comparing-NTFS-and-FAT-file-systems.
-
(2011)
-
-
-
23
-
-
85135425011
-
-
(2000, December). Optical Media. Retrieved August 10, 2011, from:
-
(2000, December). Optical Media. Retrieved August 10, 2011, from: . http://searchstorage.techtarget.com/definition/optical-media.
-
-
-
-
24
-
-
85135430893
-
-
(2010, September 17). What Is Unicode? Retrieved August 10
-
Unicode Inc. (2010, September 17). What Is Unicode? Retrieved August 10, 2011, from: . http://www.unicode.org/standard/WhatIsUnicode.html.
-
(2011)
-
-
-
25
-
-
85135435273
-
-
(n.d.). Retrieved June 4
-
About: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Retrieved June 4, 2011, from: . http://www.ascld-lab.org/about_us/aboutoverview.html.
-
(2011)
-
-
-
26
-
-
85135426460
-
-
(2011, February). Downloads: AccessData. Retrieved August 24, 2011, from:
-
AccessData Group, LLC. (2011, February). Downloads: AccessData. Retrieved August 24, 2011, from: . http://accessdata.com/downloads/media/FTK_3x_System_Specifications_Guide.pdf.
-
-
-
-
27
-
-
85135429095
-
-
(n.d.). Did You Know: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from:
-
American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Did You Know: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from: . http://www.ascld-lab.org/largest_accreditation.html.
-
-
-
-
28
-
-
85135431280
-
-
(n.d.). Objectives: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from:
-
American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Objectives: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from: . http://www.ascld-lab.org/about_us/objectives.html.
-
-
-
-
29
-
-
85135429083
-
-
(n.d.). Digital Evidence Accreditation. Retrieved August 25, 2011, from:
-
Barbara, J. J. (n.d.). Digital Evidence Accreditation. Retrieved August 25, 2011, from: . http://www.forensicmag.com/article/digital-evidence-accreditation?page=0,3.
-
-
-
Barbara, J.J.1
-
30
-
-
85135423587
-
-
(n.d.). Digital Evidence Accreditation: Forensic Magazine. Retrieved June 4, 2011, from:
-
Barbara, J. J. (n.d.). Digital Evidence Accreditation: Forensic Magazine. Retrieved June 4, 2011, from: . http://www.forensicmag.com/article/digital-evidence-accreditation.
-
-
-
Barbara, J.J.1
-
31
-
-
85135423275
-
-
March 2). Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner. Retrieved August 24, 2011, from:
-
Brunty, J. (2011, March 2). Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner. Retrieved August 24, 2011, from: . http://www.dfinews.com/article/validation-forensic-tools-and-software-quick-guide-digital-forensic-examiner?page=0,2.
-
(2011)
-
-
Brunty, J.1
-
32
-
-
85135427493
-
-
(2002, October). Papers:Digital-evidence.org. Retrieved August 24, 2011, from:
-
Carrier, B. B. (2002, October). Papers:Digital-evidence.org. Retrieved August 24, 2011, from: . http://www.digital-evidence.org/papers/opensrc_legal.pdf.
-
-
-
Carrier, B.B.1
-
33
-
-
85135430366
-
-
August 21). Scores of Convictions Reviewed as Chemist Faces Perjury Accusations. Retrieved from: (Accessed 21.08.94).
-
Chan, S. (1994, August 21). Scores of Convictions Reviewed as Chemist Faces Perjury Accusations. Retrieved from: (Accessed 21.08.94). http://articles.latimes.com/1994-08-21/news/mn-29449_1_lab-tests-fred-zain-double-murder.
-
(1994)
-
-
Chan, S.1
-
37
-
-
84882322081
-
-
National Institute of Justice, National Institute of Justice, Washington, DC, U.S. Department of Justice, Office of Justice Programs
-
Test Results for Hardware Write Block Device: T4 Forensic SCSI Bridge (FireWire Interface) 2009, National Institute of Justice, National Institute of Justice, Washington, DC, U.S. Department of Justice, Office of Justice Programs.
-
(2009)
Test Results for Hardware Write Block Device: T4 Forensic SCSI Bridge (FireWire Interface)
-
-
-
38
-
-
85135429794
-
-
(n.d.). Computer Forensics Tool Testing Project Web Site: National Institute of Standards and Technology. Retrieved June 6, 2011, from:
-
National Institute of Standards and Technology. (n.d.). Computer Forensics Tool Testing Project Web Site: National Institute of Standards and Technology. Retrieved June 6, 2011, from: . http://www.cftt.nist.gov/index.html.
-
-
-
-
40
-
-
85135424194
-
-
(2010, May 15). Minimum Requirements for Quality Assurance in the Processing of Digital and Multimedia Evidence. Retrieved August 24, 2011, from:
-
Scientific Working Group on Digital Evidence. (2010, May 15). Minimum Requirements for Quality Assurance in the Processing of Digital and Multimedia Evidence. Retrieved August 24, 2011, from: . http://www.swgde.org/documents/current-documents/.
-
-
-
-
41
-
-
85135426332
-
-
(n.d.). Virtual Digital Forensics Lab. Largo, FL: National Center for Forensic Science.
-
Whitcomb, C. A. (n.d.). Virtual Digital Forensics Lab. Largo, FL: National Center for Forensic Science.
-
-
-
Whitcomb, C.A.1
-
42
-
-
85135424096
-
-
(2011, April 1). UPDATE: Donald Good Receives Two Life Sentences in Mall Rape Case. Retrieved from: (Accessed 17.11.11).
-
WSAZ. (2011, April 1). UPDATE: Donald Good Receives Two Life Sentences in Mall Rape Case. Retrieved from: (Accessed 17.11.11). http://www.wsaz.com/news/headlines/UPDATE_Judge_OHanlon_Will_Preside_Over_Huntington_Mall_Rape_Case.html.
-
-
-
-
43
-
-
85135434686
-
-
About: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Retrieved June 4, 2011, from:
-
About: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Retrieved June 4, 2011, from: . http://www.ascld-lab.org/about_us/aboutoverview.html.
-
-
-
-
44
-
-
85135429115
-
-
(2011, February). Downloads: AccessData. Retrieved August 24, 2011, from:
-
AccessData Group, LLC. (2011, February). Downloads: AccessData. Retrieved August 24, 2011, from: . http://accessdata.com/downloads/media/FTK_3x_System_Specifications_Guide.pdf.
-
-
-
-
45
-
-
85135427518
-
-
(n.d.). ASCLD/LAB Guiding Principles of Professional Responsibility for Crome Laboratories and Forensic Scientists. Retrieved September 3, 2011, from:
-
American Society of Crime Laboratory Directors Laboratory Acceditation Board. (n.d.). ASCLD/LAB Guiding Principles of Professional Responsibility for Crome Laboratories and Forensic Scientists. Retrieved September 3, 2011, from: . http://www.ascld-lab.org/about_us/guidingprinciples.html.
-
-
-
-
46
-
-
85135432047
-
-
(n.d.). Did You Know: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from:
-
American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Did You Know: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from: . http://www.ascld-lab.org/largest_accreditation.html.
-
-
-
-
47
-
-
85135430682
-
-
(n.d.). Objectives: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from:
-
American Society of Crime Laboratory Directors/Laboratory Accreditation Board. (n.d.). Objectives: American Society of Crime Laboratory Directors/Laboratory Accreditation Board. Retrieved June 4, 2011, from: . http://www.ascld-lab.org/about_us/objectives.html.
-
-
-
-
49
-
-
85135434483
-
-
(n.d.). ASTM Overview. Retrieved October 1, 2011, from:
-
ASTM International. (n.d.). ASTM Overview. Retrieved October 1, 2011, from: . http://www.astm.org/ABOUT/overview.html.
-
-
-
-
50
-
-
85135422372
-
-
(n.d.). Digital Evidence Accreditation. Retrieved August 25, 2011, from:
-
Barbara, J. J. (n.d.). Digital Evidence Accreditation. Retrieved August 25, 2011, from: . http://www.forensicmag.com/article/digital-evidence-accreditation?page=0,3.
-
-
-
Barbara, J.J.1
-
51
-
-
85135430256
-
-
(n.d.). Digital Evidence Accreditation: Forensic Magazine. Retrieved June 4, 2011, from:
-
Barbara, J. J. (n.d.). Digital Evidence Accreditation: Forensic Magazine. Retrieved June 4, 2011, from: . http://www.forensicmag.com/article/digital-evidence-accreditation.
-
-
-
Barbara, J.J.1
-
52
-
-
85135434750
-
-
(n.d.). Triage a Computer. Retrieved June 14, 2011, from:
-
Barbara, J. J. (n.d.). Triage a Computer. Retrieved June 14, 2011, from: . http://www.forensicmag.com/article/triage-computer.
-
-
-
Barbara, J.J.1
-
53
-
-
85135428515
-
-
(2011, March 2). Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner. Retrieved August 24, 2011, from:
-
Brunty, J. (2011, March 2). Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner. Retrieved August 24, 2011, from: . http://www.dfinews.com/article/validation-forensic-tools-and-software-quick-guide-digital-forensic-examiner?page=0,2.
-
-
-
Brunty, J.1
-
54
-
-
85135429819
-
-
(2002, October). Papers: Digital-evidence.org. Retrieved August 24, 2011, from:
-
Carrier, B. B. (2002, October). Papers: Digital-evidence.org. Retrieved August 24, 2011, from: . http://www.digital-evidence.org/papers/opensrc_legal.pdf.
-
-
-
Carrier, B.B.1
-
57
-
-
0003819183
-
-
Academic Press, Waltham, MA
-
Casey E. Digital Evidence and Computer Crime, 3rd ed.: Forensic Science, Computers, and the Internet 2011, Academic Press, Waltham, MA.
-
(2011)
Digital Evidence and Computer Crime, 3rd ed.: Forensic Science, Computers, and the Internet
-
-
Casey, E.1
-
58
-
-
85135434033
-
-
(n.d.). UFED Physical Pro. Retrieved October 2, 2011, from:
-
Cellebrite Mobile Synchronization LTD. (n.d.). UFED Physical Pro. Retrieved October 2, 2011, from: . http://www.cellebrite.com/forensic-products/forensic-products/ufed-physical-pro.html.
-
-
-
-
59
-
-
85135427447
-
-
(1994, August 21). Scores of Convictions Reviewed as Chemist Faces Perjury Accusations: Forensics. Retrieved September 27, 2011, from:
-
Chan, S. (1994, August 21). Scores of Convictions Reviewed as Chemist Faces Perjury Accusations: Forensics. Retrieved September 27, 2011, from: . http://articles.latimes.com/1994-08-21/news/mn-29449_1_lab-tests-fred-zain-double-murder.
-
-
-
Chan, S.1
-
60
-
-
85135432780
-
-
(n.d.). Virtual Digital Evidence Laboratory. Retrieved September 16, 2011, from:
-
Craiger, P. J. (n.d.). Virtual Digital Evidence Laboratory. Retrieved September 16, 2011, from: . http://www.ncfs.org/VDEL.Craiger.Report.NIJ.final.pdf.
-
-
-
Craiger, P.J.1
-
61
-
-
85135424534
-
-
The. (n.d.). Glen Woodall (Huntington, West Virginia). Retrieved September 27, 2011, from:
-
DNA Initiative, The. (n.d.). Glen Woodall (Huntington, West Virginia). Retrieved September 27, 2011, from: . http://www.dna.gov/postconviction/convicted_exonerated/woodall.
-
-
-
-
63
-
-
85135427654
-
-
(2011, September 15) Breaking News: $919 Million Verdict for DuPont in Trade Secret Theft and eDiscovery Sanctions Case. E-Discovery blog:
-
Favro, P. (2011, September 15) Breaking News: $919 Million Verdict for DuPont in Trade Secret Theft and eDiscovery Sanctions Case. E-Discovery blog: . http://www.clearwellsystems.com/e-discovery-blog/.
-
-
-
Favro, P.1
-
65
-
-
85135429111
-
-
(2009, September 12). Best Practices in Digital Evidence Collection. Retrieved October 15, 2011, from:
-
Henry, P. (2009, September 12). Best Practices in Digital Evidence Collection. Retrieved October 15, 2011, from: . http://computer-forensics.sans.org/blog/2009/09/12/best-practices-in-digital-evidence-collection/.
-
-
-
Henry, P.1
-
67
-
-
85135434075
-
-
(n.d.). Encarta: Michael Faraday. Retrieved June 13, 2011, from:
-
Microsoft Corporation. (n.d.). Encarta: Michael Faraday. Retrieved June 13, 2011, from: . http://www.webcitation.org/5kwc3quLs.
-
-
-
-
68
-
-
85135427226
-
-
(n.d.). Collecting Digital Evidence Flowchart: National Institute of Justice. Retrieved June 14, 2011, from:
-
National Institute of Justice. (n.d.). Collecting Digital Evidence Flowchart: National Institute of Justice. Retrieved June 14, 2011, from: . http://www.nij.gov/publications/ecrime-guide-219941/ch5-evidence-collection/collecting-digital-evidence-flowchart.htm.
-
-
-
-
69
-
-
85135426054
-
-
(n.d.). Digital Evidence and Forensics: National Institute of Justice. Retrieved June 14, 2011, from:
-
National Institute of Justice. (n.d.). Digital Evidence and Forensics: National Institute of Justice. Retrieved June 14, 2011, from: . http://www.nij.gov/nij/topics/forensics/evidence/digital/welcome.htm.
-
-
-
-
70
-
-
35248883259
-
-
National Institute of Justice, U.S. Department of Justice Office of Justice Programs, Washington, DC
-
Forensic Examination of Digital Evidence: A Guide for Law Enforcement 2004, National Institute of Justice, U.S. Department of Justice Office of Justice Programs, Washington, DC.
-
(2004)
Forensic Examination of Digital Evidence: A Guide for Law Enforcement
-
-
-
73
-
-
84882322081
-
-
National Institute of Justice, National Institute of Justice, Washington, DC, U.S. Department of Justice, Office of Justice Programs
-
Test Results for Hardware Write Block Device: T4 Forensic SCSI Bridge (FireWire Interface) 2009, National Institute of Justice, National Institute of Justice, Washington, DC, U.S. Department of Justice, Office of Justice Programs.
-
(2009)
Test Results for Hardware Write Block Device: T4 Forensic SCSI Bridge (FireWire Interface)
-
-
-
74
-
-
85135426250
-
-
(n.d.). CFTT Project Overview. Retrieved September 30, 2011, from.gov:
-
National Institute of Standards & Technology. (n.d.). CFTT Project Overview. Retrieved September 30, 2011, from.gov: . http://www.cftt.nist.gov/project_overview.htm.
-
-
-
-
75
-
-
85135432847
-
-
(n.d.). Computer Forensics Tool Testing Project Web Site: National Institute of Standards and Technology. Retrieved June 6, 2011, from:
-
National Institute of Standards and Technology. (n.d.). Computer Forensics Tool Testing Project Web Site: National Institute of Standards and Technology. Retrieved June 6, 2011, from: . http://www.cftt.nist.gov/index.html.
-
-
-
-
76
-
-
85135429293
-
-
(n.d.). Device Seizure v4.5. Retrieved October 2, 2011, from:
-
Paraben Corporation. (n.d.). Device Seizure v4.5. Retrieved October 2, 2011, from: . http://www.paraben.com/device-seizure.html.
-
-
-
-
78
-
-
85135427124
-
-
(2008, February 21). Lest We Remember: Cold Boot Attacks on Encryption Keys. Retrieved October 19, 2011, from:
-
Princeton University Center for Information Technology Policy. (2008, February 21). Lest We Remember: Cold Boot Attacks on Encryption Keys. Retrieved October 19, 2011, from: . http://www.youtube.com/watch?v=JDaicPIgn9U.
-
-
-
-
80
-
-
85135435229
-
-
(2009, January 15). SWGDE Recommended Guidelines for Validation Testing v1.1. Retrieved September 19, 2011, from:
-
Scientific Working Group on Digital Evidence. (2009, January 15). SWGDE Recommended Guidelines for Validation Testing v1.1. Retrieved September 19, 2011, from: . http://www.swgde.org/documents/current-documents/.
-
-
-
-
81
-
-
85135427609
-
-
(2010a, May 15). Minimum Requirements for Quality Assurance in the Processing of Digital and Multimedia Evidence. Retrieved August 24, 2011, from:
-
Scientific Working Group on Digital Evidence. (2010a, May 15). Minimum Requirements for Quality Assurance in the Processing of Digital and Multimedia Evidence. Retrieved August 24, 2011, from: . http://www.swgde.org/documents/current-documents/.
-
-
-
-
82
-
-
85135427213
-
-
(2010, September). The Sedona Conference Glossary: E-Discovery & Digital Information Management (3rd ed.). Retrieved October 21, 2011, from:
-
Sedona Conference. (2010, September). The Sedona Conference Glossary: E-Discovery & Digital Information Management (3rd ed.). Retrieved October 21, 2011, from: . http://www.thesedonaconference.org/publications_html.
-
-
-
-
83
-
-
85135427867
-
-
(n.d.). Collection of Evidence from the Internet: Part 1. Retrieved June 14, 2011, from:
-
Shipley, T. G. (n.d.). Collection of Evidence from the Internet: Part 1. Retrieved June 14, 2011, from: . http://www.dfinews.com/article/collection-evidence-internet-part-1?page=0,1.
-
-
-
Shipley, T.G.1
-
84
-
-
85135421903
-
-
(n.d.). Collection of Evidence from the Internet: Part 2. Retrieved June 14, 2011, from:
-
Shipley, T. G. (n.d.). Collection of Evidence from the Internet: Part 2. Retrieved June 14, 2011, from: . http://www.dfinews.com/article/collection-evidence-internet-part-2.
-
-
-
Shipley, T.G.1
-
85
-
-
80051664424
-
-
Search Group, Incorporated, Sacramento, CA
-
Shipley T.G., Reeve H.R. Collecting Evidence from a Running Computer: A Technical and Legal Primer for the Justice Community 2006, Search Group, Incorporated, Sacramento, CA.
-
(2006)
Collecting Evidence from a Running Computer: A Technical and Legal Primer for the Justice Community
-
-
Shipley, T.G.1
Reeve, H.R.2
-
86
-
-
85135427497
-
-
(n.d.). Crime Scene 101: Locating and Documenting Evidence. Retrieved June 14, 2011, from:
-
Warrington, D. (n.d.). Crime Scene 101: Locating and Documenting Evidence. Retrieved June 14, 2011, from: . http://www.forensicmag.com/article/crime-scene-101-locating-and-documenting-evidence.
-
-
-
Warrington, D.1
-
87
-
-
85135424625
-
-
(n.d.). A Virtual Digital Forensics Lab. Retrieved September 28, 2011, from:
-
Whitcomb, C. (n.d.). A Virtual Digital Forensics Lab. Retrieved September 28, 2011, from: . http://www.ascld.org/files/digital%20VDEL%20Craiger%20ASCLD%20cmw.pdf.
-
-
-
Whitcomb, C.1
-
88
-
-
85135422502
-
-
(2011, April 1). UPDATE: Donald Good Receives Two Life Sentences in Mall Rape Case. Retrieved September 27, 2011, from:
-
WSAZ. (2011, April 1). UPDATE: Donald Good Receives Two Life Sentences in Mall Rape Case. Retrieved September 27, 2011, from: . http://www.wsaz.com/news/headlines/105522183.html.
-
-
-
-
89
-
-
85135434491
-
-
(n.d.). The Windows Registry. Retrieved May 2, 2011, from:
-
Bard, J. (n.d.). The Windows Registry. Retrieved May 2, 2011, from: . http://technet.microsoft.com/en-us/library/cc751049.aspx.
-
-
-
Bard, J.1
-
90
-
-
85135429713
-
-
(n.d.). Windows on Verge of Dropping Below 90% Market Share. Retrieved May 2, 2011, from:
-
Brodkin, J. (n.d.). Windows on Verge of Dropping Below 90% Market Share. Retrieved May 2, 2011, from: . http://www.networkworld.com/news/2011/011311-windows-on-verge-of-dropping.html.
-
-
-
Brodkin, J.1
-
93
-
-
85135430624
-
-
(2010, July 8). Windows 7: Current Events in the World of Windows Forensics. Retrieved May 3, 2011, from:
-
Larson, T. (2010, July 8). Windows 7: Current Events in the World of Windows Forensics. Retrieved May 3, 2011, from: . http://computer-forensics.sans.org/summit-archives/2010/files/12-larson-windows7-foreniscs.pdf.
-
-
-
Larson, T.1
-
94
-
-
85135424515
-
-
(n.d.). How the Recycle Bin Stores Files. Retrieved May 2, 2011, from:
-
Microsoft Corporation. (n.d.). How the Recycle Bin Stores Files. Retrieved May 2, 2011, from: . http://support.microsoft.com/kb/136517.
-
-
-
-
95
-
-
85135432136
-
-
(n.d.). Sleep and Hibernation: Frequently Asked Questions. Retrieved May 2, 2011, from:
-
Microsoft Corporation. (n.d.). Sleep and Hibernation: Frequently Asked Questions. Retrieved May 2, 2011, from: . http://windows.microsoft.com/en-US/windows7/Sleep-and-hibernation-frequently-asked-questions.
-
-
-
-
96
-
-
85135426569
-
-
(n.d.). System Restore: Frequently Asked Questions. Retrieved May 2, 2011, from:
-
Microsoft Corporation. (n.d.). System Restore: Frequently Asked Questions. Retrieved May 2, 2011, from: . http://windows.microsoft.com/en-US/windows-vista/System-Restore-frequently-asked-questions.
-
-
-
-
97
-
-
85135435213
-
-
(n.d.). User Accounts Overview: Microsoft Corporation. Retrieved May 2, 2011, from:
-
Microsoft Corporation. (n.d.). User Accounts Overview: Microsoft Corporation. Retrieved May 2, 2011, from: . http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/usercpl_overview.mspx?mfr=true.
-
-
-
-
99
-
-
85135431778
-
-
(n.d.). Spool: Whatis.com. Retrieved May 2, 2011, from:
-
TechTarget. (n.d.). Spool: Whatis.com. Retrieved May 2, 2011, from: . http://whatis.techtarget.com/definition/0, sid9_gci214229,00.html.
-
-
-
-
100
-
-
85135424134
-
-
(n.d.). About AntiForensics: AntiForenics. Retrieved May 13, 2011, from:
-
AntiForensics Community. (n.d.). About AntiForensics: AntiForenics. Retrieved May 13, 2011, from: . http://www.antiforensics.com/.
-
-
-
-
101
-
-
85135423554
-
-
Apple, Inc, Retrieved August 14, 2011, from:
-
OS X Lion: About FileVault 2011, July 26, 2. Apple, Inc, Retrieved August 14, 2011, from:. http://support.apple.com/kb/HT4790.
-
(2011)
OS X Lion: About FileVault
, vol.2
-
-
-
102
-
-
84882344565
-
-
Backbone Security.com, Retrieved August 14, 2011, from:
-
Backbone's Digital Steganography Database Exceeds 925 Applications 2011, April 26, Backbone Security.com, Retrieved August 14, 2011, from:. http://www.sarc-wv.com/news/press_releases/2011/safdb_v39.aspx.
-
(2011)
Backbone's Digital Steganography Database Exceeds 925 Applications
-
-
-
103
-
-
85135426783
-
-
2008, December 01). Anti-Digital Forensics, The Next Challenge: Part 1. Retrieved August 15, 2011, from:
-
Barbara, J. (2008, December 01). Anti-Digital Forensics, The Next Challenge: Part 1. Retrieved August 15, 2011, from: . http://www.forensicmag.com/article/anti-digital-forensics-next-challenge-part-1.
-
-
-
Barbara, J.1
-
104
-
-
84882326953
-
-
Retrieved August 17, 2011, from:
-
Bauchie R., Hazen F., Lund J., Oakley G., Rundatz F. Encryption 2000, July, Retrieved August 17, 2011, from:. http://searchsecurity.techtarget.com/definition/encryption.
-
(2000)
Encryption
-
-
Bauchie, R.1
Hazen, F.2
Lund, J.3
Oakley, G.4
Rundatz, F.5
-
105
-
-
33947691730
-
Hiding Data, Forensics, and Anti-forensics
-
Berghel H. Hiding Data, Forensics, and Anti-forensics. Communications of the ACM 2007, 15-20.
-
(2007)
Communications of the ACM
, pp. 15-20
-
-
Berghel, H.1
-
108
-
-
0003819183
-
-
Academic Press, Waltham, MA
-
Casey E. Digital Evidence and Computer Crime, 3rd ed.: Forensic Science, Computers, and the Internet 2011, Academic Press, Waltham, MA.
-
(2011)
Digital Evidence and Computer Crime, 3rd ed.: Forensic Science, Computers, and the Internet
-
-
Casey, E.1
-
109
-
-
84882368156
-
-
CBS News, Retrieved September 11, 2011, from:
-
FBI: 10 Russian Spies Arrested in U.S 2010, June 29, CBS News, Retrieved September 11, 2011, from:. http://www.cbsnews.com/stories/2010/06/28/world/main6627393.shtml.
-
(2010)
FBI: 10 Russian Spies Arrested in U.S
-
-
-
111
-
-
85135431540
-
-
(n.d.). System & Security Software. Retrieved August 27, 2011, from:
-
Elcomsoft Co. Ltd. (n.d.). System & Security Software. Retrieved August 27, 2011, from: . http://www.elcomsoft.com/esr.html#forgot%20administrator%20password.
-
-
-
-
112
-
-
84868360132
-
Evaluating Commercial Counter-Forensic Software
-
New Orleans
-
Geiger M. Evaluating Commercial Counter-Forensic Software. DFRWS 2005, New Orleans.
-
(2005)
DFRWS
-
-
Geiger, M.1
-
114
-
-
84882357765
-
-
Homeland Security Newswire, Retrieved August 14, 2011, from:
-
Feds Forced to Get Creative to Bypass Encryption 2011, March 18, Homeland Security Newswire, Retrieved August 14, 2011, from:. http://www.homelandsecuritynewswire.com/feds-forced-get-creative-bypass-encryption.
-
(2011)
Feds Forced to Get Creative to Bypass Encryption
-
-
-
115
-
-
85135435514
-
-
(n.d.). What Is a Computer Algorithm? Retrieved August 17, 2011, from:
-
HowStuffWorks, Inc. (n.d.). What Is a Computer Algorithm? Retrieved August 17, 2011, from: . http://computer.howstuffworks.com/question717.htm.
-
-
-
-
116
-
-
44049091667
-
-
Retrieved August 14, 2011, from:
-
Kelley J. Terrorist Instructions Hidden Online 2005, February 5, Retrieved August 14, 2011, from:. http://www.usatoday.com/life/cyber/tech/2001-02-05-binladen-side.htm.
-
(2005)
Terrorist Instructions Hidden Online
-
-
Kelley, J.1
-
117
-
-
85135423852
-
-
(n.d.). BitLocker Drive Encryption Overview. Retrieved June 20, 2011, from:
-
Microsoft Corporation. (n.d.). BitLocker Drive Encryption Overview. Retrieved June 20, 2011, from: . http://windows.microsoft.com/en-US/windows-vista/BitLocker-Drive-Encryption-Overview.
-
-
-
-
118
-
-
85135434618
-
-
(n.d.). Compare Windows. Retrieved June 20, 2011, from:
-
Microsoft Corporation. (n.d.). Compare Windows. Retrieved June 20, 2011, from: . http://windows.microsoft.com/en-US/windows7/products/compare.
-
-
-
-
119
-
-
85135427935
-
-
(n.d.). Create Strong Passwords. Retrieved August 13, 2011, from:
-
Microsoft Corporation. (n.d.). Create Strong Passwords. Retrieved August 13, 2011, from: . http://www.microsoft.com/security/online-privacy/passwords-create.aspx.
-
-
-
-
120
-
-
85135422800
-
-
(n.d.). The Encrypting File System. Retrieved September 11, 2011, from:
-
Microsoft Corporation. (n.d.). The Encrypting File System. Retrieved September 11, 2011, from: . http://technet.microsoft.com/en-us/library/cc700811.aspx.
-
-
-
-
121
-
-
85135430806
-
-
(n.d.). Unique Technology for Enterprise Customers. Retrieved August 27, 2011, from:
-
Microsoft Corporation. (n.d.). Unique Technology for Enterprise Customers. Retrieved August 27, 2011, from: . http://www.microsoft.com/windows/enterprise/products/windows-7/features.aspx#bitlocker.
-
-
-
-
122
-
-
85135427872
-
-
(n.d.). What Is Encrypting File System (EFS)? Retrieved June 20, 2011, from:
-
Microsoft Corporation. (n.d.). What Is Encrypting File System (EFS)? Retrieved June 20, 2011, from: . http://windows.microsoft.com/en-US/windows7/What-is-Encrypting-File-System-EFS.
-
-
-
-
123
-
-
85135425498
-
-
(n.d.). Windows BitLocker Drive Encryption Step-by-Step Guide: Microsoft Corporation. Retrieved May 13, 2011, from:
-
Microsoft Corporation. (n.d.). Windows BitLocker Drive Encryption Step-by-Step Guide: Microsoft Corporation. Retrieved May 13, 2011, from: . http://technet.microsoft.com/en-us/library/cc766295%28WS.10%29.aspx.
-
-
-
-
124
-
-
84856186904
-
-
Microsoft Corporation, Retrieved August 18, 2011, from:
-
Windows BitLocker Drive Encryption Frequently Asked Questions 2009, July 10, Microsoft Corporation, Retrieved August 18, 2011, from:. http://technet.microsoft.com/enus/library/cc766200%28WS.10%29.aspx#BKMK_EntireDiskMicrosoft.
-
(2009)
Windows BitLocker Drive Encryption Frequently Asked Questions
-
-
-
125
-
-
85135429236
-
-
(n.d.). Private Browsing. Retrieved August 27, 2011, from:
-
Mozilla Foundation. (n.d.). Private Browsing. Retrieved August 27, 2011, from: . http://support.mozilla.com/enUS/kb/Private%20Browsing#w_what-does-private-browsing-not-save.
-
-
-
-
127
-
-
84882378822
-
Anti-Forensics
-
San Diego
-
Rogers M. Anti-Forensics. Lockheed Martin 2005, San Diego.
-
(2005)
Lockheed Martin
-
-
Rogers, M.1
-
128
-
-
84857728530
-
-
Retrieved June 20, 2011, from:
-
Schneier B. Crypto-Gram Newsletter 2002, May 15, Retrieved June 20, 2011, from:. http://www.schneier.com/crypto-gram-0205.html#1.
-
(2002)
Crypto-Gram Newsletter
-
-
Schneier, B.1
-
129
-
-
80053542233
-
-
Retrieved August 25, 2011, from:
-
Schneier B. Secure Passwords Keep You Safer 2007, January 15, Retrieved August 25, 2011, from:. http://www.schneier.com/essay-148.html.
-
(2007)
Secure Passwords Keep You Safer
-
-
Schneier, B.1
-
130
-
-
85135428477
-
-
(n.d.). How Stuff Works: How Computer Forensics Works. Retrieved May 13, 2011, from:
-
Strickland, J. (n.d.). How Stuff Works: How Computer Forensics Works. Retrieved May 13, 2011, from: . http://computer.howstuffworks.com/computer-forensic3.htm.
-
-
-
Strickland, J.1
-
131
-
-
85135425581
-
-
(n.d.). PGP Encryption Products. Retrieved May 13, 2011, from:
-
Symantec Corporation. (n.d.). PGP Encryption Products. Retrieved May 13, 2011, from: . http://www.symantec.com/business/theme.jsp?themeid=pgp.
-
-
-
-
132
-
-
85135426540
-
-
(n.d.). Whole Disk Encryption: Symantec Corporation. Retrieved May 13, 2011, from:
-
Symantec Corporation. (n.d.). Whole Disk Encryption: Symantec Corporation. Retrieved May 13, 2011, from: . http://www.symantec.com/business/whole-disk-encryption.
-
-
-
-
133
-
-
64249108718
-
-
TechTarget, Retrieved August 15, 2011, from:
-
Steganography 2000, December, TechTarget, Retrieved August 15, 2011, from:. http://searchsecurity.techtarget.com/definition/steganography.
-
(2000)
Steganography
-
-
-
134
-
-
84882306948
-
-
TrueCrypt Developers Association, Retrieved August 14, 2011, from:
-
System Encryption 2011, July 11, TrueCrypt Developers Association, Retrieved August 14, 2011, from:. http://www.truecrypt.org/docs/?s=version-history.
-
(2011)
System Encryption
-
-
-
135
-
-
85135428654
-
-
(n.d.). Documentation: TrueCrypt Developers Association. Retrieved May 13, 2011, from:
-
TrueCrypt Developers Association. (n.d.). Documentation: TrueCrypt Developers Association. Retrieved May 13, 2011, from: . http://www.truecrypt.org/docs/.
-
-
-
-
136
-
-
84882376810
-
-
Retrieved June 20, 2011, from:
-
Tyma P. Encryption, Hashing, and Obfuscation 2003, April 8, Retrieved June 20, 2011, from:. http://www.zdnet.com/news/encryption-hashing-and-obfuscation/128604.
-
(2003)
Encryption, Hashing, and Obfuscation
-
-
Tyma, P.1
-
137
-
-
85135435339
-
-
United States of America v. Christopher R. Metsos, et al. (2010, June 1). Southern District, New York.
-
United States of America v. Christopher R. Metsos, et al. (2010, June 1). Southern District, New York.
-
-
-
-
139
-
-
84882328442
-
-
Retrieved August 17, 2011, from:
-
Wawro A. US Government Using PS3s to Crack Encryption, Catch Paedophiles 2009, November 19, Retrieved August 17, 2011, from:. http://www.computerworlduk.com/news/security/17680/us-government-using-ps3s-to-crack-encryption-catch-paedophiles/.
-
(2009)
US Government Using PS3s to Crack Encryption, Catch Paedophiles
-
-
Wawro, A.1
-
140
-
-
85135430133
-
-
(n.d.). Stego Suite™-Discover the Hidden. Retrieved August 18, 2011, from:
-
Wetstone Technologies, Inc. (n.d.). Stego Suite™-Discover the Hidden. Retrieved August 18, 2011, from: . http://www.wetstonetech.com/product/stego-suite/.
-
-
-
-
141
-
-
85135432816
-
-
(n.d.). Retrieved August 14, 2011, from:
-
What IsAnti-Forensics.com? (n.d.). Retrieved August 14, 2011, from: . http://www.anti-forensics.com/about-anti-forensics.
-
-
-
-
142
-
-
0003819183
-
-
Academic Press, Waltham, MA
-
Casey E. Digital evidence and computer crime, 3rd ed.: Forensic science, computers, and the Internet 2011, Academic Press, Waltham, MA.
-
(2011)
Digital evidence and computer crime, 3rd ed.: Forensic science, computers, and the Internet
-
-
Casey, E.1
-
143
-
-
85135430185
-
-
Daubert v. Merrell Dow Pharmaceuticals,Inc., 509 U.S. 579 (1993).
-
Daubert v. Merrell Dow Pharmaceuticals,Inc., 509 U.S. 579 (1993).
-
-
-
-
144
-
-
77956978718
-
-
Executive Office for United States Attorneys, United States Department of Justice, Washington, DC, Office of Legal Education
-
Prosecuting computer crime 2007, Executive Office for United States Attorneys, United States Department of Justice, Washington, DC, Office of Legal Education.
-
(2007)
Prosecuting computer crime
-
-
-
145
-
-
84858743532
-
-
Executive Office for United States Attorneys, United States Department of Justice, Washington, DC, Office of Legal Education
-
Searching and seizing computers and obtaining electronic evidence in criminal investigations 2009, Executive Office for United States Attorneys, United States Department of Justice, Washington, DC, Office of Legal Education.
-
(2009)
Searching and seizing computers and obtaining electronic evidence in criminal investigations
-
-
-
146
-
-
85135430017
-
-
Frye v. United States, .293 F. 1013 ( D.C. Cir 1923).
-
Frye v. United States, .293 F. 1013 ( D.C. Cir 1923).
-
-
-
-
147
-
-
85135428246
-
-
FindLaw. (n.d.). Fourth Amendment-Search and Seizure. Retrieved October 4, 2011, from:
-
FindLaw. (n.d.). Fourth Amendment-Search and Seizure. Retrieved October 4, 2011, from: . http://caselaw.lp.findlaw.com/data/constitution/amendment04/.
-
-
-
-
148
-
-
84875795170
-
The physical computer and the Fourth Amendment
-
Goldfoot J. The physical computer and the Fourth Amendment. Berkley Journal of Criminal Law 2011, 16(1):112-167.
-
(2011)
Berkley Journal of Criminal Law
, vol.16
, Issue.1
, pp. 112-167
-
-
Goldfoot, J.1
-
149
-
-
85135430603
-
-
Illinois v. Gates, 462 U.S. 213, 238, (1983).
-
Illinois v. Gates, 462 U.S. 213, 238, (1983).
-
-
-
-
150
-
-
13544269531
-
Digital evidence and the new criminal procedure
-
Kerr O.S. Digital evidence and the new criminal procedure. Columbia Law Review 2005, 105(1):279-318.
-
(2005)
Columbia Law Review
, vol.105
, Issue.1
, pp. 279-318
-
-
Kerr, O.S.1
-
151
-
-
30644459230
-
Searches and seizures in a digital world
-
Kerr O.S. Searches and seizures in a digital world. Harvard Law Review 2005, 119(2):532-585.
-
(2005)
Harvard Law Review
, vol.119
, Issue.2
, pp. 532-585
-
-
Kerr, O.S.1
-
152
-
-
85135431975
-
-
(n.d.). Zubulake v. UBS Warburg. Retrieved October 10, 2011, from:
-
Kroll OnTrack, Inc. (n.d.). Zubulake v. UBS Warburg. Retrieved October 10, 2011, from: . http://www.krollontrack.co.uk/zubulake/.
-
-
-
-
153
-
-
85135428812
-
-
(2007, December 14). Judge: Man Can't Be Forced to Divulge Encryption Passphrase. Retrieved October 3, 2011, from:
-
McCullagh, D. (2007, December 14). Judge: Man Can't Be Forced to Divulge Encryption Passphrase. Retrieved October 3, 2011, from: . http://news.cnet.com/8301-13578_3-9834495-38.html.
-
-
-
McCullagh, D.1
-
157
-
-
85135425530
-
Privacy and Civil Liberties
-
Retrieved October 10, 2011, from:
-
U.S. Department of Justice, Office of Justice Programs. (2010). Privacy and Civil Liberties. Retrieved October 10, 2011, from: . http://it.ojp.gov/default.aspx?area=privacy%26page=1284#contentTop.
-
(2010)
-
-
-
158
-
-
85135430761
-
-
United States v. Megahed, 2009 WL 722481, at 3 (M.D. Fla. Mar. 18, 2009).
-
United States v. Megahed, 2009 WL 722481, at 3 (M.D. Fla. Mar. 18, 2009).
-
-
-
-
159
-
-
85135432772
-
-
United States v. Slanina, 283 F.3d 670, 680 (5th Cir. 2002).
-
United States v. Slanina, 283 F.3d 670, 680 (5th Cir. 2002).
-
-
-
-
160
-
-
85135423959
-
-
United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001).
-
United States v. Walser, 275 F.3d 981, 986 (10th Cir. 2001).
-
-
-
-
161
-
-
85135429312
-
-
Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003).
-
Zubulake v. UBS Warburg, 217 F.R.D. 309 (S.D.N.Y. 2003).
-
-
-
-
164
-
-
85135432126
-
-
E.I. du Pont de Nemours and Company v. Kolon Industries, Inc., 2011 U.S. Dist. LEXIS 45888 (E.D. Va. April 27, 2011).
-
E.I. du Pont de Nemours and Company v. Kolon Industries, Inc., 2011 U.S. Dist. LEXIS 45888 (E.D. Va. April 27, 2011).
-
-
-
-
165
-
-
85135425940
-
-
Google. (2011, September 21). Reading Full Email Headers. Retrieved October 24, 2011, from:
-
Google. (2011, September 21). Reading Full Email Headers. Retrieved October 24, 2011, from: . http://mail.google.com/support/bin/answer.py?hl=en%26answer=29436.
-
-
-
-
166
-
-
85135423459
-
-
(n.d.). WHOIS Behind That Domain Name? Retrieved October 13, 2011, from:
-
Network Solutions, LLC. (n.d.). WHOIS Behind That Domain Name? Retrieved October 13, 2011, from: . http://www.networksolutions.com/whois/index.jsp.
-
-
-
-
167
-
-
85135422329
-
-
Refsnes Data. (n.d.). HTML Introduction. Retrieved October 13, 2011, from:
-
Refsnes Data. (n.d.). HTML Introduction. Retrieved October 13, 2011, from: . http://www.w3schools.com/html/html_intro.asp.
-
-
-
-
171
-
-
85013978528
-
-
Elsevier, Burlington, MA
-
Conrad E., Misenar S., Feldman J. CISSP Study Guide 2010, Elsevier, Burlington, MA.
-
(2010)
CISSP Study Guide
-
-
Conrad, E.1
Misenar, S.2
Feldman, J.3
-
172
-
-
85135426650
-
-
(2002, October 7). Kevin Mitnick and Anti-Social Engineering. Retrieved November 9, 2011, from CSOOnline.com:
-
Garfinkel, S. (2002, October 7). Kevin Mitnick and Anti-Social Engineering. Retrieved November 9, 2011, from CSOOnline.com: . http://www.csoonline.com/article/217395/kevin-mitnick-and-anti-social-engineering-.
-
-
-
Garfinkel, S.1
-
174
-
-
85135433613
-
-
(n.d.). Coordinated ATM Heist Nets Thieves $13M. Retrieved September 19, 2011, from:
-
Krebs, B. (n.d.). Coordinated ATM Heist Nets Thieves $13M. Retrieved September 19, 2011, from: . http://krebsonsecurity.com/2011/08/coordinated-atm-heist-nets-thieves-13m/.
-
-
-
Krebs, B.1
-
175
-
-
27844543023
-
Insider threat study: Computer sabotage in critical infrastructure sectors
-
May. United States Secret Service and CERT program. Report available at
-
Keeney, M., Kowalski, E., Cappelli, D., Moore, A., Shimeall, T., and Rogers, S. (2005, May). Insider threat study: Computer sabotage in critical infrastructure sectors. United States Secret Service and CERT program. Report available at . http://www.secretservice.gov.
-
(2005)
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
178
-
-
85135432378
-
-
(n.d.). IPv6. Retrieved September 17, 2011, from:
-
Microsoft Corporation. (n.d.). IPv6. Retrieved September 17, 2011, from: . http://technet.microsoft.com/en-us/network/bb530961.aspx.
-
-
-
-
180
-
-
85135427198
-
-
(2005, May 3). Tracking a Computer Hacker. Retrieved September 19, 2011, from:
-
Morris, D. A. (2005, May 3). Tracking a Computer Hacker. Retrieved September 19, 2011, from: . http://www.justice.gov/criminal/cybercrime/usamay2001_2.htm.
-
-
-
Morris, D.A.1
-
181
-
-
85135426458
-
An Introduction to Investigating IPv6 Networks
-
Digital Investigation: The International Journal of Digital Forensics and Incident Response Vol. 4, No. 2. Oxford, England: Elsevier.
-
Nikkel, B. J. (2007). An Introduction to Investigating IPv6 Networks. Digital Investigation: The International Journal of Digital Forensics and Incident Response Vol. 4, No. 2. Oxford, England: Elsevier.
-
(2007)
-
-
Nikkel, B.J.1
-
183
-
-
85013692125
-
-
Syngress, Burlington, MA
-
Prowell S., Kraus R., Borkin M. Seven Deadliest Network Attacks 2010, Syngress, Burlington, MA.
-
(2010)
Seven Deadliest Network Attacks
-
-
Prowell, S.1
Kraus, R.2
Borkin, M.3
-
184
-
-
15744391114
-
Computer Security Incident Handling Guide
-
National Institute of Standards and Technology, Computer Security Division. Gaithersburg, TN: National Institute of Standards & Technology.
-
Scarphone, K., Grance, T., & Masone, K. (2008). Computer Security Incident Handling Guide. National Institute of Standards and Technology, Computer Security Division. Gaithersburg, TN: National Institute of Standards & Technology.
-
(2008)
-
-
Scarphone, K.1
Grance, T.2
Masone, K.3
-
185
-
-
85135432154
-
-
(2000, August). Intrusion Detection (ID). Retrieved September 17, 2011, from:
-
TechTarget. (2000, August). Intrusion Detection (ID). Retrieved September 17, 2011, from: . http://searchmidmarketsecurity.techtarget.com/definition/intrusion-detection.
-
-
-
-
186
-
-
85135428153
-
-
(2000, October). Firewall. Retrieved September 17, 2011, from:
-
TechTarget. (2000, October). Firewall. Retrieved September 17, 2011, from: . http://searchsecurity.techtarget.com/definition/firewall.
-
-
-
-
187
-
-
85135434316
-
-
(2001, March). Social Engineering. Retrieved September 18, 2011, from:
-
TechTarget. (2001, March). Social Engineering. Retrieved September 18, 2011, from: . http://searchsecurity.techtarget.com/definition/social-engineering.
-
-
-
-
188
-
-
85135430167
-
-
(2002, January). Snort. Retrieved September 17, 2011, from:
-
TechTarget. (2002, January). Snort. Retrieved September 17, 2011, from: . http://searchmidmarketsecurity.techtarget.com/definition/Snort.
-
-
-
-
189
-
-
84930069564
-
-
Jones and Bartlett Learning, Sudbury, MA
-
Vacca J.R., Rudolph K. System Forensics, Investigation, and Response 2011, Jones and Bartlett Learning, Sudbury, MA.
-
(2011)
System Forensics, Investigation, and Response
-
-
Vacca, J.R.1
Rudolph, K.2
-
190
-
-
84869141956
-
-
Verizon Business Global LLC, & United States Secret Sevice, Verizon Business Global LLC, Ashburn
-
2011 Data Breach Investigations Report 2011, Verizon Business Global LLC, & United States Secret Sevice, Verizon Business Global LLC, Ashburn.
-
(2011)
2011 Data Breach Investigations Report
-
-
-
191
-
-
85135430538
-
-
(2010, October 17). Understanding the World of Cellular Telephones: Part 1. Retrieved November 13, 2011, from Forensicmag.com:
-
Barbara, J. J. (2010, October 17). Understanding the World of Cellular Telephones: Part 1. Retrieved November 13, 2011, from Forensicmag.com: . http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-1?page=0,1.
-
-
-
Barbara, J.J.1
-
192
-
-
85135430056
-
-
(n.d.). SIM Forensics: Part 1. Retrieved September 19, 2011, from:
-
Barbara, J. J. (n.d.). SIM Forensics: Part 1. Retrieved September 19, 2011, from: . http://www.forensicmag.com/article/sim-forensics-part-1.
-
-
-
Barbara, J.J.1
-
193
-
-
85135430303
-
-
(n.d.). Sim Forensics: Part 2. Retrieved September 19, 2011, from:
-
Barbara, J. J. (n.d.). Sim Forensics: Part 2. Retrieved September 19, 2011, from: . http://www.forensicmag.com/article/sim-forensics-part-2.
-
-
-
Barbara, J.J.1
-
194
-
-
85135431121
-
-
(n.d.). SIM Forensics: Part 3. Retrieved September 18, 2011, from:
-
Barbara, J. J. (n.d.). SIM Forensics: Part 3. Retrieved September 18, 2011, from: . http://www.forensicmag.com/article/sim-forensics-part-3.
-
-
-
Barbara, J.J.1
-
195
-
-
85135434171
-
-
(n.d.). Understanding the World of Cellular Telephones: Part 1. Retrieved September 21, 2011, from:
-
Barbara, J. J. (n.d.). Understanding the World of Cellular Telephones: Part 1. Retrieved September 21, 2011, from: . http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-1.
-
-
-
Barbara, J.J.1
-
196
-
-
85135434880
-
-
(n.d.). Understanding the World of Cellular Telephones: Part 2. Retrieved September 21, 2011, from:
-
Barbara, J. J. (n.d.). Understanding the World of Cellular Telephones: Part 2. Retrieved September 21, 2011, from: . http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-2.
-
-
-
Barbara, J.J.1
-
197
-
-
85135424626
-
-
(n.d.). Understanding The World of Cellular Telephones: Part 3. Retrieved September 21, 2011, from:
-
Barbara, J. J. (n.d.). Understanding The World of Cellular Telephones: Part 3. Retrieved September 21, 2011, from: . http://www.forensicmag.com/article/understanding-world-cellular-telephones-part-3.
-
-
-
Barbara, J.J.1
-
198
-
-
85135429041
-
-
(n.d.). BitPim. Retrieved September 22, 2011, from:
-
BitPim. (n.d.). BitPim. Retrieved September 22, 2011, from: . http://www.bitpim.org/.
-
-
-
-
199
-
-
85135423899
-
-
(n.d.). How GPS Receivers Work. Retrieved September 14, 2011, from:
-
Brian, M., & Harris, T. (n.d.). How GPS Receivers Work. Retrieved September 14, 2011, from: . http://electronics.howstuffworks.com/gadgets/travel/gps.htm.
-
-
-
Brian, M.1
Harris, T.2
-
202
-
-
85135434951
-
-
(2010, December 21). Missing Vegas Showgirl Debbie Flores-Narvaez was Pregnant, Beaten by her ex, According to Police. Retrieved September 25, 2011, from:
-
Hartenstein, M., & Sheridan, M. (2010, December 21). Missing Vegas Showgirl Debbie Flores-Narvaez was Pregnant, Beaten by her ex, According to Police. Retrieved September 25, 2011, from: . http://articles.nydailynews.com/2010-12-21/news/27085062_1_license-plates-cell-phone-police.
-
-
-
Hartenstein, M.1
Sheridan, M.2
-
203
-
-
85135428688
-
-
(2010, April 30). An Introduction to Android Forensics. Retrieved September 2011, 2011, from:
-
Hoog, A. (2010, April 30). An Introduction to Android Forensics. Retrieved September 2011, 2011, from: . http://www.dfinews.com/article/introduction-android-forensics?page=0,0.
-
-
-
Hoog, A.1
-
206
-
-
85135429336
-
-
(2011, June). Cell Phone Analysis: Technology, Tools, and Processes. Retrieved September 12, 2011, from:
-
Kessler, G. C. (2011, June). Cell Phone Analysis: Technology, Tools, and Processes. Retrieved September 12, 2011, from: . http://www.garykessler.net/presentations/CellPhone_201106_ICAC-sanitized.pdf.
-
-
-
Kessler, G.C.1
-
207
-
-
85135432316
-
-
(n.d.). Enhancing Investigations with GPS Evidence. Retrieved September 15, 2011, from:
-
LeMere, B. (n.d.). Enhancing Investigations with GPS Evidence. Retrieved September 15, 2011, from: . http://www.forensicmag.com/article/enhancing-investigations-gps-evidence.
-
-
-
LeMere, B.1
-
208
-
-
85135431622
-
-
(2011, April 25). Enhancing Investigations with GPS Evidence. Retrieved September 15, 2011, from:
-
LeMere, B. (2011, April 25). Enhancing Investigations with GPS Evidence. Retrieved September 15, 2011, from: . http://www.forensicmag.com/article/enhancing-investigations-gps-evidence.
-
-
-
LeMere, B.1
-
209
-
-
85135431342
-
-
(n.d.). Predictive Text Input. Retrieved September 17, 2011, from:
-
Mobile-phone-directory.org. (n.d.). Predictive Text Input. Retrieved September 17, 2011, from: . http://www.mobile-phone-directory.org/Glossary/P/Predictive_Text_Input.html.
-
-
-
-
211
-
-
85135423265
-
-
(2007, November). FAQ. Retrieved September 19, 2011, from:
-
Open Handset Alliance. (2007, November). FAQ. Retrieved September 19, 2011, from: . http://www.openhandsetalliance.com/oha_faq.html.
-
-
-
-
212
-
-
85135434265
-
-
(2006, May 3). Fighting Crime With Cellphones' Clues. Retrieved September 19, 2011, from:
-
Shachtman, N. (2006, May 3). Fighting Crime With Cellphones' Clues. Retrieved September 19, 2011, from: . http://www.nytimes.com/2006/05/03/technology/techspecial3/03cops.html.
-
-
-
Shachtman, N.1
-
213
-
-
79961048912
-
Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?
-
(December 2010)
-
Bell, Graeme B., Boddington, Richard (December 2010). Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery? Journal of Digital Forensics, Security and Law.
-
Journal of Digital Forensics, Security and Law
-
-
Bell, G.B.1
Boddington, R.2
-
214
-
-
85135427186
-
-
(2011, January). The NIST Definition of Cloud Computing. Retrieved October 9, 2011, from:
-
Mell, P., & Grance, T. (2011, January). The NIST Definition of Cloud Computing. Retrieved October 9, 2011, from: . http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition.pdf.
-
-
-
Mell, P.1
Grance, T.2
-
215
-
-
85135425139
-
-
(n.d.). IPv6. Retrieved September 17, 2011, from:
-
Microsoft Corporation. (n.d.). IPv6. Retrieved September 17, 2011, from: . http://technet.microsoft.com/en-us/network/bb530961.aspx.
-
-
-
-
216
-
-
85135428782
-
-
(n.d.). Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis. Dublin, Ireland: University College Dublin.
-
Ruan, K., Baggili, I., Carthy, J., & Kechadi, T. (n.d.). Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis. Dublin, Ireland: University College Dublin.
-
-
-
Ruan, K.1
Baggili, I.2
Carthy, J.3
Kechadi, T.4
-
217
-
-
84865637456
-
-
IBM Ireland Ltd, Dublin, Ireland
-
Ruan K., Carthy J., Kechadi T., Crosbie M. Cloud Forensics: An Overview 2011, IBM Ireland Ltd, Dublin, Ireland.
-
(2011)
Cloud Forensics: An Overview
-
-
Ruan, K.1
Carthy, J.2
Kechadi, T.3
Crosbie, M.4
-
218
-
-
85135431142
-
-
(2007, December). Cloud Computing. Retrieved October 11, 2011, from:
-
TechTarget. (2007, December). Cloud Computing. Retrieved October 11, 2011, from: . http://searchcloudcomputing.techtarget.com/definition/cloud-computing.
-
-
-
|