Course Description: This course will examine the spectrum of conflict from crime through cyber warfare. Specific case studies of transnational cyber crime and organizations engaged in such activities along with cyber conflict at the nation state level will be detailed…
Category: Purdue
Hey it’s where Sam used to work.
People divided over impact of ‘Deep Web’
Invisible attacks: Maritime shipping critical infrastructure attacks
This gallery contains 1 photo →
Purdue team takes home top honors in DC3 challenge
I would like to congratulate four CIT graduate students in their win of the Defense Cyber Crime Center (DC3) cyber forensics challenge. Team “Or11–” came together and was composed of these four students. William Ellis Jacob Kambic Eric Katz Sydney…
Careers in government: Challenges in recruiting
I teach a discipline almost completely on topics of interest only to government entities. By far and in most cases the only people interested in investing towards professional incident response requiring forensics level skills is the government. Whether a local…
Concept mapping: Cloud forensics
This gallery contains 4 photos →
Crude Faux: An analysis of cyber conflict within the oil and gas industries
This gallery contains 1 photo →
Forensic analysis of a Garmin Nuvi 1390
Abstract A Garmin Nuvi 1390 was accessed using three different software methods; Cellebrite Physical Analyzer s FTK Imager, and Linux command line. All three methods are capable of producing an image of the device. The device stores user favorites and…
Forensic Analysis on a Nintendo Wii
Forensic Analysis of a Nikon Coolpix Digital Camera
Abstract This lab exercise, which involved acquiring and analyzing the data from the internal storage of a Nikon Coolpix E4600 digital camera, provides an opportunity to become more familiar with conducting forensic acquisitions and analysis on this type of device.…
Forensic Analysis of an iPod Touch
Abstract Forensic analysis of an iOS device can be performed by using the backup files available with the corresponding account at iTunes. This backup can provide access to the file structure and folders without altering the original backup files, making…
Kindle 2 International – Acquisition Analysis
Abstract Embedded devices are becoming more and more pervasive in the daily affairs of the average individual. Modern appliances from coffee pots to refrigerators and even washing machines are now running on embedded systems, sometimes operating trimmed down versions of…
Symbian Forensics
Abstract A Nokia 5800 XpressMusic Unlocked Phone with U.S. 3G, GPS with Free Voice Navigation, Wi-Fi — U.S. Version with Warranty (Black) is investigated during the process of Symbian forensics. This product is based on S60 5th Edition software. In…
Forensic Analysis of a DVR
Abstract The midterm allowed us the freedom to choose any embedded device we wanted from our home to investigate. After careful thought, the Dish VIP622 DVR was selected as the device. This was because it’s something that is used every…
Samsung Galaxy Gear Smartwatch Forensics
Abstract The Samsung Galaxy Gear Smartwatch, released October 4, 2013 is a cutting edge Android companion device. The watch pairs via Bluetooth 4.0 with the Samsung Galaxy Note 3 Smartphone, and acts as a relay for certain phone features such…