Abstract A Nokia 5800 XpressMusic Unlocked Phone with U.S. 3G, GPS with Free Voice Navigation, Wi-Fi — U.S. Version with Warranty (Black) is investigated during the process of Symbian forensics. This product is based on S60 5th Edition software. In…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Forensic Analysis of a DVR
Abstract The midterm allowed us the freedom to choose any embedded device we wanted from our home to investigate. After careful thought, the Dish VIP622 DVR was selected as the device. This was because it’s something that is used every…
Samsung Galaxy Gear Smartwatch Forensics
Abstract The Samsung Galaxy Gear Smartwatch, released October 4, 2013 is a cutting edge Android companion device. The watch pairs via Bluetooth 4.0 with the Samsung Galaxy Note 3 Smartphone, and acts as a relay for certain phone features such…
3 universities, one scam
This email from Dalhousie University (dal.ca) in Nova Scotia shows up in my inbox today. It came to me via San Francisco State University (sfsu.edu) to my Purdue email account. This wouldn’t be so bad but it is sending me…
Risk management notes: Diagram of explanation of analysis
Based off the McCumber Cube model, the IBM ring model of operating systems, and the OSI 7 Layer model. To be done still? Figure out the metrics and feeder mechanisms.
Intelligence, information, and other cybery thoughts
If we look at the basic precepts of what we mean by cyber warfare and conflict it is that we create a political effect upon an adversary where they either do something or stop doing something. That word cyber crops…
Cyber Forensics of mobile and embedded devices: Midterm Exam
All answers to questions should be in your own words. Do not copy the entire text of questions into you answer sheet. This is an essay exam meant to be completed over a period of approximately 5 hours. It will…
2013 DerbyCon Friday Notes
The keynote opened with a we are family theme. I wasn’t quite sure if being welcomed into the family would require taking a name suffix based on a body part. You know something like sam “the thumb”. The chief scientist…
Hackers, crackers, soldiers, sailors, software, hardware, money and fun
In the past few years we have gone from nation-state dominance of the cyber realm, to the idea of non-state actors, and now with the Snowden leaks we are moving back towards realization of state actor preeminence. The rules of…
The chaotic dance of anarchy in the data center
I’ve talked in the past about the concept of a short vision horizon. When you’re walking, running, riding a motorcycle, or planning enterprise security the shorter the distance you’re looking the more trouble you might get into. When you are…
One device to rule them all
Motorola quietly killed off the Atrix laptop, entertainment, phone concept that they were building. There are a few reasons they may have had difficulty, but I strongly suggest they were off the mark only a little. The content and communication…
Research Note: Strategic, operational, and tactical cyber intelligence
Some notes on operational level of war as it can be applied to cyber intelligence processes. As a factor in the process of conflict the inteligence gathering process is harder for some to understand in the context of cyber, and…
The affair, Snowden, effects, outcomes, plans
It won’t take very long looking at the news from the last few days to realize there is something up in the media. Greenwald at the Guardian has been trickling out a series of stories on the NSA via the…
9th International Conference on Cyber Warfare and Security (CFP)
ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come…
Data, Forensics, and the Use of Cyberweapons | The Loopcast
Where I get interviewed by the Loopcast! Data, Forensics, and the Use of Cyberweapons | The Loopcast. Professor Sam Liles (@selil) and I (@rejectionking) talk about defining data, digital forensics, cyber weapons, potential responses to being hacked, and briefly…