Abstract Embedded devices are becoming more and more pervasive in the daily affairs of the average individual. Modern appliances from coffee pots to refrigerators and even washing machines are now running on embedded systems, sometimes operating trimmed down versions of…
Symbian Forensics
Abstract A Nokia 5800 XpressMusic Unlocked Phone with U.S. 3G, GPS with Free Voice Navigation, Wi-Fi — U.S. Version with Warranty (Black) is investigated during the process of Symbian forensics. This product is based on S60 5th Edition software. In…
Forensic Analysis of a DVR
Abstract The midterm allowed us the freedom to choose any embedded device we wanted from our home to investigate. After careful thought, the Dish VIP622 DVR was selected as the device. This was because it’s something that is used every…
Samsung Galaxy Gear Smartwatch Forensics
Abstract The Samsung Galaxy Gear Smartwatch, released October 4, 2013 is a cutting edge Android companion device. The watch pairs via Bluetooth 4.0 with the Samsung Galaxy Note 3 Smartphone, and acts as a relay for certain phone features such…
3 universities, one scam
This email from Dalhousie University (dal.ca) in Nova Scotia shows up in my inbox today. It came to me via San Francisco State University (sfsu.edu) to my Purdue email account. This wouldn’t be so bad but it is sending me…
Details on the new 2014 BMW R1200 GS Adventure emerge
The new water boxer BMW adventure motorcycle is set to arrive and be available. Pricing is still not available but the bike appears to have some real interesting potential. As a current GS Adventure rider I thought I’d share some…
Risk management notes: Diagram of explanation of analysis
Based off the McCumber Cube model, the IBM ring model of operating systems, and the OSI 7 Layer model. To be done still? Figure out the metrics and feeder mechanisms.
Cyber conflict and transnational cyber crime: Midterm Exam
All answers to questions should be in your own words. Do not copy the entire text of questions into you answer sheet. This is an essay exam meant to be completed over a period of approximately 5 hours. DO NOT…
Intelligence, information, and other cybery thoughts
If we look at the basic precepts of what we mean by cyber warfare and conflict it is that we create a political effect upon an adversary where they either do something or stop doing something. That word cyber crops…
Motorcycle Monday
Motorcycle Monday
Cyber Forensics of mobile and embedded devices: Midterm Exam
All answers to questions should be in your own words. Do not copy the entire text of questions into you answer sheet. This is an essay exam meant to be completed over a period of approximately 5 hours. It will…
Motorcycle Monday
This gallery contains 1 photo →
2013 DerbyCon Friday Notes
The keynote opened with a we are family theme. I wasn’t quite sure if being welcomed into the family would require taking a name suffix based on a body part. You know something like sam “the thumb”. The chief scientist…
Hackers, crackers, soldiers, sailors, software, hardware, money and fun
In the past few years we have gone from nation-state dominance of the cyber realm, to the idea of non-state actors, and now with the Snowden leaks we are moving back towards realization of state actor preeminence. The rules of…