Some links to items we discussed in class and some background materials. I included a sampling of the articles on computer forensics over the last week. I think there should be plenty to keep you occupied. When we consider computer/cyber/digital forensics the scope and thoughts on what is included is rapidly expanding with the technologies. Though it might be good to have a tool based discipline the scope of the creep into a variety of technologies that are included is meaning that simple tools are not enough.
Consider that MP3 players didn’t exist ten years ago, or that EEPC are rapidly becoming a favorite of national travelers, or that pagers and smart cell phones are becoming pervasive. The rules of evidence and the concerns of investigators need to grow with the pervasive and ubiquitous nature of the technology used by society. Further, the reality means there will be political footballs made of the techniques and skills as power brokers within the discipline try and control what should be an open scientific and concern.
States put brakes on rental companies using GPS to fine customers
Article on one of the non-standard cases we discussed.
Karl Popper father of refutation (Wikipedia)
All you ever wanted to know about the opposite of inductive method.
Digital Forensics Research Work Shop
Lots of papers on forensics.
Crime lab design
Interesting story on building a crime lab.
Digital Forensics: Nerds need not apply
Blog post talking about some of the perceived issues as barriers to entry for forensics. Real or not? Who knows. This has been a stated problem for a long time though.
Computer Forensic changing environment!
Another blog post on the same issues of tool based versus science based/technology based concerns. A lot of the issues articles like this are discussing is the impact of having private entities involved in inherent governmental activities providing culpatory (sic) and exculpatory evidence possible subject to investigator selectivity bias.
UK crime fighters grapple with iPhone wipe threat
Criminals can remotely destroy incriminating evidence by exploiting security features on the Apple iPhone, a leading digital forensics expert has warned.
The ranks of electronic discovery and computer forensics consultants have multiplied in recent years. Since electronically stored information can be evidence for anything from a white-collar crime to civil litigation to divorce cases, the need for e-discovery and forensics expertise has grown exponentially
Do RIAA Snoops Need P.I. Licenses?
By now, we all know how the Recording Industry Association of America nabs alleged file sharers, more than 20,000 lawsuits and counting: Hired snoops from MediaSentry — aka SafeNet — log onto Kazaa, Limewire or other file sharing programs, peer into open share folders, take screenshots, download a few files and obtain the offending IP addresses.
Small GPS devices help prosecutors win convictions
Like millions of motorists, Eric Hanson used a GPS unit in his Chevrolet TrailBlazer to find his way around. He probably didn’t expect that prosecutors would eventually use it too — to help convict him of killing four family members.