The acronym BLUF stands for bottom line up front. The inverted pyramid and BLUF style of writing is a tool used to communicate to leadership quickly, in times of stress, or when the topic is fairly controversial. These writing tools focus…
iPad iOS 7 Forensics Approach Using AccessData Software
Abstract With the fast growth of sold iPad since it was introduced in 2010, we knew by now that it is almost everywhere. Nowadays, iPad can replace Personal Computers especially if its equipped with some applications to process documents that…
Forensic analysis of a JVC KD-HDR receiver
Forensic analysis of a JVC KD-HDR receiver Abstract I sought to discover what things of forensic interest can be extracted from a JVC KD-HDR50 automobile receiver. As the device has multiple inputs and a persistent storage mechanism, there should be…
Forensic Analysis of a Roku XS 2
Abstract The Roku XS 2 is digital media streaming devices made by Roku Incorporation. The Roku is a relatively new device. The first generation of Roku was introduced on May 20th, 2008 (Roku Inc. Press Release, 2008). The current…
Microsoft Surface RT 2 Tablet
Abstract The following paper is a report detailing an attempt at digital forensic data acquisition and analysis of Microsoft’s Surface RT 2 tablet with Windows 8.1 operating system. The paper details the specifications of the tablet device listing its…
Pebble Data Acquisition
Glass Acquisition and Analysis
Glass Acquisition and Analysis Faisal Talal Alaskandrani Purdue University Due Date : 14/03/2014 CNIT 58100 CFM Under the direction of Dr. Samuel Liles Abstract Google Glass developed by Google is an embedded device with an android operating…
Examples of pre-history (before 1980) high technology attacks
The following are all from the very excellent book on high tech crime written in the late 1970s. I reviewed this book awhile back. Whiteside, Thomas, “Computer Capers: Tales of electronic thievery, embezzlement, and fraud”, Thomas Y. Crowel, New York,…
2014 Iron Butt Association Pizza Party (couple a pics)
This gallery contains 16 photos →
You shouldn’t read this post on Russia and the rest of the world
First off, I am not an expert on Russia or even a political scientist. In the first case, I do not care and in the second, I prefer to be relevant. This treatise is independent of the current conflict other…
Conference Submissions and Presentations made more effective with 10 quick tips
Strongly suggested viewing for students and professionals that are going to be doing presentations. Matthew McCullough walks you through a 10 step program of doing a presentation.
Why should the United States engage in protection of the Ukraine?
I ask the why question a lot. Partly it is because I’m a scientist of sorts, but mostly it is an artifact of having taught strategic assessment at the National Defense University where I had a few processes hammered into…
Cybersecurity and Incident Response Laboratory (CIRL) Proposal
The following is an example of a proposal I wrote to bring enhanced information assurance and security education to the College of Technology. Though the proposal never went forward I thought it might be interesting for others to read. There…
Cyber
Cyber is a technology mediated domain of human and systems interactions. Where: Human <-> Human Human <-> System System <-> System Human being biological entity as sender, receiver, sensor, perceiver. System being a technology as sender, receiver, sensor, perceiver. Why…
Concept map looking at nation state ICT capabilities
This gallery contains 1 photo →