Difference between pages "Blackberry Forensics" and "Upcoming events"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(Conferences)
 
Line 1: Line 1:
== Warning for BlackBerry Forensics ==
+
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
BlackBerry devices come with password protection. The owner has the capability to protect all data on the phone with a password. The user may also specify the amount of attempts for entering the password before wiping all data from the device.
+
When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
 +
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
  
If you exceed your password attempts limit (defaults to 10, but you can set it as low as 3), you will be prompted one last time to type the word BlackBerry. The device will then wipe. It will be reset to the factory out-of-the-box condition, and the password reset. You will lose everything in the device memory, with no possibility of recovery. It will not reformat the microSD card, since that's not part of the factory configuration. The phone will still be usable, and the operating system will be unchanged. So this technique cannot be used to roll back from an OS upgrade problem.
+
This is a BY DATE listing of upcoming events relevant to [[digital forensics]].  It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
  
Obviously this is a serious problem if you need to perform forensics on the device. The best work around is to work with the owner of the device and hopefully get them to disclose the password.
+
This listing is divided into three sections (described as follows):<br>
 +
<ol><li><b><u>[[Upcoming_events#Calls_For_Papers|Calls For Papers]]</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
 +
<li><b><u>[[Upcoming_events#Conferences|Conferences]]</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
 +
<li><b><u>[[Training Courses and Providers]]</u></b> - Training </li><br></ol>
  
== Acquiring BlackBerry Backup File (.ipd) ==
+
== Calls For Papers ==
 +
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
  
1. Open Blackberry’s Desktop Manager<br/>
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
2. Click “Options” then “Connection Settings” <br/>
+
|- style="background:#bfbfbf; font-weight: bold"
[[Image:4.JPG]]<br/>
+
! width="30%|Title
4. Select “USB-PIN: 2016CC12” for connection<br/>
+
! width="15%"|Due Date
[[Image:1.JPG]]<br/>
+
! width="15%"|Notification Date
5. Click “Detect”, then it should show a dialog box saying it found the device<br/>
+
! width="40%"|Website
6.      Click "OK" to return to the main menu<br/>
+
|-
7. Double click “Backup and Restore”<br/>
+
|International Workshop on Cyber Crime
[[Image:2.JPG]]  <br/>
+
|Feb 15, 2013
8.      Click "Backup"<br/>
+
|Mar 01, 2013
[[Image:5.JPG]]<br/>
+
|http://stegano.net/IWCC2013/
9. Save the .ipd file<br/>
+
|-
[[Image:3.JPG]]<br/>
+
|}
  
== Opening Blackberry Backup Files (.ipd) ==
+
See also [http://www.wikicfp.com/cfp/servlet/tool.search?q=forensics WikiCFP 'Forensics']
1. Purchase Amber BlackBerry Converter from [http://www.processtext.com/abcblackberry.html]
+
<br>Or
+
<br>Download Trial Version
+
<br><br>2. Use File | Open and point the program to the BlackBerry backup file (.ipd).
+
<br><br>3. Navigate to the appropriate content by using the navigator icons on the left.
+
  
== Blackberry Simulator ==
+
== Conferences ==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 +
|-
 +
|7th IEEE LCN Workshop on Security In Communication Networks
 +
|Oct 22-25<br>Clearwater, FL
 +
|http://www.sick-workshop.org
 +
|-
 +
|4th International Conference on Digital Forensics & Cyber Crime
 +
|Oct 24-28<br>West Lafayette, IN
 +
|http://d-forensics.org/2012/show/home
 +
|-
 +
|3rd Cybercrime and Trustworthy Computing Workshop
 +
|Oct 29-30<br>Bellarat, Australia
 +
|http://comp.mq.edu.au/conferences/ctc2011/
 +
|-
 +
|Paraben Forensic Innovations Conference
 +
|Nov 03-07<br>Park City, UT
 +
|http://www.pfic-conference.com/
 +
|-
 +
|2012 International Workshop on Computational Forensics
 +
|Nov 11<br>Tsukuba, Japan
 +
|http://iwcf12.arsforensica.org/
 +
|-
 +
|IEEE Conference on Technologies for Homeland Security
 +
|Nov 13-15<br>Waltham, MA
 +
|http://www.ieee-hst.org/
 +
|-
 +
|8th International Conference on Information Assurance and Security (IAS'12)
 +
|Nov 21-23<br>Sao Carlos, Brazil
 +
|http://www.mirlabs.org/ias12
 +
|-
 +
|Forensics@NIST 2012
 +
|Nov 28-30<br>Rockville, MD
 +
|http://www.nist.gov/oles/forensics-2012.cfm
 +
|-
 +
|IEEE International Workshop on Information Forensics and Security
 +
|Dec 02-05<br>Tenerife, Spain
 +
|http://www.wifs12.org/index.html
 +
|-
 +
|28th Annual Computer Security Applications Conference (ACSAC 2012)
 +
|Dec 03-07<br>Orlando, FL
 +
|http://www.acsac.org
 +
|-
 +
|2012 secau Security Congress
 +
|Dec 03-05<br>Perth, Western Australia
 +
|http://conferences.secau.org/
 +
|-
 +
|Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics
 +
|Jan 28-30<br>Orlando, FL
 +
|http://www.ifip119.org/Conferences/
 +
|-
 +
|2013 DoD Cybercrime Conference
 +
|Jan 29-Feb 01<br>Louisville, KY
 +
|http://www.dodcybercrime.com/
 +
|-
 +
|65th Annual AAFS Meeting
 +
|Feb 18-23<br>Washington, DC
 +
|http://www.aafs.org/aafs-2013-annual-meeting
 +
|-
 +
|International Workshop on Cyber Crime
 +
|May 24<br>San Francisco, CA
 +
|http://stegano.net/IWCC2013/
 +
|-
 +
|Techno Security and Forensics Investigation Conference
 +
|Jun 02-05<br>Myrtle Beach, SC
 +
|http://www.thetrainingco.com/html/Security%20Conference%202013.html
 +
|-
 +
|Mobile Forensics World
 +
|Jun 02-05<br>Myrtle Beach, SC
 +
|http://www.techsec.com/html/MFC-2013-Spring.html
 +
|-
 +
|DFRWS 2013
 +
|Aug 04-07<br>Monterey, CA
 +
|http://dfrws.org/2013
 +
|-
 +
|Regional Computer Forensics Group GMU 2013
 +
|Aug 05-09<br>Fairfax, VA
 +
|http://www.rcfg.org
 +
|-
 +
|}
  
This is a step by step guide to downloading and using a Blackberry simulator. For this example I downloaded version 4.0.2 in order to simulate the 9230 series.
+
==See Also==
 
+
* [[Training Courses and Providers]]
1. Select a simulator to download from the drop-down list on the [https://www.blackberry.com/Downloads/entry.do?code=060AD92489947D410D897474079C1477]Blackberry website. Click ''Next''.
+
==References==
 
+
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
2. Look through the list and download BlackBerry Handheld Simulator v4.0.2.51.
+
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
 
+
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
3. Enter your proper user credentials and click ''Next'' to continue.
+
 
+
4. On the next page, reply accordingly to the eligibility prompt and click ''Next'' to continue.*
+
 
+
5. Agree or disagree to the SDK agreement and click ''Submit'' to continue.*
+
 
+
6. The next page will provide you with a link to download the .ZIP file containing the wanted simulator.
+
 
+
* - If you disagree at any of these point you will not be able to continue to the download.
+
 
+
INCOMPLETE, WILL COMPLETE BY 11.3.2008
+
 
+
== Blackberry Protocol ==
+
http://www.off.net/cassis/protocol-description.html
+
 
+
Here is a useful link to the Blackberry Protocol as documented by Phil Schwan, Mike Shaver, and Ian Goldberg. The article goes into great description of packet sniffing and the protocol as it relates to data transfer across a USB port.
+

Revision as of 08:31, 23 October 2012

PLEASE READ BEFORE YOU EDIT THE LISTS BELOW
When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).
Some events may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

This is a BY DATE listing of upcoming events relevant to digital forensics. It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic conferences page, but entries in this list have specific dates and locations for the upcoming event.

This listing is divided into three sections (described as follows):

  1. Calls For Papers - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)

  2. Conferences - Conferences relevant for Digital Forensics (Name, Date, Location, URL)

  3. Training Courses and Providers - Training

Calls For Papers

Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.

Title Due Date Notification Date Website
International Workshop on Cyber Crime Feb 15, 2013 Mar 01, 2013 http://stegano.net/IWCC2013/

See also WikiCFP 'Forensics'

Conferences

Title Date/Location Website
7th IEEE LCN Workshop on Security In Communication Networks Oct 22-25
Clearwater, FL
http://www.sick-workshop.org
4th International Conference on Digital Forensics & Cyber Crime Oct 24-28
West Lafayette, IN
http://d-forensics.org/2012/show/home
3rd Cybercrime and Trustworthy Computing Workshop Oct 29-30
Bellarat, Australia
http://comp.mq.edu.au/conferences/ctc2011/
Paraben Forensic Innovations Conference Nov 03-07
Park City, UT
http://www.pfic-conference.com/
2012 International Workshop on Computational Forensics Nov 11
Tsukuba, Japan
http://iwcf12.arsforensica.org/
IEEE Conference on Technologies for Homeland Security Nov 13-15
Waltham, MA
http://www.ieee-hst.org/
8th International Conference on Information Assurance and Security (IAS'12) Nov 21-23
Sao Carlos, Brazil
http://www.mirlabs.org/ias12
Forensics@NIST 2012 Nov 28-30
Rockville, MD
http://www.nist.gov/oles/forensics-2012.cfm
IEEE International Workshop on Information Forensics and Security Dec 02-05
Tenerife, Spain
http://www.wifs12.org/index.html
28th Annual Computer Security Applications Conference (ACSAC 2012) Dec 03-07
Orlando, FL
http://www.acsac.org
2012 secau Security Congress Dec 03-05
Perth, Western Australia
http://conferences.secau.org/
Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics Jan 28-30
Orlando, FL
http://www.ifip119.org/Conferences/
2013 DoD Cybercrime Conference Jan 29-Feb 01
Louisville, KY
http://www.dodcybercrime.com/
65th Annual AAFS Meeting Feb 18-23
Washington, DC
http://www.aafs.org/aafs-2013-annual-meeting
International Workshop on Cyber Crime May 24
San Francisco, CA
http://stegano.net/IWCC2013/
Techno Security and Forensics Investigation Conference Jun 02-05
Myrtle Beach, SC
http://www.thetrainingco.com/html/Security%20Conference%202013.html
Mobile Forensics World Jun 02-05
Myrtle Beach, SC
http://www.techsec.com/html/MFC-2013-Spring.html
DFRWS 2013 Aug 04-07
Monterey, CA
http://dfrws.org/2013
Regional Computer Forensics Group GMU 2013 Aug 05-09
Fairfax, VA
http://www.rcfg.org

See Also

References