Difference between pages "Bibliography" and "Cell phones"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
(Tools)
 
Line 1: Line 1:
=Disk Disposal and Data Recovery=
+
'''Cell phones''' or '''mobile phones''' are an important target for [[forensic investigator]]s.
* [http://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf Disk Imaging: A Vital Step in Data Recovery], DeepSpar Data Recovery Systems, November 2006. An in depth look at the many issues that cause data loss / irretrievable data in the data recovery imaging process and how to overcome them.
+
* [http://www.actionfront.com/ts_whitepaper.asp Drive-Independent Data Recovery: The Current State-of-the-Art], ActionFront Data Recovery Labs, August 2005.
+
* [[Recovering Overwritten Data#The Gutmann Paper|Secure Deletion of Data from Magnetic and Solid-State Memory]], Peter Gutmann, Proceedings of the Sixth Usenix Security Symposium, 1996. [http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html]
+
* [http://www-03.ibm.com/financing/pdf/us/recovery/igf4-a032.pdf Hard Drive Disposal: The Overlooked Confidentiality Exposure], FInancial Perspectives, IBM White Paper, November 2003.
+
  
<bibtex>
+
== Technologies ==
@Article{garfinkel:remembrance,
+
  author =       "Simson Garfinkel and Abhi Shelat",
+
* [[CDMA]]
  author_a =       "Simson L. Garfinkel and Abhi Shelat",
+
* [[TDMA]]
  title =       "Remembrance of Data Passed",
+
* [[GSM]]
  journal =     "{IEEE} Security and Privacy Magazine",
+
* [[iDEN]]
  publisher =    "IEEE",
+
* [[EDGE]]
  year      =        "2002",
+
* [[GPRS]]
  month    = Jan,
+
* [[UMTS]]
  url="http://www.simson.net/clips/academic/2003.IEEE.DiskDriveForensics.pdf"
+
}
+
</bibtex>
+
  
=Evidence Gathering=
+
== Hardware ==
  
* [http://utdallas.edu/~sxs018540/index/docs/byteprints_itcc05.pdf Byteprints: A Tool to Gather Digital Evidence], Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan, Proceedings of the International Conference on Information Technology (ITCC 2005), Las Vegas, Nevada, USA, April 4 - 6, 2005
+
* [[RIM BlackBerry]]
 +
* [[T-Mobile Sidekick  ]]
 +
* [[SIM Cards]]
  
=Fake Information=
+
== Operating Systems ==
  
* [https://analysis.mitre.org/proceedings/Final_Papers_Files/84_Camera_Ready_Paper.pdf Automatic Detection of Fake File Systems], Neil C. Rowe, International Conference on Intelligence Analysis Methods and Tools, McLean, Virginia, May 2005.
+
* [[Microsoft PocketPC]]
 +
* [[Microsoft Windows Mobile]]
 +
* [[Palm]]
 +
* [[RIM BlackBerry]]
 +
* [[Symbian]]
 +
* [[Linux]]
  
=Feature Extraction and Data Fusion=
+
== Forensics ==  
Computer Location Determination Through Geoparsing and Geocoding of
+
Extracted Features
+
http://www2.chadsteel.com:8080/Publications/drive_location2.doc
+
<bibtex>
+
@inproceedings{garfinkel:cda,
+
  title="Forensic feature extraction and cross-drive analysis",
+
  author="Simson Garfinkel",
+
  booktitle={Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS)},
+
  address = "Lafayette, Indiana",
+
  journal="Digital Investigation",
+
  year=2006,
+
  month=Aug,
+
  url="http://www.dfrws.org/2006/proceedings/10-Garfinkel.pdf",
+
  location="Lafayette, Indiana"
+
}
+
</bibtex>
+
  
=Text Mining=
+
'''Procedures'''
  
'''Computer Forensic Text Analysis with Open Source Software,''' Christian Johansson, Masters Thesis, Blekinge Tekniska Hogskola, June 2003  http://www.fukt.bth.se/~uncle/papers/master/thesis.pdf
+
* [[Cell Phone Forensics]]
 +
* [[SIM Card Forensics]]
 +
* [[External Memory Card Forensics]]
  
=Signed Evidence=
+
== Tools ==
<bibtex>
+
@article{duerr-2004,
+
  title="Information Assurance Applied to Authentication of Digital Evidence",
+
  author="Thomas E. Duerr and Nicholas D. Beser and Gregory P. Staisiunas",
+
  year=2004,
+
  journal="Forensic Science Communications",
+
  volume=6,
+
  number=4,
+
  url="http://www.fbi.gov/hq/lab/fsc/backissu/oct2004/research/2004_10_research01.htm"
+
}
+
</bibtex>
+
  
 +
'''Flashers'''
 +
* [[UFS Tornado]]
  
<bibtex>
+
'''Hardware'''
@article{OppligerR03,
+
* [[ Azimuth RadioProof™ Enclosures]]
  author    = {Rolf Oppliger and Ruedi Rytz},
+
* [[Radio Frequency (RF) Jammers]]
  title    = {Digital Evidence: Dream and Reality},
+
* [[Network Security Solutions Secure Tents]]
  journal  = {IEEE Security {\&} Privacy},
+
* [[Network Security Solutions Seizure Bags for Cell Phones/PDAs/Laptops]]
  volume    = {1},
+
* [http://www.paraben-forensics.com/catalog/product_info.php?cPath=26&products_id=343 Paraben Device Seizure Toolbox]
  number    = {5},
+
* [http://www.paraben-forensics.com/catalog/product_info.php?cPath=26&products_id=372 Paraben Handheld First Responder Kit]
  year      = {2003},
+
* [[Paraben StrongHold Bag]]
  pages    = {44-48},
+
  url      = {http://doi.ieeecomputersociety.org/10.1109/MSECP.2003.1236234},
+
  abstract="Digital evidence is inherently weak. New evidence-gathering technologies-digital black boxes-must be developed and deployed to support investigations of irreproducible events such as digitally signing a document."
+
}
+
</bibtex>
+
  
=Theory=
+
'''Software'''
'''A Hypothesis-Based Approach to Digital Forensic Investigations,''' Brian D. Carrier, Ph.D. Dissertation
+
* [[BitPIM]]
Purdue University, May 2006 https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/archive/2006-06.pdf
+
* [[Cell Phone Analyzer]]
 
+
* [[DataPilot Secure View]]
=Other Papers=
+
* [[FloAt's Mobile Agent]]
 
+
* [[ForensicMobile]]
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782 A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?], Peter P. Swire, Moritz College of Law of the Ohio State University, Journal on Telecommunications and High Technology Law, Vol. 2, 2004.
+
* [[ForensicSIM]]
 
+
* [[Guidance Software Neutrino]]
[[Category:Bibliographies]]
+
* [[iDEN Companion Pro]]
 +
* [[iDEN Media Downloader]]
 +
* [[iDEN Phonebook Manager]]
 +
* [[LogiCube CellDEK]]
 +
* [[MicroSystemation .XRY]]
 +
* [[MOBILedit!]]
 +
* [[Oxygen PM II]]
 +
* [[Paraben Device Seizure]]
 +
* [[Paraben SIM Seizure]]
 +
* [[Pandora's Box]]
 +
* [[Quantaq USIMdetective]]
 +
* [[Quantaq USIMcommander]]
 +
* [[Quantaq USIMdetective]]
 +
* [[Quantaq USIMexplorer]]
 +
* [[Quantaq USIMprofiler]]
 +
* [[Quantaq USIMregistrar]]
 +
* [[TULP2G]]

Revision as of 21:17, 11 May 2007

Cell phones or mobile phones are an important target for forensic investigators.

Technologies

Hardware

Operating Systems

Forensics

Procedures

Tools

Flashers

Hardware

Software