Difference between pages "DC3 Digital Forensics Challenge" and "User talk:Jn3Evd"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
 
Line 1: Line 1:
The '''DC3 Digital Forensics Challenge''' is an annual forensics contest sponsored by the [[Defense Cyber Crime Center]]. The winning team, which must consist of U.S. citizens, receives a free trip to the annual DoD Cyber Crime Conference.
+
Hi. Who are you, and why are you deleting links? [[User:Simsong|Simsong]] 22:07, 17 April 2007 (PDT)
 
+
:This user has deleted links to Paraben tools from the [[PDAs]] and [[Cell phones]] pages. Granted, these pages aren't paragons of excellence, but there was no comment as to why the links should be removed nor were they put onto a new page. [[User:Jessek|Jessek]] 03:57, 18 April 2007 (PDT)
== Participation ==
+
Participation in the contest is a good way for vendors to showcase their talents and for academics to teach computer forensics research. Some academics feel, however, that they are not getting much benefit from the the contest. They believe that the DoD should publish all of the submissions so that they can be independently evaluated. This opinion was most vocally stated by David C. Smith and Mickey Lasky from Georgetown University in August 2007. They gave a talk at the DEFCON conference titled "Cool stuff learned from competing in the DC3 digital forensic challenge" where they described their entries and the lack of feedback from the DC3 [http://video.google.com/videoplay?docid=-7884272596646742143&hl=en].
+
 
+
== History ==
+
 
+
=== 2008 ===
+
The 2008 challenge is now open. Packets were mailed starting 1 Mar 2008 and solutions are due before 1 Nov 2008. The winner will be announced on 1 Dec 2008 and will, as usual, receive a free trip to the 2009 DoD Cyber Crime Conference. The challenges this year included detecting  suspicious software, hash analysis, image analysis, partition recovery, signature analysis, file header reconstruction, password recovery, registry analysis, steganography, encryption, Skype analysis, foreign text identification and translation, MSN Live analysis, and image analysis.
+
 
+
=== 2007 ===
+
The challenge was held in 2007 again. The winners received a free trip to the 2008 DoD Cyber Crime Conference.
+
 
+
=== 2006 ===
+
The 2006 challenge was the first sponsored by the DC3. Entrants were asked to solve puzzles in Audio Steganography, Steganography using S-Tools, Password Cracking, Image Analysis: Real vs. CG, Data Carving: Linux LVM Interpretation, Data Acquisition: Boot a dd Image, Data Acquisition: Boot a Split dd Image, Media Recovery: Compact-disc, Media Recovery: Floppy Diskette, Keylog Cracking, and Metadata Extraction.
+
 
+
One hundred and forty teams requested challenge packets, but only 21 teams submitted entries. The winning team, announced on 15 Dec 2006, was [[AccessData]]. They won a free trip to the [[Defense Cyber Crime Center|DC3's]] annual [[Conferences|conference]] in St. Louis, MO in January 2007. They presented a complete solution at the conference.
+
 
+
Challenge submissions were broken down by academic, civilian, commercial, military, and government entrants. International teams from Australia, Canada, France, and India all requested packets, but were not eligible to win.
+
 
+
== External Links ==
+
 
+
* [http://www.dc3.mil/challenge/ Official web site]
+

Revision as of 06:57, 18 April 2007

Hi. Who are you, and why are you deleting links? Simsong 22:07, 17 April 2007 (PDT)

This user has deleted links to Paraben tools from the PDAs and Cell phones pages. Granted, these pages aren't paragons of excellence, but there was no comment as to why the links should be removed nor were they put onto a new page. Jessek 03:57, 18 April 2007 (PDT)