Winter/Spring 2013

View the Digital Edition

Continuing Education
By Rebecca Waters
In answer to the need for free education without included travel time and costs, The Evidence Conference, launched last year by DFI News and Forensic Magazine, will host a webinar series.

Starting A Career in Digital Forensics: Part 1
By John J. Barbara
A question often asked is, “What education and training is necessary to work in digital forensics?” First, an individual has to make a choice of career pathways, namely do they wish to work in the public sector or in the private sector.

Incorporating Extrinsic Evidence into the Digital Forensics Investigation
By Sean L. Harrington
Extrinsic evidence can be a means to helping the examiner refine or interpret what was found (or not found) on the media, the subject of the investigation.

Detecting Source Code Re-Use through a Binary Analysis Hybrid Approach
By Daniel Cabezas and Bram Mooij
We present a novel hybrid approach to investigating source code infringement by merging common plain-text and binary techniques whilst introducing cryptographic comparison analysis techniques.

Hardware-Assisted Advanced Forensics and Cyber Threat Detection

By Dr. C Andras Moritz, Kristopher Carver, and Jeff Gummeson
A look at some necessary core capabilities for overcoming data collection obstacles in digital investigations.

6 Persistent Challenges with Smartphone Forensics
By Ronen Engler and Christa M. Miller
As smartphones evolve, so will their persistent forensic challenges. Analysis skills like data carving, programming that can add functionality to commercial tools, and labor-intensive techniques such as JTAG, chip-off, and flasher box procedures will continue to be necessary—as will the tools that can support these efforts.

Social Media and the Changing Role of Investigators 
By Benjamin Wright
Investigative methods when collecting evidence from social media vary substantially from traditional digital forensic techniques creating new legal and procedural challenges.

Cyber Investigations at the DHS
By Tim Studt
The Department of Homeland Security's investigations into child endangerment concentrate on electronic criminal activities.