Checking Masts – Cell Site Analysis (CSA)

First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Since linking with Jamie Morris at Forensic Focus to create a Mobile Forensics Discussion Forumto bring mobile telephone evidence to a wider audience, I have had several

Recording Telephone Calls

First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com A question that often gets asked is “Can I record a telephone call?” and the answer to that is that you can (according to publicly available material),

Mobile Phone and GPS Forensics – Some Thoughts

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Mobile telephones are the predominate wireless telecommunications device throughout the world and most certainly in the UK they predominate other technologies, where ownership has reached well over

Malicious Phone Call Legislation in the UK

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com It is being noted that there is an exponential growth in harassing and intimidating calls from financial companies, card companies and from outsource debt collection firms chasing

SonyEricsson Hidden Evidence

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com I have discovered that it is possible when manually examining some SonyEricssons (such as “K” range etc) that after a user has deleted the Last Number Dialled

TomTom GPS Device Forensics

First published January 2009 Written by Ben LeMere (blemere@gpsforensics.org) & Andy Sayers (asayers@gpsforensics.org) For more information visit GPSForensics.org Introduction: The sales of portable navigation devices are at an all time high. Last year, more than forty million portable GPS devices

Passive Network Security Analysis with NetworkMiner

First published January 2009 by Erik Hjelmvik networkminer.sourceforge.net It is disturbing how often networks are not properly documented in terms of IP plans, network segmentations and network security. Having a good view of the network is essential when performing a

A Discussion of Virtual Machines Related to Forensics Analysis

First published November 2008 by Brett Shavers (PDF version here) The Virtual Machine (VM)Description of the Virtual Machine The Virtual Machine Concept in Brief Virtual machines are not new and have been in use for well over a half century.

Email Evidence – Now You See it, Now You Don’t!

First published October 2008 By Sandy Boucher and Barry Kuang, Intelysis Corp. Background With the ever increasing role of computers and electronic communications in both our business and personal lives, emails have taken on a key evidentiary role in many

Forensic Analysis of the Microsoft Windows Vista Recycle Bin

First published May 2008 By Mitchell Machor MMachor@gmail.com 1/22/2008 (click here for a PDF version of this paper) – 1 – Introduction Contrary to due belief, when a file is deleted on a Microsoft operating system, it still exists on

Linux ‘dd’ basics

First published March 2008 Linux dd can be a powerful and flexible tool to have in your box.You will find it installed by default on the majority of Linux distributions available today and it can be used for a multitude

The International Society of Forensic Computer Examiners (ISFCE)

by Joleyn Smithing, ISFCE The International Society of Forensic Computer Examiners (ISFCE)is dedicated to the advancement of the science of forensic computer examinations. Established in 2002, the ISFCE began as a result of the efforts of Mr. John Mellon. A

Looking Forward To A Career In Digital Forensics

First published January 2008 by James Hooker I am rapidly approaching my final year of University, studying for a Forensic Computing degree, and like all students across the globe on a similar course, I am on a mission to find

Potential Impacts of Windows Vista on Digital Investigations

First published December 2007 by Christopher Hargreaves and Howard Chivers Paper received 30th April, 2007. C.J.Hargreaves, Cranfield University, Defence Academy of the United Kingdom, Shrivenham, SN6 8SW (+44 (0)1793 785753; e-mail: c.j.hargreaves@cranfield.ac.uk).H.Chivers, Cranfield University, Defence Academy of the United Kingdom,