News Archives
Preserving Date and Timestamps for Incident Handling in Android Operating Systems (In Press)
January 8, 2014 · Publications
Summary: Present-day smartphones act as mobile offices, entertainment hubs, and social tools, all packed into one compact device. A smartphone’s processing and data storage capability are comparable to a typical personal computer or laptop of the last decade. Important information commonly found in most smart phones include call logs, contacts lists, text messages, emails, photos,
Detecting Counterfeit Currency and Identifying Its Source
January 29, 2013 · Publications
Summary: Counterfeit currency varies from a low-quality color scanner/printer-based notes to high-quality counterfeits whose production is sponsored by hostile states. Due to their harmful effect on the economy, detecting counterfeit currency notes is a task of national importance. However, automated approaches for counterfeit currency detection are practical only for low-quality counterfeits; manual examination is required
Willing, Able, and Unwanted: High School Girls’ Potential Selves in Computing
January 1, 2013 · Publications
Summary: The shortage of women in science, technology, engineering, and mathematics (STEM) is well-documented. Many efforts address women’s low representation in fields such as computing target high school girls in an effort to solidify their commitment to these fields before they enter college and create computing “potential selves.” This paper describes one such effort in
Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model
January 1, 2013 · Publications
Summary: The digital forensic process as traditionally laid out is very time intensive – it begins with the collection, duplication and authentication of every piece of digital media prior to examination. Digital triage, a process that takes place prior to this standard methodology, can be used to speed up the process and provide valuable intelligence
Social Media Investigation for Law Enforcement
November 30, 2012 · Publications
Summary: Social media is becoming an increasingly important—and controversial—investigative source for law enforcement. Social Media Investigation for Law Enforcement provides an overview of the current state of digital forensic investigation of Facebook and other social media networks and the state of the law, touches on hacktivism, and discusses the implications for privacy and other controversial areas. The
Research Toward a Partially-automated, and Crime Specific Digital Triage Process Model
March 1, 2012 · Publications
Summary: The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories. The time it takes