SIP CALL FORENSIC ANALYSIS
by Jan Tilo Kirchhoff
‘It all started during my 2011 summer vacation. One evening my mobile started ringing but when I finally got to it and accepted the call there was no one on the line…’
In this article, Jan Kirchhoff presents the investigation he conducted in order to detect the source and reason of the mysterious calls.
CYBER AGENTS: HACKING EXTORTION CASE
by Eric Lakes
‘This case was real and very unique from start to finish. It was <>, not only due to the content of the case, but also because of the immediate challenges that the case presented and of course we like a good challenge’.
In this story Eric Lakes and Sergeant Randy, investigators at Cyber Agents do their best to prove their client innocent and to outwit his smart wife.
RECOVERING IE HISTORY USING PASCO
by Carlos Cajigas
‘Reconstructing and examining web browsing history is a task that is required during most forensic examinations’. In this article, Carlos Cajigas, presents reconstruction process in Linux Ubuntu 12.04 conducted with Paco – open source tool that you can use for free.
CAPTURING INSTANT MESSAGES WITH PACKET CAPTURE TECHNOLOGIES
by Nicholas Miter
‘Real-time forensic technologies, however, implicate several legal principals such as wire-tapping laws, waiver of privacy restrictions, and evidentiary rules not common with archived information’. Author discusses some of these principals and provides simple examples.
SECURITY TESTING TOOL OR CYBER WEAPON
by Kevin Coleman
In this article Kevin Coleman stresses the burning need to provide clear distinction between Security Testing Tool and Cyber Weapon. His surprising remarks clearly pertain to the problem of nomenclature in the current regulatory system.
Please keep in mind that comments are moderated and
rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.
You must be logged in to post a comment.