Proceedings of the 5 Australian Digital Forensics Conference

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of the 5 Australian Digital Forensics Conference Proceedings of The 5th Australian Digital Forensics Conference 3rd December 2007 Edith Cowan University Mount Lawley Campus Published By School of Computer and Information Science Edith Cowan University Perth, Western Australia Edited by Dr. Craig Valli and Dr. Andrew Woodward School of Computer and Information Science Edith Cowan University Perth, Western Australia Copyright 2007, All Rights Reserved ISBN 0-7298-0646-4 Table of Contents 1. Anti-Forensics and the Digital Investigator.............................................................................................. 1 2. An approach in identifying and tracing back spoofed IP packets to their sources ................................... 8 3. The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics..................... 22 4. An overview and examination of digital PDA devices under forensics toolkits .................................... 34 5. Profiling Through a Digital Mobile Device............................................................................................ 52 6. Forensic Analysis Avoidance Techniques of Malware .......................................................................... 59 7. ID Theft: A Computer Forensics’ Investigation Framework.................................................................. 67 8. Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques ......................... 79 9. Multi-Step Scenario Matching Based on Unification............................................................................. 88 10. Steganalysis in Computer Forensics....................................................................................................... 98 11. Managing Digital Forensic Knowledge An Applied Approach ........................................................... 109 12. ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence.................... 119 13. An examination of the Asus WL-HDD 2.5 as a Nepenthes malware collector.................................... 128 14. A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response................................. 136 15. Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics............................................................................................................................................... 143 16. Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment ...... 154 17. Can SDV Technology be Utilised in a Smartphone to Prevent Forensic Analysis?............................. 164 18. A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept.................................................................................................................................... 179 19. Mood 300 IPTV decoder forensics....................................................................................................... 185 20. A Methodology for the Forensic Acquisition of the TomTom One Satellite Navigation System – A Research in Progress............................................................................................................................. 195 21. BLOGS: ANTI-FORENSICS and COUNTER ANTI-FORENSICS................................................... 199 22. An Overview of ADSL Homed Nepenthes Honeypots In Western Australia...................................... 204 23. Tracing USB Device artefacts on Windows XP operating system for forensic purpose...................... 210 24. Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks 219 Conference Foreword This year has seen the conference grow in size and magnitude yet again. There are several definite strands of established research and interest within the subject of computer based forensics these include disk sanitisation, honeypots and discovery techniques. We are seeing emergent papers in the areas of mobile device forensics including PDAs, mobile phones and GPS devices. The papers authors are drawn from a cross section of the forensics community from practitioners to academics. All papers were subject to a double blind peer review process and of the 42 papers submitted only 24 were accepted for final publication. Conferences such as these are simply not possible without willing volunteers who follow through with the commitment they have initially made and I would like to take this opportunity to thank the conference committee for their tireless efforts in this regard. These efforts have included but not been limited to the reviewing and editing of the conference papers, helping with the planning, organisation and execution of the conferences. To our sponsors also a vote of thanks for both the financial and moral support provided to the conference. Finally, to the administrative and technical staff of the School of Computer and Information Science for their contributions to the running of the conference. Dr Craig Valli Conference Chair Conference Organising Committee Dr Craig Valli Conference Chair & Co – Editor Edith Cowan University Dr Andrew Woodward Conference Editor Edith Cowan University Chris Bolan Committee Member Edith Cowan University Dr Trish Williams Committee Member Edith Cowan University Professor Bill Hutchinson Committee Member Edith Cowan University Lisa McCormack Committee Member Edith Cowan University Rebecca Treloar-Cook Committee Member Edith Cowan University Sponsors Secure Systems Best Paper Award Cengage Best Presentation Award Research Network for Secure Australia Proceedings of The 5th Australian Digital Forensics Conference Anti-Forensics and the Digital Investigator Gary C. Kessler Champlain College Burlington, VT, USA [email protected] Edith Cowan University Mount Lawley, WA, Australia Abstract Viewed generically, anti-forensics (AF) is that set of tactics and measures taken by someone who wants to thwart the digital investigation process. This paper describes some of the many AF tools and methods, under the broad classifications of data hiding, artefact wiping, trail obfuscation, and attacks on the forensics tools themselves. The concept of AF is neither new nor solely intended to be used by the criminal class; it also has legitimate use by those who wish to protect their privacy. This paper also introduces the concept of time-sensitive anti- forensics, noting that AF procedures might be employed for the sole purpose of delaying rather than totally preventing the discovery of digital information. Keywords Anti-forensics, data hiding, artefact wiping, trail obfuscation, attacks on computer forensics tools, privacy INTRODUCING ANTI-FORENSICS The term anti-forensics (AF) has recently entered into the vernacular of digital investigators. Although conceptually not new, it is instructive to observe that there is no clear industry definition (Harris, 2006). Rogers (2006), a practicing digital forensics educator and investigator, defines AF as "attempts to negatively affect the existence, amount, and/or quality of evidence from a crime scene, or make the examination of evidence difficult or impossible to conduct." Liu and Brown (2006), practicing creators of AF methods and tools, offer a slightly darker definition: "application of the scientific method to digital media in order to invalidate factual information for judicial review." The term forensics is significant and quite specific -- whatever AF is pertains to the scientific analysis of evidence for court. Anti-forensics, then, is that set of tools, methods, and processes that hinder such analysis. It is difficult to think of any legitimate uses of AF processes and tools. Indeed, most -- if not all -- digital investigators find AF to be the bane of their existence and only used by someone who has something to hide. But AF might also be employed by the person who just wants to be left alone. An early text about computer forensics devoted significant time to the examination process as well as ways to thwart that process, all in the name of privacy (Caloyannides, 2001). One can argue that it is a fine line between protecting one's privacy and preventing a court-sanctioned search, but that line has existed for centuries -- only with digital devices does a letter that the writer burned well in the past continue to hang around on a hard drive or backup tape. And there are those that will argue that AF techniques can protect a Good Person from a Bad Government. Of course, those same tools can block a Good Government from investigating a Bad Person and that, of course, is the rub. Laws, traditions, mores, and culture affect a society's view of privacy. Many nations purport to value people's privacy on the one hand but also recognize that the "right to privacy" -- should that right exist in a particular jurisdiction -- is not absolute. CATEGORIES OF ANTI-FORENSICS METHODS Much of the recent discussion in articles, conferences, and blogs seems to suggest that AF tools and methods have appeared suddenly (Harris, 2006; Liu & Brown, 2006; Rogers, 2006). While this is certainly true in some cases, it is also important to note that many forms of AF -- although not created to hinder the detection of evidence, per se -- have been around for quite some time. Page 1 Proceedings of The 5th Australian Digital Forensics Conference Rogers (2006) suggests that there are four basic categories of AF: data hiding, artefact wiping, trail obfuscation, and
Recommended publications
  • Google Android
    Google Android 2008/3/10 NemusTech, Inc. Lee Seung Min 네무스텍㈜ Agenda Introduction Mobile Platform Overview Background : Current Linux Mobile Platform What is Android? Features Architecture Technical Detail Android SDK Porting Android to Real Target Future of Android A conceptual model for mobile software Software Stack Kernel the core of the SW (HW drivers, memory, filesystem, and process management) Middleware The set of peripheral software libraries (messaging and communication engines, WAP renders, codecs, etc) Application Execution Environment An application manager and set APIs UI framework A set of graphic components and an interaction framework Application Suite The set of core handset application ( IDLE screen, dialer, menu screen, contacts, calendar, etc) Mobile Platforms Feature Phone Vendor Platform : Mocha, PDK, WAVE, WISE, KX, etc...... Carrier Platform : SKTelecom TPAK, NTT i-Mode (WAP), Java, WIPI, BREW, etc…… 3rd Party Solution : TAT Cascade, Qualcomm uiOne Smart Phone MicroSoft Windows Mobile Nokia : Symbian, Series 60 Apple, iPhone – OSX 10.5 Leopard Linux Customers & Licensees Not all customers or licensees are shown Source:vendor data Smartphone OS Market Share by Region Smartphone OS market share by region, 2006 Source : Canalys Current Linux Mobile Platforms LiMo Foundation https://www.limofoundation.org/sf/sfmain/do/home TrollTech Qtopia GreenPhone Acquired by Nokia OpenMoko : GNU/Linux based software development platform http://www.openmoko.org , http://www.openmoko.com Linux
    [Show full text]
  • Steganography- a Data Hiding Technique
    International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel.
    [Show full text]
  • Steganography & Steganalysis
    June 6, 2003 Steganography & Steganalysis SpyHunter www.spy-hunter.com [email protected] 1 AgendaAgenda X Steganography – What is Steganography? – History – Steganography today – Steganography tools X Steganalysis – What is Steganalysis? – Identification of Steganographic files – Cracking Steganographic files – What’s in the future? 2 Steganography 3 SteganographySteganography -- DefinitionDefinition X Steganography – from the Greek word steganos meaning “covered” – and the Greek word graphie meaning “writing” X Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination X Anyone else viewing the message will fail to know it contains hidden/encrypted data 4 SteganographySteganography -- HistoryHistory X Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank. X Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. 5 SteganographySteganography X Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated. X Invisible Ink is also a form of steganography 6 SteganographySteganography X The U.S. government is concerned about the use of Steganography. X Common uses in include the disguising of corporate espionage. X It’s possible that terrorist cells may use it to secretly communicate information X It’s also a very good Anti-forensics mechanism to mitigate the effectiveness of a forensics investigation 7 SteganographySteganography Terror groups hide behind Web encryption By Jack Kelley, USA TODAY AP WASHINGTON — Hidden in the X-rated pictures on several pornographic Web sites and the posted comments on sports chat rooms may lie the encrypted blueprints of the next terrorist attack against the United States or its allies.
    [Show full text]
  • PDA Users Guide
    130 Family of Seismic Recorders PFC_130 Users Guide (Version 1.2.4.40) Refraction Technology PFC_130 Users Guide 130-PFC-001-K December 18, 2006 Refraction Technology, Inc. 1600 Tenth Street, Suite A Plano, Texas 75074 USA Voice: 214-440-1265 Fax: 972-578-0045 EMAIL: [email protected] FTP: ftp.reftek.com WWW: http://reftek.com ©Copyright 2003-2006 Refraction Technology, Inc. All rights reserved. Printed in USA ii 130-PFC-001-K PFC_130 Users Guide Preface All references to a PDA in this guide refer to any type of device that is compatible with the Palm™ operating system (OS) with RS232 (i.e., Palm IIIe™, Palm IIIxe™, Palm V™, Palm VII™, Palm M105™, Handspring Visor™, TRG Pro™, etc.) REF TEK Support and update notifications As a valued user of REF TEK equipment we would like to provide the best support possible by keeping you up to date with our product updates. If you would like to be notified of any REF TEK product updates please spend a couple of minutes to register with the reftek customer support team. To Register, either send an email to [email protected] giving us your name and REF TEK product you currently have or fill out our online registration form at www.reftek.com/registration Once we register your contact we will only send necessary notifications via email. The same notifications will be shown on our website’s www.reftek.com/support page Thanks, Your REF TEK support team PFC_130 Users Guide 130-PFC-001-K iii Revision History Rev Date Reason for change Affected Pages 0.1 1/12/02 Initial release A 10/04/02 Release of 1.0 130
    [Show full text]
  • Steganography: Forensic, Security, and Legal Issues
    Journal of Digital Forensics, Security and Law Volume 3 Number 2 Article 2 2008 Steganography: Forensic, Security, and Legal Issues Merrill Warkentin Mississippi State University Ernst Bekkering Northeastern State University Mark B. Schmidt St. Cloud State University Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Warkentin, Merrill; Bekkering, Ernst; and Schmidt, Mark B. (2008) "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law: Vol. 3 : No. 2 , Article 2. DOI: https://doi.org/10.15394/jdfsl.2008.1039 Available at: https://commons.erau.edu/jdfsl/vol3/iss2/2 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Journal of Digital Forensics, Security and Law, Vol. 3(2) Steganography: Forensic, Security, and Legal Issues Merrill Warkentin Mississippi State University [email protected] Ernst Bekkering Northeastern State University [email protected] Mark B. Schmidt St. Cloud State University [email protected] ABSTRACT Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit.
    [Show full text]
  • Die Meilensteine Der Computer-, Elek
    Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden.
    [Show full text]
  • 1 Star Trac Pro Partner – Training Partner Operations Manual Table of Contents I. Introduction II. Selecting Workout Partner
    Star Trac Pro Partner – Training Partner Operations Manual Table of Contents I. Introduction II. Selecting Workout Partner a. Creating a Custom Workout III. Creating a Pro or Elite Treadmill Custom Workout a. Naming Your Workout b. Entering Weight/Time c. Designing Your Incline Profile d. Designing Your Speed Profile IV. Creating a Pro Bike Custom Workout a. Naming Your Workout b. Entering Weight/Time c. Designing Your Resistance Profile V. Accessing a Custom Workout VI. Beaming a Custom Workout a. Beaming to a Pro or Elite Treadmill b. Beaming to a Pro Bike c. Beaming to a PDA Device VII. Editing a Custom Workout VIII. Deleting a Custom Workout IX. Reviewing a Completed Workout X. Collecting an Existing Workout from a Pro or Elite Treadmill or Pro Bike XI. Appendix A: List of PDAs Compatible with Pro Partner 1 I. Introduction Thank you for choosing Star Trac for your fitness needs. Are you ready to take your clients’ workout to a new level? The Star Trac Pro Partner software program will make your Palm-powered PDA (Personal Digital Assistant) an integral part of your personal training experience when using a Star Trac Pro or Elite Treadmill or Pro Bike. Personalized workouts and tracking client workout data are now all in the palm of your hand! In this manual you will learn how to use the Training Partner application to design custom workouts and track workout information for your clients for a more personal approach. It’s simple! Just follow the steps in this user manual and you’re one step closer to making your personal training more efficient.
    [Show full text]
  • Palm Covers4
    ANNUAL REPORT 2002 < leadership, strength and commitment > the palm economy Through the success of our Palm OS® platform, Palm has created a large ecosystem of companies that create and sell a variety of software applications, peripherals and accessories for Palm OS based devices. This thriving community offers a wealth of solutions for consumer, professional and enterprise users and remains one of the key components in our value proposition to our present and future customers. < 225,000+ developers* and 14,000+ applications* > *As of 7/2002 Peripherals and expansion cards sold separately. As Palm started FY ’02, we faced three fundamental • We continued to enhance pro forma operating results challenges: throughout the year with two consecutive quarters of gross margini improvements and four consecutive • Competing business strategies: While we had begun quarters of operating expenseii improvements. Pro forma the process of licensing our Palm OS software to hand- gross margini grew from a low of 20% in Q2 FY ‘02 to held manufacturers to expand the Palm Economy, the 35% in Q4 FY ‘02, while pro forma operating expensesii perceived lack of independence and the opportunistic have declined by 36% from the end of Q4 FY ’01 to nature of our licensing activities limited the potential of the end of Q4 FY ’02. both our Palm Solutions business and our Palm OS software business and blurred the focus and clarity of We made the strategic decision to commit ourselves fully purpose of each; to the operating system software licensing business. This decision was anchored in the fundamental belief that • Operational problems: We needed to improve supply handheld devices will become part of our daily life, much chain management and product development.
    [Show full text]
  • List of Palm OS Versions Included on Palm Handhelds, and Possible Upgrades
    List of Palm OS versions included on Palm handhelds, and possible upgrades www.palm.com < Home < Support < Knowledge Library Article ID: 10714 List of Palm OS versions included on Palm handhelds, and possible upgrades Palm OS® is the operating system that drives Palm devices. In some cases, it may be possible to update your device with ROM upgrades or patches. Find your device below to see what's available for you: Centro Treo LifeDrive Tungsten, T|X Zire, Z22 Palm (older) Handspring Visor Questions & Answers about Palm OS upgrades Palm Centro™ smartphone Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Centro (AT&T) 5.4.9 No N/A No Centro (Sprint) 5.4.9 No N/A No Treo™ 755p smartphone Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Treo 755p (Sprint) 5.4.9 No N/A No Treo™ 700p smartphones Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Treo 700p (Sprint) Garnet Yes N/A No 5.4.9 Treo 700p (Verizon) Garnet No N/A No 5.4.9 Treo™ 680 smartphones Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Treo 680 (AT&T) Garnet Yes 5.4.9 No 5.4.9 Treo 680 (Rogers) Garnet No N/A No 5.4.9 Treo 680 (Unlocked) Garnet No N/A No 5.4.9 Treo™ 650 smartphones Device Palm OS
    [Show full text]
  • Linux on Cellphones
    Linux on cellphones Pavel Machek Phones are everywhere ● everyone has their cellphone ● and carries it whereever they go ● cellphones are not just phones any more ● they browse web ● can read mail ● play mp3s and videos ● play radio ● they show maps, and you can use them for navigation Phones are sensitive ● They contain your contacts ● ...your passwords ● ...your emails ● ...can eavesdrop on you ● ...can steal your money and transfer them to attacker ● Backups are important because they break down ● non-smart phones do not have adequate ways to backup more than contacts Phones are working against their owner ● Cellphone operators have „interesting“ requirements before they'll sell a cellphone ● Branded phones are actively evil here ● right button takes you right into provider's portal, and you pay for it ● without confirmation ● without chance to change that ● branding is non-removable, so you are stuck with looking at red wallpaper ● you can't use it with other operator ● MMS / push to talk are designed to be expensive ● Voice-over-IP is a big no-no for a phone Phones are working against their owner ● You can only transfer pictures out of a phone using MMS ● You can only download applications using GPRS ● You can't transfer pictures/apps/songs between phones ● Have to confirm actions even of your own apps Phones are limited ● (but maybe that's a good thing?) ● Java applications work everywhere ● but they can't do interresting stuff ● usually can't access microphone, camera ● can't go background ● can't interact with one another ● Symbian
    [Show full text]
  • Statistical Pattern Recognition for Audio Forensics -- Empirical
    Statistical Pattern Recognition for Audio Forensics { Empirical Investigations on the Application Scenarios Audio Steganalysis and Microphone Forensics Dissertation zur Erlangung des akademischen Grades Doktoringenieur (Dr.-Ing.) angenommen durch die Fakult¨atf¨urInformatik der Otto-von-Guericke-Universit¨atMagdeburg von: Dipl.-Inform. Christian Kr¨atzer geboren am 12. Dezember 1978 in Halberstadt Gutachter: Prof. Dr. Jana Dittmann, Otto-von-Guericke Universit¨atMagdeburg, Magdeburg, Germany Prof. Dr. Stefan Katzenbeisser, Technische Universit¨atDarmstadt, Darmstadt, Germany Prof. Dr. Scott A. Craver, Binghamton University, Binghamton, NY, United States of America Magdeburg, Germany 23. Mai 2013 Abstract Media forensics is a quickly growing research field struggling to gain the same acceptance as traditional forensic investigation methods. Media forensics tasks such as proving image manipulations on digital images or audio manipulations on digital sound files are as relevant today as they were for their analogue counterparts some decades ago. The difference is that tools like Photoshop now allow a large number of people to manipulate digital media objects with a processing speed far beyond anything imaginable in times when image, audio or video manipulation of analogue media was a hardware- and labour-intensive task requiring skill and experience. Currently, there exists a large number of research prototypes but only a small number of accepted tools that are capable of answering specific questions regularly arising in court cases, such as the origin (source authenticity) of an image or recording, or the integrity of a media file. The reason for this discrepancy between the number of research prototypes and the number of solutions accepted in court has to be sought in the very nature of most judicial systems: Judges have to distinguish between valid bases for evidence and expert testimonies on the one hand, and `junk science' on the other hand.
    [Show full text]
  • Mobile Phone Programming and Its Application to Wireless Networking
    Mobile Phone Programming Mobile Phone Programming and its Application to Wireless Networking Edited by Frank H.P. Fitzek Aalborg University Denmark and Frank Reichert Agder University College Norway A C.I.P. Catalogue record for this book is available from the Library of Congress. ISBN 978-1-4020-5968-1 (HB) ISBN 978-1-4020-5969-8 (e-book) Published by Springer, P.O. Box 17, 3300 AA Dordrecht, The Netherlands. www.springer.com Printed on acid-free paper © 2007 Springer No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. To Sterica and Lilith. — Frank H.P. Fitzek I dedicate this book to Tim (WoW Level 70, mighty Undead Warrior), Max (Wow Level 70, fearless Tauren Hunter), and Aida (Reality Level 80++, loving Human Wife and Mother) — Frank Reichert (Level 64) Foreword Saila Laitinen Nokia The technology evolution has been once and for all beyond comparison during the past decade or two. Any of us can nowadays do numerous things with numerous devices to help in everyday life. This applies not least to mobile phones. If we compare the feature set of a mobile phone model in 1995 with the latest smartphone models the most visible difference is of course in the user interface, the mp3 player, integrated camera, and the access to the mobile Internet.
    [Show full text]