Research report

5 Dec 2016

The growing use of online and cloud services in the community means electronic evidence is moving beyond the physical jurisdiction of Australian law enforcement agencies. This paper looks at the legal and technical issues inherent in collecting electronic evidence from online and cloud services. The...

Research report

17 Sep 2014

With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information.

Foreword

The volume of digital forensic evidence is...

Research report

9 Dec 2013

Abstract

Cloud computing is a relatively recent term to describe computer resources available as a service accessible over a network, such as internally to a corporation, or externally available over the Internet; and cloud storage is the storage of electronic data on remote...

Journal article

14 Oct 2013

Abstract: Cloud storage is an emerging challenge to digital forensic examiners. The services are increasingly used by consumers, business, and government, and can potentially store large amounts of data. The retrieval of digital evidence from cloud storage services (particularly from offshore providers) can be a...

Transcript

13 Oct 2013

Abstract: With increasing popularity of smart mobile devices such as iOS devices, security and privacy concerns have emerged as a salient area of inquiry. A relatively under-studied area is anti-mobile forensics to prevent or inhibit forensic investigations. In this paper, we propose a "Concealment" technique...

Research report

8 Aug 2013

In the increasingly dynamic environment of mobile forensics, this paper provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple’s iOS, Google’s Android and RIM’s BlackBerry operating systems.

The paper identifies where each specific tool...

Research report

22 Feb 2011

Opportunities for criminals to engage in transnational activities have expanded with globalisation and advancements in information and communications technologies. This paper contributes to a better understanding of the threat landscape.

Cyber criminal activities will increasingly affect the financial security of online business. It is...

Research report

4 Nov 2010

Cloud computing is now firmly established in the information technology landscape and its security risks need to be mapped and addressed at this critical stage in its development.

Cloud computing can be defined as a pool of virtualised computing resources that allows users to...

Research report

26 Feb 2010

Politically exposed persons (PEPs) are individuals entrusted with prominent public functions, such as senior politicians and public servants and are potential targets for bribes due to their prominent positions in public life and access to government, supranational or aid funds. To combat money...

Research report

6 Jul 2009

The grooming of children for sexual purposes has been facilitated by online technologies, particularly social networking sites. This report describes the nature and extent of how new technologies are being exploited by offenders

and the legislative and non-legislative responses to combat this...

Items authored

17

Items published/produced

Associated content