The search found 16 results in 0.275 seconds.
The growing use of online and cloud services in the community means electronic evidence is moving beyond the physical jurisdiction of Australian law enforcement agencies. This paper looks at the legal and technical issues inherent in collecting electronic evidence from online and cloud services. The...
With the volume of digital forensic evidence rapidly increasing, this paper proposes a data reduction and data mining framework that incorporates a process of reducing data volume by focusing on a subset of information.
The volume of digital forensic evidence is...
Abstract: Cloud storage is an emerging challenge to digital forensic examiners. The services are increasingly used by consumers, business, and government, and can potentially store large amounts of data. The retrieval of digital evidence from cloud storage services (particularly from offshore providers) can be a...
Abstract: With increasing popularity of smart mobile devices such as iOS devices, security and privacy concerns have emerged as a salient area of inquiry. A relatively under-studied area is anti-mobile forensics to prevent or inhibit forensic investigations. In this paper, we propose a "Concealment" technique...
In the increasingly dynamic environment of mobile forensics, this paper provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple’s iOS, Google’s Android and RIM’s BlackBerry operating systems.
The paper identifies where each specific tool...
Opportunities for criminals to engage in transnational activities have expanded with globalisation and advancements in information and communications technologies. This paper contributes to a better understanding of the threat landscape.
Cyber criminal activities will increasingly affect the financial security of online business. It is...
Cloud computing is now firmly established in the information technology landscape and its security risks need to be mapped and addressed at this critical stage in its development.
Cloud computing can be defined as a pool of virtualised computing resources that allows users to...
Politically exposed persons (PEPs) are individuals entrusted with prominent public functions, such as senior politicians and public servants and are potential targets for bribes due to their prominent positions in public life and access to government, supranational or aid funds. To combat money...
The grooming of children for sexual purposes has been facilitated by online technologies, particularly social networking sites. This report describes the nature and extent of how new technologies are being exploited by offenders
and the legislative and non-legislative responses to combat this growing...
This report outlines the non-legislative measures being undertaken by social networking sites and the financial services industry, working in collaboration with law enforcement agencies, to respond to the misuse of the internet for child sexual grooming.