If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
<br /> Digital<br /> The Quarterly Magazine for Digital Forensics Practitioners Issue 31 · May 2017<br /> WIN! an iPod Nano<br /> ForensicS<br /> / magazine<br /> VEHICLE<br /> FORENSICS<br /> Latest News, 360<br /> Book Reviews, IRQ<br /> & much more inside!<br /> PLUS!<br /> DDoS Mobile<br /> Data Destruction<br /> Machine Learning<br /> SMART Meters<br /> 31<br /> 9 772042 061004<br /> Issue 31 / £14.99 TR Media<br /> <br /> EDITORIAL<br /> T<br /> his issue we welcome a new contributor<br /> to the magazine. Using the Twitter handle<br /> @Cybersleuth, Jan Collie is a highly qualified<br /> practicing digital forensics investigator. I first met<br /> <a title="DFM31 - Online page 1" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=1"> Digital The Quarterly Magazine for Digital Fore</a> <a title="DFM31 - Online page 2" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=2"> </a> <a title="DFM31 - Online page 3" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=3"> EDITORIAL T </a> <a title="DFM31 - Online page 4" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=4"> </a> <a title="DFM31 - Online page 5" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=5"> 8 FEATURES 08 / Vehicle Forensics There is valu</a> <a title="DFM31 - Online page 6" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=6"> / NEWS NEWS NEWS / Can IoT Security Win On All</a> <a title="DFM31 - Online page 7" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=7"> Despite having no previous experience of cybe</a> <a title="DFM31 - Online page 8" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=8"> / LEAD FEATURE LEAD FEATURE CON OREN F E </a> <a title="DFM31 - Online page 9" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=9"> L k at mobile phone digital ooking </a> <a title="DFM31 - Online page 10" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=10"> / LEAD FEATURE LEAD FEATURE Aca mics hav</a> <a title="DFM31 - Online page 11" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=11"> / Event Data Recorders An Event Data Recorder or </a> <a title="DFM31 - Online page 12" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=12"> / LEAD FEATURE LEAD FEATURE simila r to t </a> <a title="DFM31 - Online page 13" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=13"> </a> <a title="DFM31 - Online page 14" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=14"> / FEATURE DDOS ATTACKS ON MOBILE DEVICES Ray L</a> <a title="DFM31 - Online page 15" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=15"> Figure 2. DRDoS Topology is that, in the DRDoS a</a> <a title="DFM31 - Online page 16" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=16"> / FEATURE / Expert Tip For detecting DoS/DDoS a</a> <a title="DFM31 - Online page 17" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=17"> / Top Fact Distributed Denial of Service (DDOS) i</a> <a title="DFM31 - Online page 18" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=18"> / FEATURE Figure 5. </a> <a title="DFM31 - Online page 19" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=19"> </a> <a title="DFM31 - Online page 20" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=20"> </a> <a title="DFM31 - Online page 21" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=21"> / LEGAL EDITORIAL LEGAL EDITORIAL Do stricter loc</a> <a title="DFM31 - Online page 22" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=22"> / LEGAL FEATURE THE RUSSIAN CRIMINAL CODE & A </a> <a title="DFM31 - Online page 23" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=23"> THE OVERALL RUSSIAN CRIMINAL CODE WAS ESTAB</a> <a title="DFM31 - Online page 24" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=24"> / LEGAL FEATURE IF THE ATTACKER DELETES,</a> <a title="DFM31 - Online page 25" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=25"> Note that the potential sentences do not inc</a> <a title="DFM31 - Online page 26" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=26"> / LEGAL EDITORIAL LEGAL NEWS A round-up of the la</a> <a title="DFM31 - Online page 27" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=27"> </a> <a title="DFM31 - Online page 28" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=28"> / FROM THE LAB TESTING DAMAGE SUSTAINABILITY O</a> <a title="DFM31 - Online page 29" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=29"> All the SD Cards before any damage has occurred </a> <a title="DFM31 - Online page 30" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=30"> / FROM THE LAB The SD Cards </a> <a title="DFM31 - Online page 31" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=31"> / Water Submersion The fourth test conducted was </a> <a title="DFM31 - Online page 32" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=32"> / FROM THE LAB be noted that the SanDisk SD c</a> <a title="DFM31 - Online page 33" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=33"> </a> <a title="DFM31 - Online page 34" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=34"> / INTERVIEW MEET THE PROFESSIONALS / DR JAN C</a> <a title="DFM31 - Online page 35" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=35"> What are your views on the industry standard tool</a> <a title="DFM31 - Online page 36" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=36"> / @CYBERSLEUTH THE HUMAN & PROFESSIONAL COST </a> <a title="DFM31 - Online page 37" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=37"> SLOPPY FORENSIC ANALYSIS CAN SHATTER LIVES:</a> <a title="DFM31 - Online page 38" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=38"> / @CYBERSLEUTH and signed off by someone more</a> <a title="DFM31 - Online page 39" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=39"> </a> <a title="DFM31 - Online page 40" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=40"> / ADVERTORIAL CYBER SECURITY, ACADEMIA AND INDUST</a> <a title="DFM31 - Online page 41" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=41"> 41</a> <a title="DFM31 - Online page 42" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=42"> / FEATURE DANGERS IN GNSS SPOOFING The valid</a> <a title="DFM31 - Online page 43" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=43"> Technical weaknesses in the GNSS Systems have</a> <a title="DFM31 - Online page 44" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=44"> / FEATURE / See Also Psiaki, M., &</a> <a title="DFM31 - Online page 45" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=45"> Jamming is also a serious design vulnerabili</a> <a title="DFM31 - Online page 46" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=46"> / FEATURE data. The e</a> <a title="DFM31 - Online page 47" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=47"> </a> <a title="DFM31 - Online page 48" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=48"> / FEATURE DATA DESTRUCTION TECHNIQUES IN WIND</a> <a title="DFM31 - Online page 49" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=49"> · physical · degaussing · logical destruction (Sa</a> <a title="DFM31 - Online page 50" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=50"> / FEATURE / Cipher.exe Windows provides a buil</a> <a title="DFM31 - Online page 51" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=51"> Software wiping tools come with some disadv</a> <a title="DFM31 - Online page 52" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=52"> / FEATURE Figure 1. D</a> <a title="DFM31 - Online page 53" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=53"> / Disable Windows Logging Windows events logs sto</a> <a title="DFM31 - Online page 54" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=54"> / COMPETITION COMPETITION / This issue we have</a> <a title="DFM31 - Online page 55" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=55"> </a> <a title="DFM31 - Online page 56" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=56"> / FEATURE MACHINE LEARNING: CYBERSECURITY'S NE</a> <a title="DFM31 - Online page 57" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=57"> Another of machine learnings' unique charact</a> <a title="DFM31 - Online page 58" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=58"> / FEATURE / EXPERT TIP There are many framework</a> <a title="DFM31 - Online page 59" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=59"> By modelling this data, a machine learning a</a> <a title="DFM31 - Online page 60" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=60"> / GET INVOLVED GET INVOLVED Calling all Book Revi</a> <a title="DFM31 - Online page 61" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=61"> </a> <a title="DFM31 - Online page 62" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=62"> / FEATURE PROTECTING UTILITIES FROM CYBER SECU</a> <a title="DFM31 - Online page 63" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=63"> / Can Regulations Help? Yes. Security requirement</a> <a title="DFM31 - Online page 64" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=64"> / FEATURE and protect confidentiality. Keys ca</a> <a title="DFM31 - Online page 65" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=65"> </a> <a title="DFM31 - Online page 66" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=66"> / FEATURE BITCOIN FORENSICS Saleh Al Himali & </a> <a title="DFM31 - Online page 67" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=67"> THE BITCOIN MODEL WORKS WELL FOR USERS WHO</a> <a title="DFM31 - Online page 68" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=68"> / FEATURE / Searching for Software Remnants I</a> <a title="DFM31 - Online page 69" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=69"> 1. A new machine/device is prepared with a </a> <a title="DFM31 - Online page 70" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=70"> / FEATURE THE KEY CONCLUS</a> <a title="DFM31 - Online page 71" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=71"> / COMING SOON COMING SOON… A round-up of featu</a> <a title="DFM31 - Online page 72" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=72"> / 360 36 Letters, emails, tweets, connections and</a> <a title="DFM31 - Online page 73" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=73"> / FACEBOOK At present we have a Facebook group, w</a> <a title="DFM31 - Online page 74" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=74"> DFM27_OFC_Cover - Online.indd 1 </a> <a title="DFM31 - Online page 75" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=75"> / book reviews BOOK REVIEWS THE DIGITAL RENAISSAN</a> <a title="DFM31 - Online page 76" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=76"> / book reviews E ver since the</a> <a title="DFM31 - Online page 77" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=77"> </a> <a title="DFM31 - Online page 78" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=78"> / IRQ IRQ The 7-Year Itch? B y </a> <a title="DFM31 - Online page 79" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=79"> </a> <a title="DFM31 - Online page 80" href="https://secure.viewer.zmags.com/publication/0f0c8329?page=80"> </a>