If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
<br /> Digital<br /> The Quarterly Magazine for Digital Forensics Practitioners<br /> ForensicS<br /> / magazine<br /> INSIDE<br /> INSIDE<br /> / Set up your own<br /> Set up your own<br /> Digital Forensic Lab<br /> Digital Forensic Lab<br /> / Proactive Digital<br /> Forensics<br /> Forensics<br /> / Cyber Chat,<br /> Deciphered!<br /> Deciphered!<br /> / Dissecting Malicious<br /> Software<br /> READING BETWEEN THE LINES<br /> SPAM BEWARE!<br /> Dr Tim Watson shows us how to perform<br /> forensic analysis on email headers<br /> 02<br /> 061103<br /> 9 772042 061103<br /> Issue 3 / £11.99 TR Media<br /> Competition!<br /> Win 3 brand new<br /> books from Syngress<br /> ISSUE 03<br /> 1 MAY 2010<br /> / REGULARS / PRODUCT REVIEW / Book Reviews / WRITERS<br /> LEGAL NEWS, 360, OUR VERDICT ON KATANA Forensic LINGUISTICS BUDDI<a title="DFM03 - Online page 1" href="https://secure.viewer.zmags.com/publication/72f19aac?page=1"> Digital The Quarterly Magazine for Digital Fore</a> <a title="DFM03 - Online page 2" href="https://secure.viewer.zmags.com/publication/72f19aac?page=2"> FORENSICS TRAINING http://computer-forensics.san</a> <a title="DFM03 - Online page 3" href="https://secure.viewer.zmags.com/publication/72f19aac?page=3">EDITORIAL W </a> <a title="DFM03 - Online page 4" href="https://secure.viewer.zmags.com/publication/72f19aac?page=4"> Reviewing the latest sports highlights </a> <a title="DFM03 - Online page 5" href="https://secure.viewer.zmags.com/publication/72f19aac?page=5"> / CONTENTS CONTENTS / DIGITAL FORENSICS MAGAZ</a> <a title="DFM03 - Online page 6" href="https://secure.viewer.zmags.com/publication/72f19aac?page=6"> / NEWS NEWS Academics & Practitioners Discuss </a> <a title="DFM03 - Online page 7" href="https://secure.viewer.zmags.com/publication/72f19aac?page=7"> Fortunately the strategy takes a broad view </a> <a title="DFM03 - Online page 8" href="https://secure.viewer.zmags.com/publication/72f19aac?page=8"> Cell site analysis Computer forensics Audio v</a> <a title="DFM03 - Online page 9" href="https://secure.viewer.zmags.com/publication/72f19aac?page=9"> 360° OYour chance to have your say … </a> <a title="DFM03 - Online page 10" href="https://secure.viewer.zmags.com/publication/72f19aac?page=10"> / LETTERS country (Deloitte Forensic) and pri</a> <a title="DFM03 - Online page 11" href="https://secure.viewer.zmags.com/publication/72f19aac?page=11"> </a> <a title="DFM03 - Online page 12" href="https://secure.viewer.zmags.com/publication/72f19aac?page=12"> / LEAD FEATURE YOU HAVE MAIL EMAIL DECEPTION A</a> <a title="DFM03 - Online page 13" href="https://secure.viewer.zmags.com/publication/72f19aac?page=13"> trail of clues left by those who seek to abuse th</a> <a title="DFM03 - Online page 14" href="https://secure.viewer.zmags.com/publication/72f19aac?page=14"> / LEAD FEATURE / Listing 1 From: “Digital Foren</a> <a title="DFM03 - Online page 15" href="https://secure.viewer.zmags.com/publication/72f19aac?page=15"> Figure 3 every time they view the email (unless,</a> <a title="DFM03 - Online page 16" href="https://secure.viewer.zmags.com/publication/72f19aac?page=16"> / LEAD FEATURE that it was perfectly comforta</a> <a title="DFM03 - Online page 17" href="https://secure.viewer.zmags.com/publication/72f19aac?page=17"> deceive us are normally not that clever. Here are</a> <a title="DFM03 - Online page 18" href="https://secure.viewer.zmags.com/publication/72f19aac?page=18"> </a> <a title="DFM03 - Online page 19" href="https://secure.viewer.zmags.com/publication/72f19aac?page=19"> / FEATURE PROACTIVE COMPUTER FORENSICS THE SEC</a> <a title="DFM03 - Online page 20" href="https://secure.viewer.zmags.com/publication/72f19aac?page=20">/ FEATURE Items (ii) and (iii) are v</a> <a title="DFM03 - Online page 21" href="https://secure.viewer.zmags.com/publication/72f19aac?page=21"> / Computer Misuse Act (1990) Where the US has the</a> <a title="DFM03 - Online page 22" href="https://secure.viewer.zmags.com/publication/72f19aac?page=22"> / FEATURE (3) It is immaterial for the purpos</a> <a title="DFM03 - Online page 23" href="https://secure.viewer.zmags.com/publication/72f19aac?page=23"> MD5 are recognised as one of the leading digital </a> <a title="DFM03 - Online page 24" href="https://secure.viewer.zmags.com/publication/72f19aac?page=24"> / FEATURE THE FACEBOOK MURDER: A LINGUISTIC MA</a> <a title="DFM03 - Online page 25" href="https://secure.viewer.zmags.com/publication/72f19aac?page=25"> Once in Chapman’s vehicle, Ashleigh then beg</a> <a title="DFM03 - Online page 26" href="https://secure.viewer.zmags.com/publication/72f19aac?page=26"> / FEATURE Q text measurements </a> <a title="DFM03 - Online page 27" href="https://secure.viewer.zmags.com/publication/72f19aac?page=27"> features, and Chapman is working under real press</a> <a title="DFM03 - Online page 28" href="https://secure.viewer.zmags.com/publication/72f19aac?page=28"> / FEATURE Chapman was a plau</a> <a title="DFM03 - Online page 29" href="https://secure.viewer.zmags.com/publication/72f19aac?page=29"> / FUTURE ISSUES COMING SOON… Some of the gr</a> <a title="DFM03 - Online page 30" href="https://secure.viewer.zmags.com/publication/72f19aac?page=30"> / FEATURE A DIGITAL FORENSICS LAB BY ANY OTHER</a> <a title="DFM03 - Online page 31" href="https://secure.viewer.zmags.com/publication/72f19aac?page=31"> working criminal defense cases). Law enforcement </a> <a title="DFM03 - Online page 32" href="https://secure.viewer.zmags.com/publication/72f19aac?page=32"> / FEATURE Additionally, large data sets c</a> <a title="DFM03 - Online page 33" href="https://secure.viewer.zmags.com/publication/72f19aac?page=33"> A centralized laboratory is important for di</a> <a title="DFM03 - Online page 34" href="https://secure.viewer.zmags.com/publication/72f19aac?page=34"> / FEATURE budget is cut or the firm is absorb</a> <a title="DFM03 - Online page 35" href="https://secure.viewer.zmags.com/publication/72f19aac?page=35"> Forensic Computing 12-month st</a> <a title="DFM03 - Online page 36" href="https://secure.viewer.zmags.com/publication/72f19aac?page=36"> / COMPETITION COMPETITION / 3 SYNGRESS BOOKS t</a> <a title="DFM03 - Online page 37" href="https://secure.viewer.zmags.com/publication/72f19aac?page=37"> / LEGAL EDITORIAL LEGAL EDITORIAL Welcome aga</a> <a title="DFM03 - Online page 38" href="https://secure.viewer.zmags.com/publication/72f19aac?page=38"> / LEGAL FEATURE THE FOURTH AMENDMENT CYBERSEAR</a> <a title="DFM03 - Online page 39" href="https://secure.viewer.zmags.com/publication/72f19aac?page=39"> Assuming that there is to be a governmental </a> <a title="DFM03 - Online page 40" href="https://secure.viewer.zmags.com/publication/72f19aac?page=40"> / LEGAL FEATURE could simply show the target’</a> <a title="DFM03 - Online page 41" href="https://secure.viewer.zmags.com/publication/72f19aac?page=41"> in that case, what exactly has been “lawfully sei</a> <a title="DFM03 - Online page 42" href="https://secure.viewer.zmags.com/publication/72f19aac?page=42"> / LEGAL NEWS ALERT LEGAL NEWS ALERT Take C</a> <a title="DFM03 - Online page 43" href="https://secure.viewer.zmags.com/publication/72f19aac?page=43"> Inspection of Electronically Stored Information (</a> <a title="DFM03 - Online page 44" href="https://secure.viewer.zmags.com/publication/72f19aac?page=44"> Shape your future Forensic Computing MSc Fo</a> <a title="DFM03 - Online page 45" href="https://secure.viewer.zmags.com/publication/72f19aac?page=45"> / FEATURE PLAYING WITH FIRE: DISSECTING MALICI</a> <a title="DFM03 - Online page 46" href="https://secure.viewer.zmags.com/publication/72f19aac?page=46"> / FEATURE keyloggers, screen loggers, email r</a> <a title="DFM03 - Online page 47" href="https://secure.viewer.zmags.com/publication/72f19aac?page=47"> from BinText we see the text ‘.aspack’, see Fig 1</a> <a title="DFM03 - Online page 48" href="https://secure.viewer.zmags.com/publication/72f19aac?page=48"> / FEATURE Figure 5 allow</a> <a title="DFM03 - Online page 49" href="https://secure.viewer.zmags.com/publication/72f19aac?page=49"> In this virtual realm, we install the monito</a> <a title="DFM03 - Online page 50" href="https://secure.viewer.zmags.com/publication/72f19aac?page=50"> / FEATURE A common side effect of using</a> <a title="DFM03 - Online page 51" href="https://secure.viewer.zmags.com/publication/72f19aac?page=51"> 22. OllyDbg v1.10 [Internet] [cited 2009 11/22/20</a> <a title="DFM03 - Online page 52" href="https://secure.viewer.zmags.com/publication/72f19aac?page=52"> / FEATURE MODELLING FOR OPERATIONAL FORENSICS </a> <a title="DFM03 - Online page 53" href="https://secure.viewer.zmags.com/publication/72f19aac?page=53"> Figure 4. Influence Diagram of Trust Trap from ME</a> <a title="DFM03 - Online page 54" href="https://secure.viewer.zmags.com/publication/72f19aac?page=54"> / FEATURE Although the example is a ver</a> <a title="DFM03 - Online page 55" href="https://secure.viewer.zmags.com/publication/72f19aac?page=55"> Figure 8. Multiple Models looking at [Stephenson</a> <a title="DFM03 - Online page 56" href="https://secure.viewer.zmags.com/publication/72f19aac?page=56"> Maximise Prioritise Visualise Call IntaForen</a> <a title="DFM03 - Online page 57" href="https://secure.viewer.zmags.com/publication/72f19aac?page=57"> / FEATURE IT’S NOT ABOUT PREVENTION THE NEED F</a> <a title="DFM03 - Online page 58" href="https://secure.viewer.zmags.com/publication/72f19aac?page=58"> / FEATURE attacks. It seems illogical that in</a> <a title="DFM03 - Online page 59" href="https://secure.viewer.zmags.com/publication/72f19aac?page=59"> application firewalls, unified threat management,</a> <a title="DFM03 - Online page 60" href="https://secure.viewer.zmags.com/publication/72f19aac?page=60"> / PRODUCT REVIEW PRODUCT REVIEW Product Purpos</a> <a title="DFM03 - Online page 61" href="https://secure.viewer.zmags.com/publication/72f19aac?page=61"> applications that install on OS X, the installati</a> <a title="DFM03 - Online page 62" href="https://secure.viewer.zmags.com/publication/72f19aac?page=62"> / PRODUCT REVIEW Figure 3 </a> <a title="DFM03 - Online page 63" href="https://secure.viewer.zmags.com/publication/72f19aac?page=63"> UNIVERSITY VACANCIES Digital Forensic Vacancies a</a> <a title="DFM03 - Online page 64" href="https://secure.viewer.zmags.com/publication/72f19aac?page=64"> Digital ForensicS / magazine Digital Forensics m</a> <a title="DFM03 - Online page 65" href="https://secure.viewer.zmags.com/publication/72f19aac?page=65"> MEET THE DF PROFESSIONALS Thomas J. Slovenski – C</a> <a title="DFM03 - Online page 66" href="https://secure.viewer.zmags.com/publication/72f19aac?page=66"> BLADE F O R E N S I C D AT A R E C O V E R Y </a> <a title="DFM03 - Online page 67" href="https://secure.viewer.zmags.com/publication/72f19aac?page=67"> / FEATURE TIME FOR FORENSICS THE IMPLICATIONS </a> <a title="DFM03 - Online page 68" href="https://secure.viewer.zmags.com/publication/72f19aac?page=68"> / FEATURE Figur</a> <a title="DFM03 - Online page 69" href="https://secure.viewer.zmags.com/publication/72f19aac?page=69"> then went on to become GMT). This eventually occu</a> <a title="DFM03 - Online page 70" href="https://secure.viewer.zmags.com/publication/72f19aac?page=70"> / FEATURE / More info SANS Internet storm Centr</a> <a title="DFM03 - Online page 71" href="https://secure.viewer.zmags.com/publication/72f19aac?page=71"> Time Stamp </a> <a title="DFM03 - Online page 72" href="https://secure.viewer.zmags.com/publication/72f19aac?page=72"> Mobile Development from Apress The la</a> <a title="DFM03 - Online page 73" href="https://secure.viewer.zmags.com/publication/72f19aac?page=73"> / FEATURE DIGITAL STEGANOGRAPHY AN INTRODUCTIO</a> <a title="DFM03 - Online page 74" href="https://secure.viewer.zmags.com/publication/72f19aac?page=74"> / FEATURE </a> <a title="DFM03 - Online page 75" href="https://secure.viewer.zmags.com/publication/72f19aac?page=75"> Figure 2. Advanced Steganography Model illustrat</a> <a title="DFM03 - Online page 76" href="https://secure.viewer.zmags.com/publication/72f19aac?page=76"> / FEATURE For example, who would suspect that</a> <a title="DFM03 - Online page 77" href="https://secure.viewer.zmags.com/publication/72f19aac?page=77"> </a> <a title="DFM03 - Online page 78" href="https://secure.viewer.zmags.com/publication/72f19aac?page=78"> / BOOK REVIEWS BOOK REVIEWS E-discovery: Cr</a> <a title="DFM03 - Online page 79" href="https://secure.viewer.zmags.com/publication/72f19aac?page=79"> the anthrax scare that haunted US citizens just a</a> <a title="DFM03 - Online page 80" href="https://secure.viewer.zmags.com/publication/72f19aac?page=80"> Digital ForensicS / magazine PLACE YOU</a> <a title="DFM03 - Online page 81" href="https://secure.viewer.zmags.com/publication/72f19aac?page=81"> CALLING ALL RESEARCHERS & PRACTITIONERS If you ar</a> <a title="DFM03 - Online page 82" href="https://secure.viewer.zmags.com/publication/72f19aac?page=82"> / COLUMN IRQ Angus Marshall interrupts your train</a> <a title="DFM03 - Online page 83" href="https://secure.viewer.zmags.com/publication/72f19aac?page=83"> Now Available! Cutting Edge Content in Digital S</a> <a title="DFM03 - Online page 84" href="https://secure.viewer.zmags.com/publication/72f19aac?page=84"> Order Today! May April 2010 2010 Digita</a>