If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
<br /> Digital<br /> The Quarterly Magazine for Digital Forensics Practitioners Issue 37 · November 2018<br /> ForensicS<br /> Magazine<br /> Forensics Europe Expo<br /> DFM Forensics Conference 2019<br /> Call for Papers<br /> Secure<br /> Payment<br /> Systems<br /> Exploring the role of Digital Forensics within<br /> National and International Payment Systems<br /> PLUS<br /> Information Leakage in the IoT<br /> Voice Biometry and its Use in Forensics<br /> An Introduction to Open Source Intelligence<br /> 9<br /> From the Lab: Graph Theory for DF Investigations772042 061004<br /> 37<br /> Issue 37 / £14.99 TR Media<br /> <br /> Editorial<br /> T<br /> he professionalism debate continued this<br /> period with numerous discussions taking<br /> <a title="DFM37 - Online page 1" href="http://viewer.zmags.com/publication/7c797ba6?page=1"> Digital The Quarterly Magazine for Digital Fore</a> <a title="DFM37 - Online page 2" href="http://viewer.zmags.com/publication/7c797ba6?page=2"> </a> <a title="DFM37 - Online page 3" href="http://viewer.zmags.com/publication/7c797ba6?page=3"> Editorial T </a> <a title="DFM37 - Online page 4" href="http://viewer.zmags.com/publication/7c797ba6?page=4"> B uilding on the suc</a> <a title="DFM37 - Online page 5" href="http://viewer.zmags.com/publication/7c797ba6?page=5"> Contents FEATURES 8 Information Leakage in the I</a> <a title="DFM37 - Online page 6" href="http://viewer.zmags.com/publication/7c797ba6?page=6"> NEWS News UK Small Businesses Targeted with 65,0</a> <a title="DFM37 - Online page 7" href="http://viewer.zmags.com/publication/7c797ba6?page=7"> Threats from ex-employees account for 13% of all </a> <a title="DFM37 - Online page 8" href="http://viewer.zmags.com/publication/7c797ba6?page=8"> FEATURE INTERMEDIATE Information Leakage in the </a> <a title="DFM37 - Online page 9" href="http://viewer.zmags.com/publication/7c797ba6?page=9"> runs the Tracker App that communicates with the T</a> <a title="DFM37 - Online page 10" href="http://viewer.zmags.com/publication/7c797ba6?page=10"> FEATURE INTERMEDIATE IoT Security The hardware</a> <a title="DFM37 - Online page 11" href="http://viewer.zmags.com/publication/7c797ba6?page=11"> Experimental Findings Fitbit traffic was analysed </a> <a title="DFM37 - Online page 12" href="http://viewer.zmags.com/publication/7c797ba6?page=12"> FEATURE INTERMEDIATE </a> <a title="DFM37 - Online page 13" href="http://viewer.zmags.com/publication/7c797ba6?page=13"> and the potential for reuse, then the re-users co</a> <a title="DFM37 - Online page 14" href="http://viewer.zmags.com/publication/7c797ba6?page=14"> FEATURE ENTRY Cyber Grooming Investigation Fram</a> <a title="DFM37 - Online page 15" href="http://viewer.zmags.com/publication/7c797ba6?page=15"> Figure 1. Cyber Grooming Investigation Framework </a> <a title="DFM37 - Online page 16" href="http://viewer.zmags.com/publication/7c797ba6?page=16"> FEATURE ENTRY Headquarters is located. The FB</a> <a title="DFM37 - Online page 17" href="http://viewer.zmags.com/publication/7c797ba6?page=17"> tampered with. Complying with ACPO Principle 1 to</a> <a title="DFM37 - Online page 18" href="http://viewer.zmags.com/publication/7c797ba6?page=18"> FEATURE ENTRY Data Buffer: 3 – A data buffer </a> <a title="DFM37 - Online page 19" href="http://viewer.zmags.com/publication/7c797ba6?page=19"> </a> <a title="DFM37 - Online page 20" href="http://viewer.zmags.com/publication/7c797ba6?page=20"> </a> <a title="DFM37 - Online page 21" href="http://viewer.zmags.com/publication/7c797ba6?page=21"> LEGAL Editorial T h</a> <a title="DFM37 - Online page 22" href="http://viewer.zmags.com/publication/7c797ba6?page=22"> Scott Zimmerman examines the Polish Cybersecurity</a> <a title="DFM37 - Online page 23" href="http://viewer.zmags.com/publication/7c797ba6?page=23"> objectives that the country plans to achieve by t</a> <a title="DFM37 - Online page 24" href="http://viewer.zmags.com/publication/7c797ba6?page=24"> LEGAL FEATURE (IR) capability. A strong IR pr</a> <a title="DFM37 - Online page 25" href="http://viewer.zmags.com/publication/7c797ba6?page=25"> such as telephony, data transmission, electronic </a> <a title="DFM37 - Online page 26" href="http://viewer.zmags.com/publication/7c797ba6?page=26"> LEGAL NEWS LEGAL News Facebook Security Breach At</a> <a title="DFM37 - Online page 27" href="http://viewer.zmags.com/publication/7c797ba6?page=27"> </a> <a title="DFM37 - Online page 28" href="http://viewer.zmags.com/publication/7c797ba6?page=28"> FROM THE LAB INTERMEDIATE How to Model Digital Fo</a> <a title="DFM37 - Online page 29" href="http://viewer.zmags.com/publication/7c797ba6?page=29"> The process takes standard graph theory and ident</a> <a title="DFM37 - Online page 30" href="http://viewer.zmags.com/publication/7c797ba6?page=30"> FROM THE LAB INTERMEDIATE To summarize</a> <a title="DFM37 - Online page 31" href="http://viewer.zmags.com/publication/7c797ba6?page=31"> the arcs. This provides a clearer view of the inc</a> <a title="DFM37 - Online page 32" href="http://viewer.zmags.com/publication/7c797ba6?page=32"> FROM THE LAB INTERMEDIATE Presentations 1. Se</a> <a title="DFM37 - Online page 33" href="http://viewer.zmags.com/publication/7c797ba6?page=33"> </a> <a title="DFM37 - Online page 34" href="http://viewer.zmags.com/publication/7c797ba6?page=34"> FEATURE ADVANCED Examining the Windows Registry </a> <a title="DFM37 - Online page 35" href="http://viewer.zmags.com/publication/7c797ba6?page=35"> Registry Architecture The registry is a specializ</a> <a title="DFM37 - Online page 36" href="http://viewer.zmags.com/publication/7c797ba6?page=36"> FEATURE ADVANCED HKEY_CLASSES_ROOT (HKCR) – T</a> <a title="DFM37 - Online page 37" href="http://viewer.zmags.com/publication/7c797ba6?page=37"> Windows makes a number of functions that are</a> <a title="DFM37 - Online page 38" href="http://viewer.zmags.com/publication/7c797ba6?page=38"> FEATURE ADVANCED </a> <a title="DFM37 - Online page 39" href="http://viewer.zmags.com/publication/7c797ba6?page=39"> </a> <a title="DFM37 - Online page 40" href="http://viewer.zmags.com/publication/7c797ba6?page=40"> ADVERTORIAL UNIVERSITY OF WARWICK CYBER SECURITY,</a> <a title="DFM37 - Online page 41" href="http://viewer.zmags.com/publication/7c797ba6?page=41"> 41</a> <a title="DFM37 - Online page 42" href="http://viewer.zmags.com/publication/7c797ba6?page=42"> MAIN FEATUREIINTERMEDIATE The Role of Digital Fo</a> <a title="DFM37 - Online page 43" href="http://viewer.zmags.com/publication/7c797ba6?page=43"> When a payment transaction is successfully p</a> <a title="DFM37 - Online page 44" href="http://viewer.zmags.com/publication/7c797ba6?page=44"> MAIN FEATUREIINTERMEDIATE A will</a> <a title="DFM37 - Online page 45" href="http://viewer.zmags.com/publication/7c797ba6?page=45"> 10. Insufficient Logging and Monitoring: At</a> <a title="DFM37 - Online page 46" href="http://viewer.zmags.com/publication/7c797ba6?page=46"> MAIN FEATUREIINTERMEDIATE Hackin</a> <a title="DFM37 - Online page 47" href="http://viewer.zmags.com/publication/7c797ba6?page=47"> clueless on what to do after a payment system bre</a> <a title="DFM37 - Online page 48" href="http://viewer.zmags.com/publication/7c797ba6?page=48"> MAIN FEATUREIINTERMEDIATE REFERENCES Assocham.</a> <a title="DFM37 - Online page 49" href="http://viewer.zmags.com/publication/7c797ba6?page=49"> IsecT. (2016). ISO/IEC 27035:2016 — Information t</a> <a title="DFM37 - Online page 50" href="http://viewer.zmags.com/publication/7c797ba6?page=50"> MORE THAN A MAG Digital Forensics Magazine prides</a> <a title="DFM37 - Online page 51" href="http://viewer.zmags.com/publication/7c797ba6?page=51"> </a> <a title="DFM37 - Online page 52" href="http://viewer.zmags.com/publication/7c797ba6?page=52"> FEATURE INTERMEDIATE Open Source Intelligence (O</a> <a title="DFM37 - Online page 53" href="http://viewer.zmags.com/publication/7c797ba6?page=53"> Open Source Information Categories There are diff</a> <a title="DFM37 - Online page 54" href="http://viewer.zmags.com/publication/7c797ba6?page=54"> FEATURE INTERMEDIATE OSINT Organizations Some </a> <a title="DFM37 - Online page 55" href="http://viewer.zmags.com/publication/7c797ba6?page=55"> Who Needs OSINT? OSINT can be beneficial for diffe</a> <a title="DFM37 - Online page 56" href="http://viewer.zmags.com/publication/7c797ba6?page=56"> FEATURE INTERMEDIATE Semi-passive From a techn</a> <a title="DFM37 - Online page 57" href="http://viewer.zmags.com/publication/7c797ba6?page=57"> be viewed by the regular Internet user and needs </a> <a title="DFM37 - Online page 58" href="http://viewer.zmags.com/publication/7c797ba6?page=58"> COMPETITION Competition Fancy winning a nifty li</a> <a title="DFM37 - Online page 59" href="http://viewer.zmags.com/publication/7c797ba6?page=59"> </a> <a title="DFM37 - Online page 60" href="http://viewer.zmags.com/publication/7c797ba6?page=60"> FEATURE INTERMEDIATE Voice Biometry and its use </a> <a title="DFM37 - Online page 61" href="http://viewer.zmags.com/publication/7c797ba6?page=61"> 61</a> <a title="DFM37 - Online page 62" href="http://viewer.zmags.com/publication/7c797ba6?page=62"> FEATURE INTERMEDIATE iVectors and DNN-based Sy</a> <a title="DFM37 - Online page 63" href="http://viewer.zmags.com/publication/7c797ba6?page=63"> Figure 2. Waveform & Spectogram – A Screenshot fr</a> <a title="DFM37 - Online page 64" href="http://viewer.zmags.com/publication/7c797ba6?page=64"> FEATURE INTERMEDIATE Fi</a> <a title="DFM37 - Online page 65" href="http://viewer.zmags.com/publication/7c797ba6?page=65"> </a> <a title="DFM37 - Online page 66" href="http://viewer.zmags.com/publication/7c797ba6?page=66"> FEATURE ENTRY Leveraging Emerging Technology Chr</a> <a title="DFM37 - Online page 67" href="http://viewer.zmags.com/publication/7c797ba6?page=67"> Toward a Collaborative Model The time has come to</a> <a title="DFM37 - Online page 68" href="http://viewer.zmags.com/publication/7c797ba6?page=68"> FEATURE ENTRY The benefits of this proce</a> <a title="DFM37 - Online page 69" href="http://viewer.zmags.com/publication/7c797ba6?page=69"> </a> <a title="DFM37 - Online page 70" href="http://viewer.zmags.com/publication/7c797ba6?page=70"> 360 36 Letters, emails, tweets, connections and m</a> <a title="DFM37 - Online page 71" href="http://viewer.zmags.com/publication/7c797ba6?page=71"> TWITTER We are regularly tweeting tools, tips and</a> <a title="DFM37 - Online page 72" href="http://viewer.zmags.com/publication/7c797ba6?page=72"> LIBRARY SUBSCRIPTIONS NOW AVAILABLE You can get</a> <a title="DFM37 - Online page 73" href="http://viewer.zmags.com/publication/7c797ba6?page=73"> NEXT ISSUE NEXT Issue Continuing our aim of bring</a> <a title="DFM37 - Online page 74" href="http://viewer.zmags.com/publication/7c797ba6?page=74"> </a> <a title="DFM37 - Online page 75" href="http://viewer.zmags.com/publication/7c797ba6?page=75"> BOOK Reviews W </a> <a title="DFM37 - Online page 76" href="http://viewer.zmags.com/publication/7c797ba6?page=76"> REVIEWS BOOKS We now enter the worl</a> <a title="DFM37 - Online page 77" href="http://viewer.zmags.com/publication/7c797ba6?page=77"> BACK ISSUES BACK Issues Digital The Quarterly M</a> <a title="DFM37 - Online page 78" href="http://viewer.zmags.com/publication/7c797ba6?page=78"> IRQ IRQ No Smoke Without Mirrors. C </a> <a title="DFM37 - Online page 79" href="http://viewer.zmags.com/publication/7c797ba6?page=79"> </a> <a title="DFM37 - Online page 80" href="http://viewer.zmags.com/publication/7c797ba6?page=80"> </a>