If you are visually impaired or blind, you can visit the PDF version by Pressing CONTROL + ALT + 4
You need a JavaScript-enabled browser to view this Publication
Please follow these steps to view the Publication:
Enable JavaScript in your browser
Refresh this page
Best regards
Zmags
ForensicS
/ magazine
Digital
The Quarterly Magazine for Digital Forensics Practitioners
INSIDE
/ Forensic Investigation of
Virtual Environments
/ Lab tested: Disklabs’
Faraday Evidence Bag
/ Inside the EU Data
Retention Act
/ Brew your own
version of COFEE
Win 3 State of the Art
Sony Dictaphones
Competition!
ISSUE 02
ANDROID
ON THE LOOSE
Andrew Hoog unveils Google’s new mobile
operating system, showings us exactly what’s
important for forensic investigators
01
9 772042 061103
Issue 2 / £17.50 TR Media
/ REGULARS / LATEST News / Book Reviews / 20% DISCOUNT
LEGAL NEWS, 360, Mobile phone Malware Forensics Elcomsoft PASSWORD
IRQ… AND MORE encryption hacked Live Hacking
ForensicS / magazine Digital The Quarterly Magaz
Shape your future Forensic Computing MSc Fo
EDITORIAL H as it really been t
Reviewing the latest sports highlights
/ CONTENTS CONTENTS / DIGITAL FORENSICS
/ NEWS NEWS Photo © UCL Media Services, Photo
Cyber security challenge UK-style As part of th
Forensic Computing 12-month st
360° TYour chance to have your say …
/ LETTERS used in a third party country – ind
PRACTICAL COMPUTER & MOBILE PHONE bBeofokre F
/ LEAD FEATURE ANDROID ON THE LOOSE EvERyTHINg
Android is done in Java and runs in a Dalvik virt
/ LEAD FEATURE 1. Install Java a. JDK5 o
Android applications framework 0xFF (all 1’s) an
/ LEAD FEATURE Forensics techniques Of course
dEVICE
/ FEATURE Counter-forensiCs andthe pushto stay
data destruction At first glance, it would appear
file ‘shredding’ By performing file shredding, a
/ FEATURE modify material stored on a compute
computerbackthreeyears,installtheoperatingsystem,
/ FEATURE / Pre-emption This technique involves
/ FEATURE FROM EVIDENCE COLLECTION TO THE COUR
/ FEATURE Computer data can be extremely vola
documenting all running processes and network con
/ FEATURE HasH LIBRaRIEs aRE CREaTED OF aLLTHE
29
/ FEATURE / Verifiable Procedures The goal of t
/ FUTURE ISSUES COMING SOON… A Roundup of f
Forensic Trade Shows, LLC and The New York Metro
/ Topics will include : • accountant Malpractice
/ COMPETITION COMPETITION / 3 Sony ICD-UX71 Di
/ LEGAL EDITORIAL LEGAL EDITORIAL Welcome aga
/ LEGAL NEWS ALERT LEGAL NEWS ALERT Sixth Amen
standards of processing personal data, nonetheles
/ LEGAL FEATURE SETTING STORE ON NEW DATA RULE
• People that wrote the directive claim that all
/ LEGAL FEATURE • (A1i) the calling telephon
user id to a subscriber name and postal address.
/ LEGAL FEATURE DATA RETENTION STORAGE SUMMARy
• Hosting companies; • Internet Cafes & Wireless
Digital ForensicS / magazine Digital Forensics m
/ FEATURE WAKE UP AND SMELLTHE COFEE CrEATING
/ FEATURE • Network information (ipconfig.exe
/ Building the toolkit A lthough
/ FEATURE application execution information s
/ FILE HASHES MD5 or SHA1 files hashes provide th
/ FEATURE THESE DATA COLLECTION
Maximise Prioritise Visualise Call IntaForen
/ FEATURE MODELLING FOR OPERATIONAL FORENSICS
Thelattertwocanbeusefullyconjoinedintoasing
/ FEATURE PC LOGIN SCREEN Ethernet port
PHYSICAL
/ PROACTIVE COMPUTER FORENSICS Planning for tr
impossible in a magazine article; far too many ex
/ tech FEATURE R E L A X , IT’S IN THE BAG MoB
the reverberation chamber does have a number of f
/ tech FEATURE / Setting up the test The tests
/ JOBS UNIVERSITY VACANCIES Digital Forensic V
As the educational and technical arm of the
DF1_OFC_Cover - Online.indd 1
/ TECH FEATURE THE Trials aND TribulaTioNs of
/ TECH FEATURE change in the mobile phone for
ing new relationships and providing a hugely valu
BLADE F O R E N S I C D AT A R E C O V E RY
/ TECH FEATURE PROVIDING THE PROOF At some po
/ TECH FEATURE / Product Implications Existing
/ Trusted Third-Party Organizationsmayconsiderwhe
/ FEATURE Hacker's HIDDeN TerrOr robert a andr
/ TECH FEATURE GHOST IN THE MACHINE Forensic e
/ TECH FEATURE extract encryption keys from p
Next step: establish file integrity Afterthesnaps
/ TECH FEATURE files comprising the virt
image, but keep in mind that you may want to cons
/ BOOK REVIEWS BOOK REVIEWS Malware Forensics:
sprinkled throughout the text, and these soon sta
Digital ForensicS / magazine PLACE YOU
CALLING ALL RESEARCHERS & PRACTITIONERS If you ar
/ COLUMN IRQ ITriage and the triumph of common se
Now Available! WindowsForensicAnalysis MalwareFor
OrderToday! April 2010 PhoneForensicAnalysis 20