<br /> Digital<br /> The Quarterly Magazine for Digital Forensics Practitioners Issue 22 · February 2015<br /> WIN! an iPod Nano<br /> ForensicS<br /> / magazine<br /> META-CYBER<br /> SECURITY<br /> SYSTEM<br /> The Holistic Solution<br /> to the Network Security<br /> Big Data Problem<br /> Latest News, 360<br /> Book Reviews, IRQ<br /> & much more inside!<br /> PLUS!<br /> Data Fusion<br /> SQLite Databases<br /> SMART Phone Investigation<br /> The Internet of Things<br /> 22<br /> 9 772042 061004<br /> Issue 22 / £14.99 TR Media<br /> <br /> EDITORIAL<br /> A<br /> belated Happy New Year to all of you<br /> and may you have great success in your<br /> investigations. Already this year I have<br /> <a title="DFM22 - Online page 1" href="http://viewer.zmags.com/publication/e5f2bbbd?page=1"> Digital The Quarterly Magazine for Digital Fore</a> <a title="DFM22 - Online page 2" href="http://viewer.zmags.com/publication/e5f2bbbd?page=2"> </a> <a title="DFM22 - Online page 3" href="http://viewer.zmags.com/publication/e5f2bbbd?page=3"> EDITORIAL A </a> <a title="DFM22 - Online page 4" href="http://viewer.zmags.com/publication/e5f2bbbd?page=4"> </a> <a title="DFM22 - Online page 5" href="http://viewer.zmags.com/publication/e5f2bbbd?page=5"> 42 FEATURES 08 / SQLite Databases – Part 2 In t</a> <a title="DFM22 - Online page 6" href="http://viewer.zmags.com/publication/e5f2bbbd?page=6"> / NEWS NEWS NEWS / SQL Injection Vulnerabiliti</a> <a title="DFM22 - Online page 7" href="http://viewer.zmags.com/publication/e5f2bbbd?page=7"> / NEWS ROUND-UP UK TEEN ARRESTED IN CONNECTION WI</a> <a title="DFM22 - Online page 8" href="http://viewer.zmags.com/publication/e5f2bbbd?page=8"> / FEATURE SQLITE DATABASES: TREASURE TROVE FO</a> <a title="DFM22 - Online page 9" href="http://viewer.zmags.com/publication/e5f2bbbd?page=9"> other smart phones. The services offered in faceb</a> <a title="DFM22 - Online page 10" href="http://viewer.zmags.com/publication/e5f2bbbd?page=10"> / FEATURE WHATSAPP This application is design</a> <a title="DFM22 - Online page 11" href="http://viewer.zmags.com/publication/e5f2bbbd?page=11"> In some versions, the passwords and other acc</a> <a title="DFM22 - Online page 12" href="http://viewer.zmags.com/publication/e5f2bbbd?page=12"> / FEATURE / SQLite Expert SQLite Expert is the</a> <a title="DFM22 - Online page 13" href="http://viewer.zmags.com/publication/e5f2bbbd?page=13"> </a> <a title="DFM22 - Online page 14" href="http://viewer.zmags.com/publication/e5f2bbbd?page=14"> / FEATURE IMPROVING SMART PHONE INVESTIGATION</a> <a title="DFM22 - Online page 15" href="http://viewer.zmags.com/publication/e5f2bbbd?page=15"> / Problem Areas The convergence of computing and </a> <a title="DFM22 - Online page 16" href="http://viewer.zmags.com/publication/e5f2bbbd?page=16"> / FEATURE / See Also 1.Ruan, K., Carthy, J., K</a> <a title="DFM22 - Online page 17" href="http://viewer.zmags.com/publication/e5f2bbbd?page=17"> `incident detection' process. The relevant pathwa</a> <a title="DFM22 - Online page 18" href="http://viewer.zmags.com/publication/e5f2bbbd?page=18"> / FEATURE investigator to go back to the pres</a> <a title="DFM22 - Online page 19" href="http://viewer.zmags.com/publication/e5f2bbbd?page=19"> / LEGAL EDITORIAL LEGAL EDITORIAL 440 years in pr</a> <a title="DFM22 - Online page 20" href="http://viewer.zmags.com/publication/e5f2bbbd?page=20"> / LEGAL FEATURE SOUTH AFRICAN LAW An overview</a> <a title="DFM22 - Online page 21" href="http://viewer.zmags.com/publication/e5f2bbbd?page=21"> encryption technology” or something long those li</a> <a title="DFM22 - Online page 22" href="http://viewer.zmags.com/publication/e5f2bbbd?page=22"> / LEGAL FEATURE between the Bill </a> <a title="DFM22 - Online page 23" href="http://viewer.zmags.com/publication/e5f2bbbd?page=23"> in general, shall put in place a national cyberse</a> <a title="DFM22 - Online page 24" href="http://viewer.zmags.com/publication/e5f2bbbd?page=24"> / LEGAL EDITORIAL LEGAL NEWS A round-up of the la</a> <a title="DFM22 - Online page 25" href="http://viewer.zmags.com/publication/e5f2bbbd?page=25"> </a> <a title="DFM22 - Online page 26" href="http://viewer.zmags.com/publication/e5f2bbbd?page=26"> / FROM THE LAB META-CYBER SECURITY SYSTEM Dan</a> <a title="DFM22 - Online page 27" href="http://viewer.zmags.com/publication/e5f2bbbd?page=27"> THE NETWORK SECURITY PERSONNEL'S JOB OF SP</a> <a title="DFM22 - Online page 28" href="http://viewer.zmags.com/publication/e5f2bbbd?page=28"> / FROM THE LAB / Quantitative Testing Of Vi</a> <a title="DFM22 - Online page 29" href="http://viewer.zmags.com/publication/e5f2bbbd?page=29"> / The Storage Problem Ideally all data processed </a> <a title="DFM22 - Online page 30" href="http://viewer.zmags.com/publication/e5f2bbbd?page=30"> / FROM THE LAB Figur</a> <a title="DFM22 - Online page 31" href="http://viewer.zmags.com/publication/e5f2bbbd?page=31"> </a> <a title="DFM22 - Online page 32" href="http://viewer.zmags.com/publication/e5f2bbbd?page=32"> </a> <a title="DFM22 - Online page 33" href="http://viewer.zmags.com/publication/e5f2bbbd?page=33"> </a> <a title="DFM22 - Online page 34" href="http://viewer.zmags.com/publication/e5f2bbbd?page=34"> / FEATURE INTERNET-OF-THINGS: TOWARDS A FOREN</a> <a title="DFM22 - Online page 35" href="http://viewer.zmags.com/publication/e5f2bbbd?page=35"> That said, existing methodologies, processes </a> <a title="DFM22 - Online page 36" href="http://viewer.zmags.com/publication/e5f2bbbd?page=36"> / FEATURE Figure 2.</a> <a title="DFM22 - Online page 37" href="http://viewer.zmags.com/publication/e5f2bbbd?page=37"> / The 1-2-3 Zones of Digital Forensics Points-of-</a> <a title="DFM22 - Online page 38" href="http://viewer.zmags.com/publication/e5f2bbbd?page=38"> / INTERVIEW MEET THE PROFESSIONALS / Michel</a> <a title="DFM22 - Online page 39" href="http://viewer.zmags.com/publication/e5f2bbbd?page=39"> and so on. The possible implications for the Digi</a> <a title="DFM22 - Online page 40" href="http://viewer.zmags.com/publication/e5f2bbbd?page=40"> Digital ForensicS / magazine Digital The Qu</a> <a title="DFM22 - Online page 41" href="http://viewer.zmags.com/publication/e5f2bbbd?page=41"> </a> <a title="DFM22 - Online page 42" href="http://viewer.zmags.com/publication/e5f2bbbd?page=42"> / FEATURE / From Conspiracies </a> <a title="DFM22 - Online page 43" href="http://viewer.zmags.com/publication/e5f2bbbd?page=43"> Historically, most agencies have been workin</a> <a title="DFM22 - Online page 44" href="http://viewer.zmags.com/publication/e5f2bbbd?page=44"> / FEATURE Figure 2. SAS </a> <a title="DFM22 - Online page 45" href="http://viewer.zmags.com/publication/e5f2bbbd?page=45"> Advanced analytics extracts insights from big</a> <a title="DFM22 - Online page 46" href="http://viewer.zmags.com/publication/e5f2bbbd?page=46"> / FEATURE THE DEEP WEB, DARKNET & DARK INTERN</a> <a title="DFM22 - Online page 47" href="http://viewer.zmags.com/publication/e5f2bbbd?page=47"> / Understanding the Deep Web There are a numbe</a> <a title="DFM22 - Online page 48" href="http://viewer.zmags.com/publication/e5f2bbbd?page=48"> / FEATURE Figure 1. Acce</a> <a title="DFM22 - Online page 49" href="http://viewer.zmags.com/publication/e5f2bbbd?page=49"> Tor2web, hidden services can also be accessed fro</a> <a title="DFM22 - Online page 50" href="http://viewer.zmags.com/publication/e5f2bbbd?page=50"> / FEATURE Figure 6. Mar</a> <a title="DFM22 - Online page 51" href="http://viewer.zmags.com/publication/e5f2bbbd?page=51"> / COMING SOON COMING SOON… A round-up of feat</a> <a title="DFM22 - Online page 52" href="http://viewer.zmags.com/publication/e5f2bbbd?page=52"> / ADVERTORIAL CYBER SECURITY, ACADEMIA AND INDUST</a> <a title="DFM22 - Online page 53" href="http://viewer.zmags.com/publication/e5f2bbbd?page=53"> 53</a> <a title="DFM22 - Online page 54" href="http://viewer.zmags.com/publication/e5f2bbbd?page=54"> / FEATURE CYBER SECURITY & THE SME How the Cy</a> <a title="DFM22 - Online page 55" href="http://viewer.zmags.com/publication/e5f2bbbd?page=55"> for aspects of their business other than informat</a> <a title="DFM22 - Online page 56" href="http://viewer.zmags.com/publication/e5f2bbbd?page=56"> / FEATURE CREST Website</a> <a title="DFM22 - Online page 57" href="http://viewer.zmags.com/publication/e5f2bbbd?page=57"> Incident Response Team Options The departm</a> <a title="DFM22 - Online page 58" href="http://viewer.zmags.com/publication/e5f2bbbd?page=58"> / FEATURE REFERENCES Department for Business </a> <a title="DFM22 - Online page 59" href="http://viewer.zmags.com/publication/e5f2bbbd?page=59"> </a> <a title="DFM22 - Online page 60" href="http://viewer.zmags.com/publication/e5f2bbbd?page=60"> / FEATURE / Hyper Text Coffee Po</a> <a title="DFM22 - Online page 61" href="http://viewer.zmags.com/publication/e5f2bbbd?page=61"> it. The binaries themselves started as badly impl</a> <a title="DFM22 - Online page 62" href="http://viewer.zmags.com/publication/e5f2bbbd?page=62"> </a> <a title="DFM22 - Online page 63" href="http://viewer.zmags.com/publication/e5f2bbbd?page=63"> 36 Letters, emails, tweets, connections and more…</a> <a title="DFM22 - Online page 64" href="http://viewer.zmags.com/publication/e5f2bbbd?page=64"> / COMPETITION COMPETITION / This issue we hav</a> <a title="DFM22 - Online page 65" href="http://viewer.zmags.com/publication/e5f2bbbd?page=65"> / GET INVOLVED GET INVOLVED Calling all Book Revi</a> <a title="DFM22 - Online page 66" href="http://viewer.zmags.com/publication/e5f2bbbd?page=66"> </a> <a title="DFM22 - Online page 67" href="http://viewer.zmags.com/publication/e5f2bbbd?page=67"> / FEATURE PROTECTING INFORMATION IN LOCAL PUB</a> <a title="DFM22 - Online page 68" href="http://viewer.zmags.com/publication/e5f2bbbd?page=68"> / FEATURE Physical security needs to be </a> <a title="DFM22 - Online page 69" href="http://viewer.zmags.com/publication/e5f2bbbd?page=69"> </a> <a title="DFM22 - Online page 70" href="http://viewer.zmags.com/publication/e5f2bbbd?page=70"> </a> <a title="DFM22 - Online page 71" href="http://viewer.zmags.com/publication/e5f2bbbd?page=71"> / FEATURE PCI DSS COMPLIANCE Adesanya Ahmed e</a> <a title="DFM22 - Online page 72" href="http://viewer.zmags.com/publication/e5f2bbbd?page=72"> / FEATURE connection used, such as from i</a> <a title="DFM22 - Online page 73" href="http://viewer.zmags.com/publication/e5f2bbbd?page=73"> </a> <a title="DFM22 - Online page 74" href="http://viewer.zmags.com/publication/e5f2bbbd?page=74"> </a> <a title="DFM22 - Online page 75" href="http://viewer.zmags.com/publication/e5f2bbbd?page=75"> / book reviews BOOK REVIEWS CYBERCRIME INVESTIGAT</a> <a title="DFM22 - Online page 76" href="http://viewer.zmags.com/publication/e5f2bbbd?page=76"> / book reviews RTFM: RED TEAM FIELD MANUAL Rev</a> <a title="DFM22 - Online page 77" href="http://viewer.zmags.com/publication/e5f2bbbd?page=77"> </a> <a title="DFM22 - Online page 78" href="http://viewer.zmags.com/publication/e5f2bbbd?page=78"> / IRQ IRQ Some thoughts on encryption bans and in</a> <a title="DFM22 - Online page 79" href="http://viewer.zmags.com/publication/e5f2bbbd?page=79"> </a> <a title="DFM22 - Online page 80" href="http://viewer.zmags.com/publication/e5f2bbbd?page=80"> </a>