This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Forensics Is So "Yesterday"
March/April 2009 (vol. 7 no. 2)
pp. 18-25
Michael A. Caloyannides, Northrop Grumman
Computer forensics' presumed usefulness against anyone with computer savvy is minimal because such persons can readily defeat forensics techniques. Because computer forensics can't show who put the data where forensics found it, it can be evidence of nothing.

1. R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission using Electromagnetic Emanations," Information Hiding 1998, LNCS 1525, Springer, 1998, pp. 124–142; www.cl.cam.ac.uk/~mgk25ih98-tempest.pdf.
2. M. Kuhn, "Time-Domain Eavesdropping Risks or CRT Displays," 2002; www.cl.cam.ac.uk/~mgk25ieee02-optical.pdf .
3. J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys." Proc. Usenix Security Symp., Usenix Assoc., 2008; http://citp.princeton.edumemory/.
4. M. Caloyannides, Desktop Witness, John Wiley, 2002.
5. T. Kohno, A. Broido, and K. Claffy, "Remote Physical Device Fingerprinting," 2000, www.caida.org/publications/papers/2005/fingerprinting KohnoBroidoClaffy05-devicefingerprinting.pdf .

Index Terms:
digital forensics, legal, law, data, chain of custody, security
Citation:
Michael A. Caloyannides, "Forensics Is So "Yesterday"," IEEE Security & Privacy, vol. 7, no. 2, pp. 18-25, March-April 2009, doi:10.1109/MSP.2009.37
Usage of this product signifies your acceptance of the Terms of Use.