The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2009 vol.7)
pp: 18-25
Michael A. Caloyannides , Northrop Grumman
Computer forensics' presumed usefulness against anyone with computer savvy is minimal because such persons can readily defeat forensics techniques. Because computer forensics can't show who put the data where forensics found it, it can be evidence of nothing.
digital forensics, legal, law, data, chain of custody, security
Michael A. Caloyannides, "Forensics Is So "Yesterday"", IEEE Security & Privacy, vol.7, no. 2, pp. 18-25, March/April 2009, doi:10.1109/MSP.2009.37
1. R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission using Electromagnetic Emanations," Information Hiding 1998, LNCS 1525, Springer, 1998, pp. 124–142;
2. M. Kuhn, "Time-Domain Eavesdropping Risks or CRT Displays," 2002; .
3. J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys." Proc. Usenix Security Symp., Usenix Assoc., 2008; http://citp.princeton.edumemory/.
4. M. Caloyannides, Desktop Witness, John Wiley, 2002.
5. T. Kohno, A. Broido, and K. Claffy, "Remote Physical Device Fingerprinting," 2000, KohnoBroidoClaffy05-devicefingerprinting.pdf .
117 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool