This Article 
 Bibliographic References 
 Add to: 
Forensics Is So "Yesterday"
March/April 2009 (vol. 7 no. 2)
pp. 18-25
Michael A. Caloyannides, Northrop Grumman
Computer forensics' presumed usefulness against anyone with computer savvy is minimal because such persons can readily defeat forensics techniques. Because computer forensics can't show who put the data where forensics found it, it can be evidence of nothing.

1. R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission using Electromagnetic Emanations," Information Hiding 1998, LNCS 1525, Springer, 1998, pp. 124–142;
2. M. Kuhn, "Time-Domain Eavesdropping Risks or CRT Displays," 2002; .
3. J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys." Proc. Usenix Security Symp., Usenix Assoc., 2008; http://citp.princeton.edumemory/.
4. M. Caloyannides, Desktop Witness, John Wiley, 2002.
5. T. Kohno, A. Broido, and K. Claffy, "Remote Physical Device Fingerprinting," 2000, KohnoBroidoClaffy05-devicefingerprinting.pdf .

Index Terms:
digital forensics, legal, law, data, chain of custody, security
Michael A. Caloyannides, "Forensics Is So "Yesterday"," IEEE Security & Privacy, vol. 7, no. 2, pp. 18-25, March-April 2009, doi:10.1109/MSP.2009.37
Usage of this product signifies your acceptance of the Terms of Use.