The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2009 vol.7)
pp: 26-29
Brian D. Carrier , Basis Technology
In response to another article in this special issue, "Forensics Is So 'Yesterday,'" the author proposes that although digital forensics does face challenges, it works, so digital investigations shouldn't stop as long as they follow the law.
digital forensics, digital investigations, security and privacy
Brian D. Carrier, "Digital Forensics Works", IEEE Security & Privacy, vol.7, no. 2, pp. 26-29, March/April 2009, doi:10.1109/MSP.2009.35
1. B. Carrier, and E.H. Spafford, "Getting Physical with the Digital Investigation Process," Int'l J.Digital Evidence, vol. 2, no. 2, 2003; articlesA0AC5A7A-FB6C-325D-BF515A44FDEE7459.pdf .
2. C. Lin, "Computer Detective Talks about Levy Evidence," CNN News,17 July 2001; index.html.
3. M. Grahm, "Murder, His Hard Drive Wrote," Wired News,23 May 2008; 05fbi_lab.
4. G.C. Kessler, "The Role of Computer Forensics in Law Enforcement,", 31 Jan. 2006; .
5. G. Hoglund and J. Butler, Rootkits: Subverting the Windows Kernel, Addison-Wesley, 2006.
6. W. Jansen and R. Ayers, Guidelines on Cell Phone Forensics, NIST Special Publication 800-101, US Nat'l Inst. Standards and Tech., May 2007.
7. M. Geiger, "Evaluating Commercial Counter–Forensic Tools," Digital Forensic Research Workshop, 2005; .
8. S.W. Brenner, B. Carrier, and J. Henninger, "The Trojan Horse Defense in Cybercrime Cases," Santa Clara Computer&High Tech. Law J., vol. 21, no. 1, 2004.
9. M. Kotadia, "U.K. Teen Acquitted with Trojan Defense," CNet News,17 Oct. 2003; 2100-7349_3-5092781.html .
10. M. Rasch, "The Giant Wooden Horse Did It!" The Register,20 Jan. 2004; /.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool