This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Digital Forensics Works
March/April 2009 (vol. 7 no. 2)
pp. 26-29
Brian D. Carrier, Basis Technology
In response to another article in this special issue, "Forensics Is So 'Yesterday,'" the author proposes that although digital forensics does face challenges, it works, so digital investigations shouldn't stop as long as they follow the law.

1. B. Carrier, and E.H. Spafford, "Getting Physical with the Digital Investigation Process," Int'l J.Digital Evidence, vol. 2, no. 2, 2003; www.utica.edu/academic/institutes/ecii/publications/ articlesA0AC5A7A-FB6C-325D-BF515A44FDEE7459.pdf .
2. C. Lin, "Computer Detective Talks about Levy Evidence," CNN News,17 July 2001; http://archives.cnn.com/2001/US/07/17/levy.access.cnna index.html.
3. M. Grahm, "Murder, His Hard Drive Wrote," Wired News,23 May 2008; www.wired.com/politics/security/news/2008/ 05fbi_lab.
4. G.C. Kessler, "The Role of Computer Forensics in Law Enforcement," Officer.com, 31 Jan. 2006; www.officer.com/articlearticle.jsp?siteSection=18&id=28161 .
5. G. Hoglund and J. Butler, Rootkits: Subverting the Windows Kernel, Addison-Wesley, 2006.
6. W. Jansen and R. Ayers, Guidelines on Cell Phone Forensics, NIST Special Publication 800-101, US Nat'l Inst. Standards and Tech., May 2007.
7. M. Geiger, "Evaluating Commercial Counter–Forensic Tools," Digital Forensic Research Workshop, 2005; www.dfrws.org/2005/proceedingsgeiger_couterforensics.pdf .
8. S.W. Brenner, B. Carrier, and J. Henninger, "The Trojan Horse Defense in Cybercrime Cases," Santa Clara Computer&High Tech. Law J., vol. 21, no. 1, 2004.
9. M. Kotadia, "U.K. Teen Acquitted with Trojan Defense," CNet News,17 Oct. 2003; http://news.cnet.com/U.K.-teen-acquitted-with-Trojan-defense 2100-7349_3-5092781.html .
10. M. Rasch, "The Giant Wooden Horse Did It!" The Register,20 Jan. 2004; www.theregister.co.uk/2004/01/20the_giant_wooden_horse_did /.

Index Terms:
digital forensics, digital investigations, security and privacy
Citation:
Brian D. Carrier, "Digital Forensics Works," IEEE Security & Privacy, vol. 7, no. 2, pp. 26-29, March-April 2009, doi:10.1109/MSP.2009.35
Usage of this product signifies your acceptance of the Terms of Use.