Abstract
Technology is rapidly changing the speed and manner in which people interact with each other and with the world. As technology helps criminals to operate more easily and quickly across borders, so law enforcement capability must continuously improve to keep one step ahead. Computer forensics has become a specialized and accepted investigative technique with its own tools and legal precedents that validate the discipline. Specially designed forensic software is also widely used during the whole process of computer forensic investigation. This article introduces computer forensic and computer evidence, introduces and compares some forensic software, and summarizes its likely future development.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Marcella, A.J., Greenfield, R.: Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. CRC Press, Boca Raton (2002)
Anderson, M.R.: Computer evidence processing, the third step: preserve the electronic crime scene, http://www.forensics-intl.com/art7.html (Last visited March 12, 2003)
ASR Data, http://www.asrdata.com/ (Last visited May 25, 2003)
Braid, M.: Collecting electronic evidence after a system compromise, http://www.auscert.org.au/render.html?it=2247&ciddd=1920 (Last visited April 15, 2003)
Middleton, B.: Cyber crime investigator’s field guide. CRC Press, Boca Raton (2002)
Tsoutsouris, D.: Computer forensic legal standards and equipment, http://rr.sans.org/incccident/legal_standards.php (Last visited March 5, 2003)
Farmer, D., Venema, W.: Forensic computer analysis: an introduction, http://xxx.ddj.com/documents/s=881/ddj0009f/0009f.htm (Last visited December 5, 2002)
Icove, D., Seger, K., VonStorch, W.: Computer Crime-A crimefighter’s Handbook. O’Reilly & Associates, Sebastopol (1995)
Disk Imaging Tool Specification. Version 3.1.6.NIST (National Institute of Standards and Technology), October 12 (2001), . http://www.cftt.nist.gov/testdocs.html (Last visited April 17, 2003)
Lunn, D.A.: Computer Forensics: An Overview, http://www.sans.org/rr/incident/forensiccs.php (Last visited March 8, 2003)
Casey, E.: Practical Approaches to Recovering Encrypted Digital Evidence. International Journal of Digital Evidence 1(3) (Fall 2002), http://www.ijde.org/docs/02_fall_art4.pdf (Last visited March 20, 2003)
Witter, F.: Legal Aspects of Collecting and Preserving Computer Forensic Evidence, http://www.sans.org/rr/incident/evidence.php (Last visited March 5, 2003)
Fisher, G.E.: Computer Forensics Guidance, http://www.nist.gov/itl/lab/bulletns/bltnnovOl.htm (Last visited March 15, 2003)
Guidance Software, http://www.guidancesoftware.com/ (Last visited May 14, 2003)
Holley, J.: Computer Forensics. SCInfo Security Magazine (September 2000), http://www.scmagazine.com/scmagazine/2000_09/survey/survey.html (Last visited April 11, 2003)
Holley, J.O.: Computer Forensics in the new Millennium, http://www.scmagazine.com/scmagazine/1999_09/survey/survey.html (Last visited June 5, 2003)
High Technology Crime Investigation Association (HTCIA), http://htcia.org (last visited March 21, 2003)
Borck, J.: Leave the cybersleuthing to the experts, http://www2.idg.com.au/infoagel.nsf/all/957738BOF8F8313BCA256A6C001BB7A4?OpenDocument (Last visited December 15, 2002)
Upchurch, J.: Combating Computer Crime, http://www.aatstake.com/research/tools/index.html#pdd (Last visited April 29, 2003)
Robbins, J.: An Explanation of Computer Forensics, http://www.knock-knock.com/forens01.htm (Last visited November 20, 2002)
Ryder, K.: Computer Forensics - We’ve had an Incident, Who Do We Get to Investigate?, http://www.sans.org/rr/incident/investigate.php (Last visited March 5, 2003)
Saudi, M.M.: An Overview of Disk Imaging Tool in Computer Forensics, http://www.sanss.org/rr/incident/disk_imaging.php (Last visited March 16, 2003)
Mares and Company, http://www.dmares.com/maresware/forensics.htm (Last visited May 25, 2003)
Welsh, M., Dalheimer, M.K., Kaufman, L.: Running Linux, third version. O’Reilly, Sebastopol (1999)
McKemmish, R.: What is Forensic Computing? Australian Institute of Criminology trends and issues No. 118 (June 1999) http://www.aic.gov.au/publications/tandi/till8.pdf (Last visited December 15, 2002)
Anderson, M.R.: Computer Evidence Processing-Potential Law Enforcement Liabilities, http://www.forensics-intl.com/art3.html (Last visited March 3, 2003)
Haase, N.: Computer Forensics: Introduction to Incident Response and Investigation of Windows NT/2000, http://www.sans.org/rr/incident/comp_forensics3.php (Last visited March 5, 2003)
(NSWCA) NSW Crimes Amendment (Computer Offences) Bill 2001, http://www.oznetlaw.net/pdffiles/CrimesAmendmentBill_2001.pdf (Last visited May 28, 2003)
(NSWEA) NSW Evidence Act 1995, http://www.austlii.edu.au/au/legis/nsw/consol_act/eal99580/ (Last visited May 25, 2003)
(NTI) New Technologies Inc (NTI.), http://www.forensics-intl.com/ (Last visited June 3, 2003)
(NTICEPS) New Technologies Inc.: Computer Evidence Processing Steps, http://www.forensics-intl.com/evidguid.html (Last visited December 15, 2002 )
Palmer, G.L.: Forensic Analysis in the Digital World, http://www.ijde.org/docs/forensic_analysis.pdf (Last visited May 16, 2003)
Stephenson, P.: Investigating Computer-Related Crime. CRC Press, Boca Raton (2000)
PMSEIC Working Group on Science, Crime Preevention & Law Enforcement, Science, Crime Prevention and Law Enforcement (June 2, 2000), http://www.dest.gov.au/science/pmseic/documents/Crime.pdf (Last visited December 10, 2002)
Grace, S.: Computer Incident Response and Computer Forensics Overview, http://www.sans.org/rr/incident/IRCF.php (Last visited March 6, 2003)
Kaatzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Technique for Steganography and Digital Watermarking. Artech House, Boston (2000)
Rude, T.: Next Generation Data Forensics & Linux, http://www.crazytrain.com/monkeyboy/Next_Generation_Forensics_Linux.pdf (Last visited April 25, 2002)
Sammes, T., Jenkinson, B.: Forensic Computing - A Practitioner’s Guide. Springer, London (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, X., Seberry, J. (2003). Forensic Computing. In: Johansson, T., Maitra, S. (eds) Progress in Cryptology - INDOCRYPT 2003. INDOCRYPT 2003. Lecture Notes in Computer Science, vol 2904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24582-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-24582-7_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20609-5
Online ISBN: 978-3-540-24582-7
eBook Packages: Springer Book Archive