U.S. Secret Service First Responder Computer Forensics
Can I Pull the Plug Now…? Mick Walsh, Special Agent, Miami Electronic Crimes Task Force 29 pages October 21, 2009 THE U.S. SECRET SERVICE Investigates . . . Counterfeit currency Fraud involving U.S....
View ArticleFBI Mobile Forensics: A Path Forward
Mobile Forensics Workshop 24 pages For Official Use Only May 28, 2009
View ArticleU.S. Secret Service Network Intrusion Responder Program (NITRO) Course
National Computer Forensics Institute Instructor’s Manual 155 pages For Official Use Only Law Enforcement Sensitive May 2, 2008 1.95 MB Student Coursebook Vol.1 233 pages For Official Use Only Law...
View ArticleAn Introduction to Computer Forensics Courtesy of the U.S. Secret Service
The complete NITRO course includes an instructor's guide, two student coursebooks, a network configuration guide, as well as more than 1300 presentation slides. Public Intelligence Today, we release...
View ArticleMicrosoft Windows 7/Vista Advanced Forensics Guides for Law Enforcement
Exploration of Windows 7 Advanced Forensic Topics Introduction to Windows 7 171 pages 10 MB Law Enforcement Sensitive ©2007 Microsoft Corporation Windows Vista and NTFS File System Internals 40 pages...
View ArticleU.S. Secret Service: Best Practices For Seizing Electronic Evidence
A Pocket Guide for First Responders v.3 October 9, 2006 GOLDEN RULES There are general principles to follow when responding to any crime scene in which computers and electronic technology may be...
View ArticleElectronic Evidence Compliance: A Guide for Internet Service Providers
BERKELEY TECHNOLOGY LAW JOURNAL Prepared by the U.S. Internet Service Provider Association 42 pages © 2003 U.S. Internet Service Provider Association 1 INTRODUCTION Internet service providers (“ISPs”)...
View ArticleU.S. DOJ Searching and Seizing Computers and Obtaining Electronic Evidence in...
Computer Crime and Intellectual Property Section Criminal Division 299 pages July 2009 Chapter 1 Searching and Seizing Computers Without a Warrant A. Introduction The Fourth Amendment limits the...
View ArticleRapid Enforcement Allied Computer Team (REACT) Task Force
The Silicon Valley High Technology Task Force, also known as the Rapid Enforcement Allied Computer Team (REACT), is a partnership of 17 local, state, and federal agencies, with the Santa Clara County...
View ArticleApple iPhone Password Work-Around
Fort Worth Police Department 13 pages February 26, 2008 If you encounter an Apple iPhone where the phone is locked with a Passcode, keep in mind the hand set only allows 5 Passcode attempts before...
View ArticleGerman Federal Police Forensic Analysis of Cell Phones and SIM Cards
Bundeskriminalamt 14 pages © 2008 Katja Koennecke Technical Service Center of Information and Communication Services Logical and physical analysis of cell phones and SIM cards Cases: Theft, Murder,...
View ArticleCalifornia Computer And Technology Crime High Tech Response Team (CATCH)...
CATCH Task Force Lisa Weinreb, DDA 36 pages December 2003 San Diego’s High Tech Industry Home to Nokia, Ericsson and Motorola have a collective worth of over 536 billion dollars. Including Qualcomm,...
View ArticleHBGary SRA International “Memory Grabber” Forensics Tool White Paper
Memory Grabber White Paper 7 pages May 6, 2010 The purpose of this paper is to describe the SRA Memory Grabber system, which provides memory access to a running and password protected laptop through...
View ArticleiPhone Contains Secret File That Constantly Tracks Your Location
www.youtube.com/watch?v=GynEFV4hsA0 Got an iPhone or 3G iPad? Apple is recording your moves (O’Reilly Media): Today at Where 2.0 Pete Warden and I will announce the discovery that your iPhone, and...
View Article(U//LES) FBI Pre-Deployment Checklist for Cyber Investigations
The following document was obtained from the website of the Oklahoma Bankers Association. The material is part of a collection of several documents provided to banks and financial institutions in the...
View Article