Skip to content

Commit

Permalink
Removed dead references (#203)
Browse files Browse the repository at this point in the history
  • Loading branch information
joachimmetz authored Dec 6, 2023
1 parent ecfd4e4 commit 5f5af12
Show file tree
Hide file tree
Showing 30 changed files with 219 additions and 359 deletions.
6 changes: 3 additions & 3 deletions docs/academic_forensics_programs_graduate_level.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ tags:

## Europe

* [Cranfield University, UK](http://www.cranfield.ac.uk/cds/postgraduatestudy/forensiccomputing/index.jsp)
* Cranfield University, UK
* [Limerick Institute of Technology](http://www.lit.ie/departments/IT/MSC_Computing.html)
* [University of Amsterdam](http://www.studeren.uva.nl/ma-forensic-science)
* University of Bradford
Expand All @@ -61,11 +61,11 @@ tags:

## Africa

* [University of Cape Town](http://www.commerce.uct.ac.za/InformationSystems/Courses/inf4016w/)
* University of Cape Town

## See Also

* [AAFS](http://www.aafs.org/default.asp?section_id=resources&page_id=colleges_and_universities)
* [American Academy of Forensic Sciences (AAFS)](https://www.aafs.org/)
* [Digital Forensics Association List](http://www.digitalforensicsassociation.org/formal-education/)
* [Forensics Focus List](https://forensicfocus.com/computer-forensics-education-directory)
* [Master's Thesis: The Development of a Standard Digital Forensics Master's Curriculum](https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1010&context=techmasters&sei-redir=1#search=%22katie%20strzempka%20thesis%22)
21 changes: 9 additions & 12 deletions docs/bibliography.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,22 +4,19 @@ tags:
---
# Disk Disposal and Data Recovery

- [SSD Forensics 2014. Recovering Evidence from SSD Drives: Understanding TRIM, Garbage Collection and Exclusions](https://belkasoft.com/ssd-2014),
* [SSD Forensics 2014. Recovering Evidence from SSD Drives: Understanding TRIM, Garbage Collection and Exclusions](https://belkasoft.com/ssd-2014),
by Yuri Gubanov and Oleg Afonin, 2014
- [Why SSD Drives Destroy Court Evidence, and What Can Be Done About It](https://belkasoft.com/why-ssd-destroy-court-evidence),
* [Why SSD Drives Destroy Court Evidence, and What Can Be Done About It](https://belkasoft.com/why-ssd-destroy-court-evidence),
by Oleg Afonin and Yuri Gubanov, 2012
- [Disk Imaging: A Vital Step in Data Recovery](https://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf),
* [Disk Imaging: A Vital Step in Data Recovery](https://www.deepspar.com/pdf/DeepSparDiskImagingWhitepaper3.pdf),
DeepSpar Data Recovery Systems, November 2006. An in depth look at the
many issues that cause data loss / irretrievable data in the data
recovery imaging process and how to overcome them.
- [Drive-Independent Data Recovery: The Current State-of-the-Art](https://www.seagate.com/de/de/contacts/),
* [Drive-Independent Data Recovery: The Current State-of-the-Art](https://www.seagate.com/de/de/contacts/),
ActionFront Data Recovery Labs, August 2005.
- [Secure Deletion of Data from Magnetic and Solid-State Memory](recovering_overwritten_data.md#the-gutmann-paper),
* [Secure Deletion of Data from Magnetic and Solid-State Memory](recovering_overwritten_data.md#the-gutmann-paper),
Peter Gutmann, Proceedings of the Sixth Usenix Security
Symposium, 1996.
[1](https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html)
- [Hard Drive Disposal: The Overlooked Confidentiality Exposure](http://www-03.ibm.com/financing/pdf/us/recovery/igf4-a032.pdf),
FInancial Perspectives, IBM White Paper, November 2003.

<bibtex> @Article{garfinkel:remembrance,

Expand All @@ -36,16 +33,16 @@ tags:

# Evidence Gathering

- [Retrieving Digital Evidence: Methods, Techniques and Issues](https://belkasoft.com/retrieving-digital-evidence-methods-techniques-and-issues),
* [Retrieving Digital Evidence: Methods, Techniques and Issues](https://belkasoft.com/retrieving-digital-evidence-methods-techniques-and-issues),
by Yuri Gubanov, 2012
- [Byteprints: A Tool to Gather Digital Evidence](https://ieeexplore.ieee.org/document/1428548),
* [Byteprints: A Tool to Gather Digital Evidence](https://ieeexplore.ieee.org/document/1428548),
Sriranjani Sitaraman, Srinivasan Krishnamurthy and S. Venkatesan,
Proceedings of the International Conference on Information Technology
(ITCC 2005), Las Vegas, Nevada, USA, April 4 - 6, 2005

# Fake Information

- [Automatic Detection of Fake File Systems](https://analysis.mitre.org/proceedings/Final_Papers_Files/84_Camera_Ready_Paper.pdf),
* [Automatic Detection of Fake File Systems](https://analysis.mitre.org/proceedings/Final_Papers_Files/84_Camera_Ready_Paper.pdf),
Neil C. Rowe, International Conference on Intelligence Analysis
Methods and Tools, McLean, Virginia, May 2005.

Expand Down Expand Up @@ -110,6 +107,6 @@ by Brian D. Carrier, Ph.D. Dissertation Purdue University, May 2006

# Other Papers

- [A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782),
* [A Model for When Disclosure Helps Security: What is Different About Computer and Network Security?](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=531782),
by Peter P. Swire, Moritz College of Law of the Ohio State University,
Journal on Telecommunications and High Technology Law, Vol. 2, 2004.
2 changes: 1 addition & 1 deletion docs/bitlocker_disk_encryption.md
Original file line number Diff line number Diff line change
Expand Up @@ -126,4 +126,4 @@ opened on Windows 10 systems and later.
* [libbde](libbde.md)
* [M3 Bitlocker Loader for Mac](https://www.m3datarecovery.com/mac-bitlocker/)
* [M3 Bitlocker Recovery](https://www.m3datarecovery.com/bitlocker-recovery/bitlocker-data-recovery.html)
* [Manage-bde.exe](http://technet.microsoft.com/en-us/library/dd875513(v=ws.10>).aspx)
* [Manage-bde.exe](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-7/dd875513(v=ws.10))
37 changes: 17 additions & 20 deletions docs/computer_forensics.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,19 +46,16 @@ Four things are key to all forensics examinations; the:
All professionals involved in a forensics examination have both an
ethical and a professional responsibility to:

- Maintain their objectivity.
- Present facts accurately and
- Not withhold any findings as such actions may distort or misrepresent
* Maintain their objectivity.
* Present facts accurately and
* Not withhold any findings as such actions may distort or misrepresent
the facts
- Render opinions only on the basis of what can be reasonably
* Render opinions only on the basis of what can be reasonably
demonstrated.

Equivalent or other perspectives on forensic profession:

- [ACFEI - The Forensic Examiner
Creed](http://www.acfei.com/about_acfei/creed/)
- [Forensic Focus Webinar: Being Your Own Expert
Witness](https://forensicfocus.com/c/aid=103/webinars/2015/being-your-own-expert-witness/)
* [Forensic Focus Webinar: Being Your Own Expert Witness](https://forensicfocus.com/c/aid=103/webinars/2015/being-your-own-expert-witness/)

## Terminology

Expand Down Expand Up @@ -87,23 +84,23 @@ without the forensic (legal) context.

## See Also

- [Digital evidence](digital_evidence.md)
- [File Analysis](file_analysis.md)
- [Malware analysis](malware_analysis.md)
- [Memory analysis](memory_analysis.md)
* [Digital evidence](digital_evidence.md)
* [File Analysis](file_analysis.md)
* [Malware analysis](malware_analysis.md)
* [Memory analysis](memory_analysis.md)

## External Links

- [Wikipedia: Computer forensics](https://en.wikipedia.org/wiki/Computer_forensics)
- [Wikipedia: Forensic science](https://en.wikipedia.org/wiki/Forensic_science)
- [Wikipedia: Legal burden of proof](https://en.wikipedia.org/wiki/Legal_burden_of_proof)
- [Computer Forensics: Digital Forensic Analysis Methodology](https://www.justice.gov/sites/default/files/usao/legacy/2008/02/04/usab5601.pdf),
* [Wikipedia: Computer forensics](https://en.wikipedia.org/wiki/Computer_forensics)
* [Wikipedia: Forensic science](https://en.wikipedia.org/wiki/Forensic_science)
* [Wikipedia: Legal burden of proof](https://en.wikipedia.org/wiki/Legal_burden_of_proof)
* [Computer Forensics: Digital Forensic Analysis Methodology](https://www.justice.gov/sites/default/files/usao/legacy/2008/02/04/usab5601.pdf),
from Computer Forensics issue: January 2008 Volume 56 Number 1
- [Computer Forensics Part 2: Best Practices](http://www.isfs.org.hk/publications/ISFS_ComputerForensics_part2_20090806.pdf),
* [Computer Forensics Part 2: Best Practices](http://www.isfs.org.hk/publications/ISFS_ComputerForensics_part2_20090806.pdf),
by Information Security and Forensics Society (ISFS), August 2009
- [The Alexiou Principle](http://thedigitalstandard.blogspot.com/2009/06/alexiou-principle.html?m=1),
* [The Alexiou Principle](http://thedigitalstandard.blogspot.com/2009/06/alexiou-principle.html?m=1),
cepogue, June 27, 2009
- [When Computer Forensics Grows Up: Digital Forensics Explained](https://online.maryville.edu/blog/digital-forensics/),
* [When Computer Forensics Grows Up: Digital Forensics Explained](https://online.maryville.edu/blog/digital-forensics/),
by Maryville University
- Validation and verification of computer forensic software tools - Searching Function
* Validation and verification of computer forensic software tools - Searching Function
by Yinghua Guo, Jill Slay, Jason Beckett, DFRWS 2009
4 changes: 2 additions & 2 deletions docs/conferences.md
Original file line number Diff line number Diff line change
Expand Up @@ -45,8 +45,8 @@ EuroForensics Forensics Sciences, Cyber Security and Surveillance Technologies C
FIRST Conference
<https://www.first.org/conference/>

French-Speaking Days on Digital Investigations - Journées Francophones de l'Investigation Numérique
<http://www.afsin.org/>
[AFSIN: Association francophone des spécialistes de l’investigation numérique](https://new.afsin.org/)
French-Speaking Days on Digital Investigations

IEEE Workshop on Information Forensics and Security
<https://project.inria.fr/wifs2017/>
Expand Down
12 changes: 6 additions & 6 deletions docs/damaged_sim_card_data_recovery.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,12 @@ tags:
---
## Summary

A prerequisite for the use of [SIMIS](http://www.3gforensics.co.uk/), is that
the SIM card must be functional. A physically damaged, broken or dirty SIM may
not function correctly, resulting in the recovery of corrupted data, or no data
at all. In the forensic data recovery environment, SIM's will be presented in a
variety of different conditions, ranging from good, but lightly soiled, through
blood soaked to physically broken. Lightly soiled and blood soaked SIM's may be
A prerequisite for the use of [SIMIS](simis.md), is that the SIM card must be
functional. A physically damaged, broken or dirty SIM may not function
correctly, resulting in the recovery of corrupted data, or no data at all. In
the forensic data recovery environment, SIM's will be presented in a variety of
different conditions, ranging from good, but lightly soiled, through blood
soaked to physically broken. Lightly soiled and blood soaked SIM's may be
cleaned using appropriate methods, ensuring that the SIM is not further damaged
taking care to preserve surface printing where possible.

Expand Down
41 changes: 12 additions & 29 deletions docs/digital_evidence.md
Original file line number Diff line number Diff line change
Expand Up @@ -95,8 +95,7 @@ Computer evidence needs to be:

## External Links

- [Principles of Evidence - Fifth
edition](http://www.lexisnexis.com/supp/lawschool/study/texts/pdf/2011RevisedTM3562.pdf),
- [Principles of Evidence - Fifth edition](http://www.lexisnexis.com/supp/lawschool/study/texts/pdf/2011RevisedTM3562.pdf),
by Irving Younger, Michael Goldsmith, David A. Sonenshein, 2011

### Hearsay
Expand All @@ -105,35 +104,19 @@ Computer evidence needs to be:

### Reasoning

- [Wikipedia: Thesis, antithesis,
synthesis](https://en.wikipedia.org/wiki/Thesis,_antithesis,_synthesis)
- [Wikipedia: Reasoning - Logical reasoning methods and
argumentation](https://en.wikipedia.org/wiki/Reasoning#Logical_reasoning_methods_and_argumentation)
- [Wikipedia: Deductive
reasoning](https://en.wikipedia.org/wiki/Deductive_reasoning)
- [Wikipedia: Inductive
reasoning](https://en.wikipedia.org/wiki/Inductive_reasoning)
- [Wikipedia: Thesis, antithesis, synthesis](https://en.wikipedia.org/wiki/Thesis,_antithesis,_synthesis)
- [Wikipedia: Reasoning - Logical reasoning methods and argumentation](https://en.wikipedia.org/wiki/Reasoning#Logical_reasoning_methods_and_argumentation)
- [Wikipedia: Deductive reasoning](https://en.wikipedia.org/wiki/Deductive_reasoning)
- [Wikipedia: Inductive reasoning](https://en.wikipedia.org/wiki/Inductive_reasoning)
- [Wikipedia: Five Ws](https://en.wikipedia.org/wiki/Five_Ws)

### Standards and best practices

- [IETF RFC 3227, Guidelines for evidence collection and
archiving](https://www.ietf.org/rfc/rfc3227.txt), by The Internet
Society, 2002
- [ACPO Good Practice Guide for Digital
Evidence](http://www.acpo.police.uk/documents/crime/2011/201110-cba-digital-evidence-v5.pdf),
by ACPO, 2012
- [ISO/IEC 27037:2012 - Information technology -- Security techniques --
Guidelines for identification, collection, acquisition and
preservation of digital
evidence](https://www.iso.org/standard/44381.html), by
International Organization for Standardization (ISO)
- [ISO/IEC DIS 27041 - Information technology -- Security techniques --
Guidance on assuring suitability and adequacy of incident
investigative
methods](https://www.iso.org/standard/44405.html),
- [IETF RFC 3227, Guidelines for evidence collection and archiving](https://www.ietf.org/rfc/rfc3227.txt),
by The Internet Society, 2002
- [ISO/IEC 27037:2012 - Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence](https://www.iso.org/standard/44381.html),
by International Organization for Standardization (ISO)
- [ISO/IEC DIS 27041 - Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative methods](https://www.iso.org/standard/44405.html),
by International Organization for Standardization (ISO)
- [ISO/IEC DIS 27042 - Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence](https://www.iso.org/standard/44406.html),
by International Organization for Standardization (ISO)
- [ISO/IEC DIS 27042 - Information technology -- Security techniques --
Guidelines for the analysis and interpretation of digital
evidence](https://www.iso.org/standard/44406.html),
by International Organization for Standardization (ISO)
2 changes: 0 additions & 2 deletions docs/document_metadata_extraction.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,6 @@ The tool can visualize pictures embedded in a document.

[catdoc](https://github.com/petewarden/catdoc)

[laola](http://user.cs.tu-berlin.de/~schwartz/pmh/index.html)

[word2x](https://word2x.sourceforge.net/)

[wvWare](https://wvware.sourceforge.net/)
Expand Down
4 changes: 0 additions & 4 deletions docs/dod_cyber_crime_center.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,10 +26,6 @@ The DC3 was formed in 2001 when the newly created DCCI was merged with
the existing DCFL and DCITA (at the time called the Defense Computer
Investigations Training Program (DCITP).

## Leadership

The Executive Director of the DC3 is [Mr. Steven Shirley](http://www.af.mil/bios/bio.asp?bioID=8478).

## External Links

* [Official website](https://www.dc3.mil/)
8 changes: 4 additions & 4 deletions docs/encfs.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
---
tags:
- File Systems
- Articles that need to be expanded
- Articles that need to be expanded
- File Systems
---
EncFS provides an encrypted file system in user-space. It runs without
any special permissions and uses the FUSE library and Linux kernel
module to provide the file system interface.

## External links

- [Project site](http://www.arg0.net/encfs)

* [Project site](https://github.com/vgough/encfs)
* [Wikipedia: EncFS](https://en.wikipedia.org/wiki/EncFS)
25 changes: 1 addition & 24 deletions docs/full_disk_encryption.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,32 +36,9 @@ available to the public.

Toshiba *Self-Encrypting Drives* ("SED")

### Supplemental Hardware / External Chassis

Addonics product lines
<http://www.addonics.com/products/cipher/CPD256U.asp>

Apricorn product lines
<http://www.apricorn.com/products.php?cat_id=72>

DigiSafe
<http://www.digisafe.com/products/products_DiskCryptMobile.htm>

Eracom Technology DiskProtect
<http://www.eracom-tech.com/drive_encryption.0.html>

iStorage DiskCrypt Mobile
<http://www.istorage-uk.com/diskcryptmobile.php>

Network Appliance (Decru)
<https://www.netapp.com/ftp/decru-fileshredding.pdf>

<https://www.netapp.com/us/products/storage-security-systems/>

## Software Solutions

beCrypt
<https://www.becrypt.com/uk/>
[beCrypt](https://www.becrypt.com/)

BitArmor by [DataControl](datacontrol.md) FDE tool that protects
fixed and removable media.
Expand Down
10 changes: 5 additions & 5 deletions docs/harlan_carvey.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,8 +54,8 @@ basis.

## Books

- *[Windows Registry Forensics](http://www.syngress.com/digital-forensics/Windows-Registry-Forensics/)*
- *[Windows Forensic Analysis](http://www.syngress.com/catalog/index.cfm?pid=4235)*
- *[Windows Forensics and Incident Recovery](http://www.amazon.com/Forensics-Incident-Addison-Wesley-Microsoft-Technology/dp/0321200985/ref=sr_1_3?ie=UTF8&s=books&qid=1200485877&sr=1-3)*
- *[Perl Scripting for Windows Security](https://www.amazon.com/Perl-Scripting-Windows-Security-Monitoring/dp/159749173X)*
- *A Study of Video Teleconferencing Traffic on a TCP/IP Network*
- [Windows Registry Forensics](http://www.syngress.com/digital-forensics/Windows-Registry-Forensics/)
- [Windows Forensic Analysis](http://www.syngress.com/catalog/index.cfm?pid=4235)
- [Windows Forensics and Incident Recovery](https://www.amazon.com/Forensics-Incident-Addison-Wesley-Microsoft-Technology/dp/0321200985/)
- [Perl Scripting for Windows Security](https://www.amazon.com/Perl-Scripting-Windows-Security-Monitoring/dp/159749173X)
- A Study of Video Teleconferencing Traffic on a TCP/IP Network
42 changes: 14 additions & 28 deletions docs/insider_threat_research.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,39 +6,25 @@ tags:

### US Government Reports

- [Predictive Modeling for Insider Threat
Mitigation](http://www.pnl.gov/coginformatics/media/pdf/tr-pacman-65204.pdf),
- [Predictive Modeling for Insider Threat Mitigation](http://www.pnl.gov/coginformatics/media/pdf/tr-pacman-65204.pdf),
PNNL-SA-65204, April 2009
- [Insider Risk Evaluation and
Audit](https://www.dhra.mil/perserec/reports.html#TR0902), PERSEREC TR
09-02, August 2009
- [Ten Tales of Betrayal: The Threat to Corporate Infrastructures by
Information Technology Insiders Analysis and
Observations](https://www.dhra.mil/perserec/reports.html#TR0513),
- [Insider Risk Evaluation and Audit](https://www.dhra.mil/perserec/reports.html#TR0902),
PERSEREC TR 09-02, August 2009
- [Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations](https://www.dhra.mil/perserec/reports.html#TR0513),
PERSEREC TR 05-15 September 2005
- [Technological, Social, and Economic Trends That are Increasing U.S.
Vulnerability to Insider
Espionage](https://www.dhra.mil/perserec/reports.html#TR0510), PERSEREC
TR 05-10 May 2005
- [Changes in Espionage by Americans:
1947-2007](https://sgp.fas.org/library/changes.pdf), Katherine L.
Herbig, PERSEREC TR 08-05, March 2008.
- [Technological, Social, and Economic Trends That are Increasing U.S. Vulnerability to Insider Espionage](https://www.dhra.mil/perserec/reports.html#TR0510),
PERSEREC TR 05-10 May 2005
- [Changes in Espionage by Americans: 1947-2007](https://sgp.fas.org/library/changes.pdf),
by Katherine L. Herbig, PERSEREC TR 08-05, March 2008.

### Presentations

- [Insider Threats: Hidden
Risks](http://www.bus.lsu.edu/fraud/2010/barbee.pdf), Russell Barbee
(DHS), 2010 Fraud and Forensic Accounting Conference, Louisiana State
University
- [Insider Threats: Hidden Risks](http://www.bus.lsu.edu/fraud/2010/barbee.pdf),
by Russell Barbee (DHS), 2010 Fraud and Forensic Accounting Conference,
Louisiana State University

## External Links

- [Centre for the Protection of National Infrastructure (UK) Insider
data collection
study](http://www.cpni.gov.uk/advice/Personnel-security1/Insider-threats/)
- [Software Engineering Institute (CMU) Insider Threat
Center](https://www.sei.cmu.edu/certsite/insider_threat/)
- [Defense Personnel and Security Research Center
(PERSEREC)](https://www.dhra.mil/perserec/)
- [Insider Threat
Page](https://www.dhra.mil/PERSEREC/OSG/t1threat/insider-threat/)
- [Software Engineering Institute (CMU) Insider Threat Center](https://www.sei.cmu.edu/certsite/insider_threat/)
- [Defense Personnel and Security Research Center (PERSEREC)](https://www.dhra.mil/perserec/)
- [Insider Threat Page](https://www.dhra.mil/PERSEREC/OSG/t1threat/insider-threat/)
1 change: 0 additions & 1 deletion docs/internet_explorer_history_file_format.md
Original file line number Diff line number Diff line change
Expand Up @@ -220,7 +220,6 @@ deleted.

## Tools

* [IEHist](http://www.cqure.net/wp/iehist/)
* [libmsiecf](libmsiecf.md)
* [pasco](https://sourceforge.net/projects/odessa/), note this tool has
not been updated since 2004 and is considered deprecated
Expand Down
Loading

0 comments on commit 5f5af12

Please sign in to comment.