Personal Privacy, Ethics, Crime, and Legal Issues
- Icove, D. Computer Crime. O'Reilly, 1996.
 - Rothfeder, J. Privacy For Sale: How Computerization has made everyone's private life an open secret. Rothfeder, 1992.
 - Hoffman, L. Building in Big Brother: The Cryptographic Policy Debate. Springer-Verlag, 1995.
 - Bloombecker, J.Introduction to Computer Crime. National Center for Computer Crime Data, 1988.
 - Cavazos, E. and Morin, G. Cyberspace and the Law: Your Rights and Duties in the On-Line World. MIT Press, 1994.
 - Cunningham, W. et al Private Security Trends 1970-2000. The Hallcrest Report II. Hallcrest, 1990.
 - Johnson, D. Computer Ethics. Prentice-Hall, 1994 (2nd edition).
 - Forester, T. and Morrison, P.Computer Ethics. MIT Press, 1994 (2nd edition).
 
Computer Forensics
- The Honeynet Project's Forensic Challenge
 - Basic Steps in Forensic Analysis of Unix Systems, David Dittrich (Pasos BАsicos en AnАlisis Forense de Sistemas GNU/Linux, Unix, modified, updated and translated to Spanish by Ervin S. Odishoo)
 - Course notes for Black Hat '00 Unix forensics class, Dominique Brezinski and David Dittrich
 - The Coroner's Toolkit
 - Dan Farmer & Wietse Venema's class on computer forensic analysis
[ forensics.tar.gz contains the slides in 6-up portrait PostScript format for printing on just 25 double-sided pages] - Forensic Computer Analysis: An Introduction -- Reconstructing past events, By Dan Farmer and Wietse Venema, Dr. Dobb's Journal, September 2000
 - What Are MACtimes?: Powerful tools for digital databases, By Dan Farmer, Dr. Dobb's Journal, October 2000
 - Strangers In the Night: Finding the purpose of an unknown program, by Wietse Venema, Dr. Dobb's Journal, November 2000
 - Computer Forensics Column, Errata
 - The Law Enforcement and Forensic Examiners Introduction to Linux, a Beginner's Guide, Barry J. Grundy, NASA Office of the Inspector General
 - Brian Carrier's Sleuthkit (formerly TASK, formerly TCT-Utils)
 - Sleuthkit
 - Autopsy Browser
 - Sleuthkit Informer
 - Notes on updating Red Hat Linux 7.1 to support >2GB images with TCT, TCTUTILS & Autopsy (see also Large File Support in Linux)
 - Forensic Analysis of a Compaq RAID-1 Array and Using dd with EnCase v3, by Keith J. Jones
 - Forensic Analysis Using FreeBSD - Part 1 by Keith J. Jones
 - Organizations/conferences
 - International Organisation on Computer Evidence
 - European Network of Forensic Science Institutes -- Forensic information technology Working group
 - International Association of Computer Investigative Specialists (IACIS)
 - Law and Legal Process
 - Judicial Gatekeeping in Texas, by Thomas F. Allen, Jr. and Robert Rogers, Harvard Law School '99 (Daubert)
 - Admissibility of Scientific Evidence Under Daubert
 - Frye v. United States 293 F. 1013 (D.C. Cir. 1923)
 - Rules of Evidence, Harvard School of Law
 - Digital Timestamping
 - Stamper digital timestamping service
 - Internet X.509 Public Key Infrastructure Time Stamp Protocol (TSP)
 - What is digital timestamping?, RSA Cryptography FAQ section 7.11
 - Secure Time/Date Stamping in a Public Key Infrastructure, Surety.com White Paper (PDF)
 - Time Stamp Protocol, by Byun, Jung-Soo
 - Time is of the Essense: Electronic documents will only stand up in court if the who, what, and when they represent are unassailable, by Charles R. Merrill, CIO.com, March 15, 2000
 - How to Time-Stamp a Digital Document (PostScript), by Stuart Haber and W. Scott Stornetta, Journal of Cryptology, Vol. 3, No. 2, pp. 99-111 (1991)
 - Improving the Efficiency and Reliability of Digital Time-Stamping (PostScript), by Dave Bayer, Stuart Haber, and W. Scott Stornetta, in Sequences II: Methods in Communication, Security, and Computer Science, eds. R. Capocelli, A. DeSantis, and U. Vaccaro, pp. 329-334, (Springer-Verlag, 1993)
 - Secure Names for Bit-Strings (PostScript), by Stuart Haber and W. Scott Stornetta, in Proceedings of the 4th ACM Conference on Computer and Communication Security, (ACM, 1997).
 - Guidelines and standards
 - Electronic Crime Scene Investigation: A Guide for First Responders, National Institute of Justice, NCJ 187736, 2001
 - Forensic Examination of Digital Evidence: A Guide for Law Enforcement, National Institute of Justice, NCJ 199408, 2004
 - U.S. Department of Energy Computer Forensic Laboratory's First Responder's Manual (PDF)
 - Handbook of Legislative Procedures of Computer and Network Misuse in EU Countries (CSIRT Project Survey)
 - Federal Guidelines for Searching and Seizing Computers, U.S. Deptarment of Justice
 - Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, Computer Crime and Intellectual Property Section, Criminal Division, United States Department of Justice, January 2001 (PDF Version)
 - Field Guidance on New Authorities (Redacted), enacted in the 2001 Anti-terrorism Legislation ("USA Patriot Act"), issued by the Department of Justice
 - How the FBI Investigates Computer Crime, CERT Coordination Center
 - Evidence Examinations -- Computer Examinations, Handbook of Forensic Services, U.S. Department of Justice, FBI
 - Digital Evidence: Standards and Principles, Forensic Science Communications, US DoJ, April 2000, Volume 2, Number 2
 - Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, US DoJ, October 2000, Volume 2, Number 4
 - RFC 3227: Guidelines for Evidence Collection and Archiving, by Dominique Brezinski and Tom Killalea
 - An Introduction to the Field Guide for Investigating Computer Crime, by Timothy E. Wright (Security Focus Incident Handling focus)
 - The Field Guide for Investigating Computer Crime: Overview of a Methodology for the Application of Computer Forensics, by Timothy E. Wright (Security Focus Incident Handling focus)
 - The Field Guide for Investigating Computer Crime: Search and Seizure Basics, by Timothy Wright (Security Focus Incident Handling focus)
 - Recovering from an Intrusion, by /dev/null
 - Interviews
 - Info.sec.radio segment on forensics (@15:45.0), July 10, 2000
 - SecurityFocus interview with Jennifer Grannick
 - SecurityFocus interview with Chad Davis
 - Books
 - List of books on forensics compiled by Jeimy J. Cano, Universidad de los Andes
 - Articles/Journals
 - International Responses to Cyber Crime
 - International Journal of Digital Evidence
 - Sleuthkit Informer
 - Open Source Digital Forensic Tools: The Legal Argument, by Brian Carrier, @stake
 - Computer forensics specialists in demand as hacking grows, by Suzanne Monson, Special to The Seattle Times, September 8, 2002
 - Electronic Data Discovery Primer, by Albert Barsocchini, Law Technology News, August 28, 2002
 - Solving the Perfect Computer Crime, by Jay Lyman, February 27, 2002
 - NT Incident Response Investigations and Analysis, by Harlan Carvey, Information Security Bulletin, June 2001
 - "A harder day in court for fingerprint, writing experts: US judge limits testimony of forensic analysts, in a ruling that might alter how evidence is presented at trial," by Seth Stern, Christian Science Monitor, January 16, 2002
 - Cybersleuthing solves the case (and related stories) by Deborah Radcliff, Computerworld, January 14, 2002
 - Digital sleuthing uncovers hacking costs, by Robert Lemos, Special to CNET News.com, March 22, 2001
 - "Intrusion Detection Systems as Evidence", by Peter Sommer, Computer Security Research Centre, London School of Economics & Political Science
 - Advancing Crime Scene Computer Forensic Techniques, by Chet Hosmer, John Feldman, and Joe Giordano
 - Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, FBI, October 2000
 - Analysis: The forensics of Internet security, by Carole Fennely, SunWorld (via CNN), July 26, 2000
 - September 2000 Market Survey -- Computer Forensics, by James Holley, SC Magazine (ranks Linux dd a Best Buy! ;)
 - Cybercops Need Better Tools -- Law enforcement agencies are falling behind hackers, says exec of CIA tech incubator, by Matthew Schwartz, Computerworld, July 31, 2000
 - Crime Seen (Cover story on digital forensics), by Bill Betts, Information Security Magazine, March, 2000
 - Disk Shows Love Bug-Like Virus, by Dirk Beveridge, AP, May 16 2000
 - Computer Forensics: Investigators Focus on Foiling Cybercriminals, by Illena Armstrong, SC Magazine (cover story), April 2000
 - CD Universe evidence compromised -- Failure to protect computer data renders it suspect in court, by Mike Brunker and Bob Sullivan, MSNBC, June 7, 2000
 - Crime & Clues -- The Art and Science of Criminal Investigation
 - FBI Forensic Science Communications
 - Reverse engineering
 - Reverse Engineering Malware, by Lenny Zeltser, May 2001
 - The Honeynet Project's Reverse [engineering] Challenge
 - Fenris, by Michal Zalewski, BINDVIEW
 - Other open source reverse engineering tools listed by Michal Zalewski
 - Using fenris on the Honeynet Project Reverse Challenge binary
 - Using fenris on burneye protected binaries
 - Linux tools for Reverse Engineering at Packet Storm
 - LinuxAssembly.org resources
 - Linux Assembly HOWTO, by Konstantin Boldyshev and FranГois-RenИ Rideau
 - Programmer's Tools Decompiler/Dissassembler page
 - Linux Kernel Internals (especially the "How System Calls Are Implemented on i386 Architecture chapter)
 - The Decompilation Page at the University of Queensland
 - IDA Pro Disassembler (commercial product, multi-platform/OS) [older freeware version]
 - GDB tutorial
 - Gnu GDB docs
 - Cornell Theory Center Totorial on GDB
 - Norm Matloff's Debugging Tutorial
 - UNIX Kernel Stack Overflows, SunSolve Online Infodoc
 - The Solaris Memory System: Sizing, Tools and Architecture (PDF)
 - SE Toolkit (Sun memory management tuning utility)
 - Anti-Forensics (Note: Use these on an isolated analysis system)
 - SecuriTeam.com TESO Burneye Unwrapper
 - Advanced in ELF Runtime Binary Encryption - Shiva, by Neil Mehta, Blackhat USA 2003 (PDF)
 - Unpackers/decrypters/unprotectors (Generic/universal unpackers/deprotectors/dumpers)
 - Packer and Unpackers
 - EXEStealth executable protection
 - Generic ExeStealth Unpacker v1.0
 - Encryption/Stegonography
 - Steganalysis - Attacks against Steganography and Watermarking - Countermeasures - , by Neil F. Johnson
 - Defeating Statistical Steganalysis, CITI, University of Michigan
 - Forensic analysis tools and related software
 - Fingerprint databases
 - The Solaris Fingerprint Database
 - known goods
 - The NIST National Software Reference Library (NSRL)
 - Rootkit identification utilities
 - Rootkit Hunter
 - chkrootkit
 - File system integrity checking tools
 - Osiris
 - AIDE
 - FTimes and HashDig
 - FLAG (Forensic Log Analysis GUI), from the Australian Defence Signals Division
 - Time Zone Converter
 - Knoppix Security Tools Distribution (STD)
 - Penguin Sleuthkit (a remaster of Knoppix)
 - The FIRE (formerly known as "Biatchux") bootable CD-ROM forensic toolkit
 - Open Source Windows Forensic Tools for Windows
 - Open Source Windows Forensic Tools for Unix
 - chkwtmp (SunOS 4.x)
 - chklastlog (SunOS 4.x)
 - NT Objectives was mentioned in a DEFCON talk on forensics. They produce a free toolkit (that lets you do the same thing as find does for free on Unix!)
 - NTI Information & Resource Page (Mostly Windows-specific instructions, but some general forensic guidelines)
 - Slashdot thread on wiping hard drive contents
 - Put A Trace On It: A Command You Can ``truss'', SunSolve Online document
 - Signatures of Macintosh files
 - DD'©ҐUltimate Guide to Mac OS Forensics
 - Forensic analysis or related hardware
 - Hard Disk Removal, Sanderson Forensics
 - Customer Installable Parts, Apple Computer
 - WiebeTECH (Fire Wire docking devices)
 - FIREVue FireWire 400 / IDE Bridge Boards
 - DK-9 Removable Hard-Drive Enclosure USB 2.0 + Firewire 1394 with Ultra Quiet Cooling Fan
 - Forensic-Computers.com
 - F.R.E.D.D.I.E.
 - The Image MASSter Solo 2 Forensic system
 - Daten Airbag (hard drive write protection)
 - Centurion Guard
 - AgatИ USB hard drive
 - Partitioning/File system documentation
 - Windows NT Boot Process and Hard Disk Constraints, Microsoft Knowledge Base Article 114841
 - See "Splitting the Disk" in Sleuthkit Informer #2
 - Sleuthkit Media Management Tools
 - Linux Resource: Top: Kernel: File Systems
 - Ext2fs Home Page
 - Ext3 for the 2.2 kernel
 - SGI's XFS Port to Linux
 - IBM's JFS Port to Linux
 - >
 - FAT: General Overview of On-Disk Format, Microsoft
 - Microsoft Extensible Firmware Initiative FAT32 File System Specification, Microsoft
 - Linux Magic Numbers
 - JPEG File Interchange Format (JFIF)
 - The proposed Filesystem Hierarchy Standard [PDF file] (Directories/files, their locations, and intended purposes: A good topographic map of Unix filesystems.)
 - Journal File Systems, by Juan I. Santos Florido
 - Large File Support in Linux
 - Destruction/Recovery of data
 - Safe destruction of hard drives (This is good! ;)
 - Zapping data on CDs! (NICE light show!)
 - Unlocking a password protected harddisk (ATA Security Mode features), by the Rockbox Crew
 - Incident costs, damage estimation, and risk analysis
 - Project Develops Model for Analyzing Security Incident Costs in Academic Computing Environments
 - A Study on Incident Costs and Frequencies, by Virginia Rezmierski <>, Adriana Carroll <>, and Jamie Hine
 - Security Attribute Evaluation Method: A Cost Benefit Approach, by Shawn Butler, Carnegie Mellon University, International Conference on Software Engineering 2002 (ICSE 2002) Proceedings
 - Multi-Attribute Risk Assessment, by Shawn Butler, Carnegie Mellon University, Proceedings from Symposium on Requirements Engineering for Information Security (SREIS 2002)
 - Attack Trees: Modeling security threats, by Bruce Schneier, Dr. Dobb's Journal, December 1999
 - Attack Modelling for Information Security and Survivability, Andrew P. Moore, Robert J. Ellison, Richard C. Linger, Technical Note CMU/SEI-2001-TN-001, March 2001
 - A Quick Tour of Attack Tree Based Risk Analysis Using Secur/Tree, whitepaper by Amenaza.com, May 2002
 - Other documents/terms/legal resources
 - Forensic Examination of a RIM (Blackberry) Wireless Device, by Micheal W. Burnette, June 2002
 - What is RAID?
 - Linux DTP Hardware RAID HOWTO, by Ram Samudrala, v1.6, February 20, 2002
 - Computer/High-Tech Crime and Related Sites
 - Resources for High-Tech Crime Units, Officer.com
 - What is "Bates Numbering?"
 - Forensics Links from
 - Certificate/Degree Programs
 - A university in Texas is offering a cybersecurity degree program, by Sandra Swanson, Informationweek, May 3, 2002
 - U.T. Dallas To Establish Digital Forensics And Security Institute To Help Fight Cybercrime, University of Texas, Dallas, press release, May 1, 2002
 - University of New Haven Forensic Computer Investigation Program
 - Graduate Certificate Program in Computer Forensics (GCCF), University of Central Florida
 - UCF's list of University Programs/Courses in Computer Forensics [PDF]
 - Georgetown Institute for Information Assurance
 - Dan J. Ryan's Educational Materials
 - Johns Hopkins University Information Security Institute
 - Carnegie Mellon University Information Networking Institute (a C3S affiliated program)
 - Syracuse University Information Security Management Program
 - Dartmouth University Institute for Security Technology Studies
 - Purdue University CERIAS Information Assurance Education Graduate Certificate Program
 - Jobs
 - Where to Look for Security Jobs, By Deborah Radcliff, Computerworld, June 3, 2002
 - High demand for tech detectives , by Bob Weinstein, Suntimes, February 4, 2001
 
