NIST logo

Biology    Biometric    Chemistry/Toxicology    Environmental    Fire & Explosives    Firearms & Toolmarks    Questioned Documents   
Technology/Digital Evidence    Trace Evidence    Other



Technology/Digital Evidence

Name

Subdiscipline

Maintained
By

Overview
&
Contents

Access
&
Fees

Collection
Method

Evidence
Type

POC

Child Exploitation Obscene Reference File   Federal Bureau of Investigations (FBI) -- Digital Evidence Laboratory Database of scanned images of known child pornography with originality information for magazine images through 1999. Can be used for comparison to seized images. Database includes hundreds of known child pornography images from 1999 and before. Information on originality is also kept. Due to the sensitive nature of the evidence, access is limited to very few FBI image analyst experts. Those seeking access should first contact the POC. No cost to access; access is extremely restricted.   Digital records. Amy Corrigan
Federal Bureau
of Investigations,
Digital Evidence Laboratory
703.985.1202
amy.corrigan@ic.fbi.gov
Child Exploitation Hash Sets Hash Sets, Child Exploitation DHS-ICE, Homeland Security Investigations (HIS) - Cyber Crimes Center (C3) Hash sets of known and suspected child exploitation files found in ICE investigations. Over 700,000 hash sets of known and suspected child exploitation files found in ICE investigations. Access through a FTP site. C3 will make the hash set available to outside law enforcement agencies upon request. No cost to access; ICE forensic agents have access. Outside agencies can submit requests for hash sets. Hash sets are submitted by ICE forensic agents. Digital records Jay Varda
Special Agent /
Program Manager
U.S. Immigration
and Customs Enforcement
Homeland Security
Investigations (HSI)
Computer Forensics
Program – C3
703.293.2309
jay.varda@dhs.gov
Digital Camera Database Digital Cameras Federal Bureau of Investigations (FBI) -- Digital Evidence Laboratory Collection of information on digital camera specifications, user manuals, and other information. Used for research into characteristics of particular makes and models of digital cameras. Collection includes over 500 digital cameras models for reference comparison. Database includes characteristic information on these specimen. Summary database of camera characteristics is available on the FBI intranet. Physical specimen may be requested from the POC. No cost to access; access is restricted to FBI personnel only. Digital cameras are purchased commercially; database is populated by DEL personnel, database coordinator or program supervisor . Physical samples and digital records. Amy Corrigan
Federal Bureau
of Investigations,
Digital Evidence Laboratory
703.985.1202
amy.corrigan@ic.fbi.gov
Law Enforcement Online   Federal Bureau of Investigations (FBI) A controlled-access communications and information sharing data repository. It provides an Internet accessible focal point for electronic Sensitive But Unclassified (SBU) communication and information sharing for the international, federal, state, local, and tribal law enforcement agencies. LEO provides cost-effective, time-critical national alerts and information sharing to public safety, law enforcement, antiterrorism, and intelligence agencies in support of the Global War on Terrorism. It utilizes state-of-the-art commercial off-the-shelf communications services and tools, and provides a user-friendly portal and software for communications and information exchange. Access through the online portal. To gain access permission, you must fill out an access form through the URL. Access is available to the FBI and collaborating agencies. N/A N/A LEO Support Center:
888.334.4LEO
(4536)
National Repository for Digital Forensic Information (NRDFI)   DoD Cyber Crimes Center (DC3), Oklahoma State University A secure and robust knowledge management and communications portal for law enforcement, digital forensic examiners, and cyber investigators to share digital forensic information. Access through the online portal. To gain access, email join@nrdfi.net and provide status and credentials in writing gain login access. Another way to request access is through the DFI Link URL.Access is limited to law enforcement officials and digital forensic examiners from US federal, state, and local law enforcement agencies.     William Eber
DoD Cyber
Crimes Center (DC3)
-- Cyber Crime Institute
410.694.4315
william.eber@dc3.mil
NIST - National Software Reference Library (NSRL) Hash Sets NIST - Software and Systems Division, NIST - Law Enforcement Standards Office Collection of hash values and file names for standard software and operating system files. The primary focus of the NSRL is to aid computer forensics examiners in their investigations of computer systems. In most cases, NSRL file data is used to eliminate known files, such as operating system and application files, during criminal forensic investigations. This reduces the number of files which must be manually examined and thus increases the efficiency of the investigation.  Collection of hash values and file names for standard software and operating system files. The National Software Reference Library collects the original media for off-the-shelf software. This information is processed to obtain digital signatures (also called hashes) that uniquely identify the files in the software packages. Database may be purchased online. The database of file profiles and fingerprints is periodically stored on a CD and shipped to those organizations that have paid for an annual subscription to updates. Freely accessible to the general public through the URL listed. Digital signatures are obtained from off-the-shelf software. Digital records. Douglas R. White
National Institute
of Standards and
Technology
Software and
Systems Division (897)Chemistry (222),
Room B304
100 Bureau Dr., Stop 8970
Gaithersburg, MD 20899-8970
301.975.4761
nsrl@nist.gov
OIG Technology Crimes Division SharePoint Site   Office of Inspector General (OIG) -- Technology Crimes Division The Technology Crimes Division maintains a SharePoint site with digital records of academic articles, reference materials, white papers, etc. relevant to their work. The site contains hundreds of academic articles, reference materials, white papers, etc. relevant to technology crimes. Most of the information is specific to OIG's operations, and thus not useful to external users. However, some reference materials could be useful for anyone conducting a forensic investigation. Some examples of the SharePoint site's contents include: CDs from training classes, instructional materials, reference materials, and structure of a DVD file. Information is accessed through a SharePoint site stored on the internal network. No external access is permitted due to security reasons. No cost to access; external users do not have access. Lab members are encouraged to upload useful information when they receive it so others can search for and reference it. Digital records. Any physical specimen that have to be scanned and uploaded are not included due to time restraints for this process. Mark Smith
Office of
Inspector General (OIG)
-- Technology Crimes
Division
Special Agent in Charge
202.245.7019
Mark.A.Smith@ed.gov

Top of Page