WEBCAST: The workshop was webcast live. <<Please visit this page to access the webcast>>. The webcast will be available for playback approximately one week after the event.
The Webcast will be streamed in medium bandwidth (350kbs), so viewers needed to have a constant connection during the webcast.
Hardware and operating system configurations:
- Windows XP (Internet Explorer or Firefox)
- Windows Vista (Internet Explorer or Firefox)
- Windows 7 (Internet Explorer or Firefox)
- Apple Mac OS 10.5x (Firefox or Safari)
- Ubuntu Linux (Firefox only)
In order to access the event, you must have, at a minimum, Flash Player 10.x installed on your computer. Please visit http://get2.adobe.com/flashplayer/ to download the Flash Player.
In order to access the event, you must have either Microsoft Internet Explorer 6.0+ or Mozilla Firefox 3+ browser for Windows operating systems. For accessing events via Mac operating systems you must have Mozilla Firefox 3+ or Safari 4.x.
- Mobile forensics A – Z
- Mobile forensics tool testing at NIST
- Acquisition techniques
- Mobile forensics in academia
- Is mobile device forensics actually 'forensics'?
- Open-source, Blackberry, and Apple forensics
- Chip-off technology and JTAG analysis tools
- Real-world applications and case work
Goal:To educate attendees on the latest developments in the forensic analysis of mobile devices and how technologies are used in casework. The information provided will increase the situational awareness of investigators and criminal justice stakeholders across the United States about the latest trends, analysis protocols, and issues encountered when applying analysis tools to mobile devices.
- Discuss a broad range of technical mobile forensic topics, from basic to advanced concepts
- Discuss mobile forensic research needs from academic and practitioner perspectives
- Discuss mobile device forensics - is it actually 'forensics'
- Discuss the real-world application of mobile forensic analytical tools
- Allow participants to ask questions directly of mobile forensics experts
Rick Ayers, NIST, Mobile Forensics Tool Testing at NIST
Sam Brothers, DHS, Acquisition Techniques: Mobile Forensics from A to Z
Kevin Mansell, Control-F Digital Forensics, Anybody Seen a Career Path Around Here?
Gary Kessler, Gary Kessler Associates, Is Mobile Device Forensics Actually "Forensics"?
Shafik Punja, Teel Technologies, Blackberry Forensics
Heather Mahalik, Basis Technology, Open-Source Mobile Forensics
Rick Mislan, Rochester Institute of Technology, Current State of Mobile Forensics in Academia
Cindy Murphy, Madison, Wisconsin, Police Department, Mobile Malware and Spyware Apps: Working Through the Bugs
Daren Melson, Wal-Mart, Real-World Mobile Forensics: The Intersection of Research, Academia and Case Work