DFRWS 2015 EU - Call for Forensic Challenge

Digital Forensic Research Workshop 2015 EU is currently calling for Forensic Challenge proposals.
See the CFC
Deadline: January 31st, 2015


The DFRWS Conference is soliciting proposals from individuals or teams interested in creating the next DFRWS Forensics Challenge.
<div class="separator" style="clear: both; text-align: center;"></div>
The goal of this and past annual challenges is to spur advances in the state of the art in research into forensic tools and techniques. Past challenges have resulted in meaningful progress in memory analysis for Windows and Linux systems, novel approaches to carving files out of unallocated disk space, and techniques for reconstructing data dumped directly from NAND flash chips. By design, DFRWS challenges have resulted in the creation of software that has enriched the analytical arsenal available to the forensic community.

We are seeking 2015 challenge proposals of equal ambition and impact. At the same time, challenges must be multifaceted, consisting of component problems at various levels of difficulty to encourage broader participation and permit their reuse in a variety of settings. Please review prior challenges and solutions singleed at http://www.dfrws.org/archives.shtml for examples. A modest budget is available to meet direct expenses associated with the creation of the challenge.

By creating the challenge, you get to help steer digital forensics research. If you encounter problems that are not solved by the currently available tools, then make it into a challenge. We will give your team full credit on the website and in all challenge promotional efforts.

1 min read

Korea’s Fight Against Cyber Crime

We are at a turning point in human history. Artificial intelligence has – for the first time – fooled a group of humans into thinking that it too was humani. While this achievement opens up a number of opportunities for science, technology and even a better understanding of what it is to ‘be human’, it also allows for more sophisticated types online crime and attacks against citizens, businesses and governments alike.

<div class="separator" style="clear: both; text-align: center;"></div>For many technologies, Korea leads the world in adoption and development. This is made possible by some of the fastest, least expensive and widely-available Internet infrastructure. Technology is now an everyday part of the average Korean’s life; in business and leisure. However, this makes Korea both a growing target and host for all types of global digital crime.

Much like technology adoption, Korea has also been ahead of most countries in attempting to combat cybercrime. Starting with a single cyber crime unit in 1997, protecting Korea’s citizens from online crime quickly became an obvious need. This led to the creation of a “Cyber Crime Squad”, and eventually the Cyber Terror Response Center with more than 1000 investigators specially recruited for their technical knowledge and abilities. At this point, Korea had the most cyber investigators per capita of any country, and because of the forward-thinking “Special Recruitment Program”, also some of the most knowledgeable cyber-investigators in the world. However, cyber crime continues to grow rapidly, an even with knowledgeable investigators it is impossible to keep up. In 2014, Korea needs to again expand its cyber crime investigation capabilities if it wants to continue to effectively fight digital crime, investigate new and more sophisticated attacks, and prevent the digital crimes of the future.

On June 11th, 2014 Korea is again attempting to meet the challenges of the future by creating the new “Cyber Bureau”. This Bureau will have a Cyber Safety division, a Cyber Crime Response Division and a Digital Forensics Center.

With the growing amount and sophistication of cyber attacks, there is no doubt that Korea needs a Cyber Bureau. It needs more dedicated, knowledgeable people looking at the problem of cyber crime both nationally and internationally. Unfortunately, Human Resources within the Korean Police are completely corrupt. Further, the Korean Police are too busy dividing themselves by schools or regions rather than remembering that they are all Police, all Korean. And finally, most Korean Police – much like the rest of Korean society – put their own life, their own career, their own promotions first. The result of these things, and much more, is that most people in the Bureau should not be there. Korea has lost years of cyber crime management experience by promoting those who have none, and is now completely under utilizing Police from the Special Recruitment program. Korea needs a Cyber Bureau. But the primary purpose of the Cyber Bureau that was created is to create more promotion opportunities, not to fight cyber crime. The creation of the Cyber Bureau could have launched Korea’s cyber investigation capabilities several years ahead. Instead, it is now five to ten years behind where it was.

I urge the Cyber Bureau to prove me wrong. Prove to me that the Cyber Bureau will more effectively investigate cyber crime in Korea; prove that it will begin to focus more on the prevention of cybercrime while still respecting basic Human Rights; prove that it will actually lead the World in cyber investigation best practices and international cooperation; prove that Police can introduce intelligence and planning into their decision-making processes; prove to me that the Police care about Korea. Because if the Bureau does not do these things, then it is willing to put people at risk for selfish gain – just like 유병언 cared more about himself than who he might hurt.

1. http://www.independent.co.uk/life-style/gadgets-and-tech/computer-becomes-first-to-pass-turing-test-in-artificial-intelligence-milestone-but-academics-warn-of-dangerous-future-9508370.html

3 min read

[CFP] ICDF2C 2014 Submissions Due

Just a quick reminder that submissions for the 6th International Conference on Digital Forensics & Cyber Crime are due THIS FRIDAY (May 16, 2014). See submission details here: http://d-forensics.org

ICDF2C 2014, 6th International Conference on Digital Forensics & Cyber Crime, will take place in New Haven, Connecticut, United States, September 18–20, 2014.

<div class="separator" style="clear: both; text-align: center;"></div>

~1 min read

Ubuntu 14.04 (Trusty Tahr) Long Term Support Released

Ubuntu 14.04 LTS has been released.
This version includes a number of “under the hood” updates. Some of the most notable are:
<ul><li>Linux Kernel 3.13</li><li>Python 3.4</li><li>AppArmor Updates</li><li>Oxide</li></ul><div>Ubuntu Desktop and Ubuntu Server also received a number of updates. See the release notes for full documentation.</div><div>
</div><div>If you are interested in upgrading or trying out Ubuntu, you can download the official ISOs using their torrents:</div><div>
<ul><li>Ubuntu 14.04 LTS Desktop (32-bit)›</li><li>Ubuntu 14.04 LTS Desktop (64-bit)›</li><li>Ubuntu 14.04 LTS Server (32-bit)›</li><li>Ubuntu 14.04 LTS Server (64-bit)›</li></ul>
<div>Alternatively, you can head on over to the downloads page to get the latest ISO from one of the Ubuntu mirrors.

<div class="separator" style="clear: both; text-align: center;">Ubuntu 14.04 Turst Tahr Screen Shot of Unity on Startup</div>

This update also means approximately 1 month until Linux Mint 17 is released!</div></div>

~1 min read

[CFP] World Forensic Festival 2014

World Forensic Festival, Oct. 12 - 18, 2014 in Seoul, South Korea.
Abstract submission due: May 31, 2014
Program site: http://wff2014korea.org/

World Forensic Festival 2014 at Seoul, South Korea

Scholarships and various other awards are available. Please see: http://wff2014korea.org/abstract/award.php

Abstract Topics - IAFS

<ul><li>Clinical Forensic Medicine</li><li>Forensic Pathology</li><li>Cyber Forensic</li><li>Forensic Psychiatry / Behavioral Science</li><li>Digital and Multimedia Science</li><li>Trace Evidence / Forensic Chemistry</li><li>Ethics / Law / Education / QAQC</li><li>Gun / Firearms</li><li>Fingerprint</li><li>Marine Forensic</li><li>Forensic Anthropology</li><li>Mass Disaster</li><li>Forensic Engineering Science</li><li>Questioned Document</li><li>Forensic Genetics & Biology</li><li>Scene Investigation</li><li>Forensic Odontology</li><li>Toxicology / Illicit Drugs</li></ul>

Abstract Topics - AFSN

<ul><li>Crime Scene Investigation</li><li>Toxicology</li><li>DNA</li><li>Trace Evidence</li><li>Illicit Drugs</li><li>Quality Assurance & Standards</li></ul>

~1 min read

[CFP] DFRWS 2014 Forensic Challenge: Mobile Malware Analysis

See the challenge page for more information:

Submission deadline: May 30, 2014

Mobile Malware Analysis
The overall goal of this challenge is to raise the state of the art in digital forensic practice by providing an open public venue for a best-of-breed competition. We challenge contestants to demonstrate effective methods and to develop open source tools for analyzing mobile malware. The winner will be announced in August at the DFRWS USA 2014 conference in Denver, CO.

Some examples of capabilities we would like to see:

<ul><li>Extracting metadata and components</li><li>Decompiling mobile malware</li><li>Decoding data associated with mobile malware</li><li>Behavioral scanners running on localhost (rather than web-based services)</li><li>Identifying potentially malicious functions</li></ul>
Contestants are encouraged to select malware samples that are interesting from a forensic analysis perspective, and that exhibit many of the challenges presented by mobile malware.

Mobile malware samples can be obtained from various sources from various sources for their analysis, including http://www.malgenomeproject.org, virusshare.com, and http://contagiodump.blogspot.com. Alternately send mail to mobilemalware+subscribegooglegroups(d0t)com.

Two Types of Competition
Submissions will be grouped into two categories to encourage both practitioners and researchers/developers to participate.

Practitioners: Forensic analysis of mobile malware using existing best-of-breed methods and supporting tools. These submissions must include the malware samples that were analyzed, and documentation detailing all methods, tools and findings.

Researchers/Developers: Creation of new techniques and tools for analyzing mobile malware.

When submitting your entry to this challenge, please indicate which category you would prefer. Each team can submit only one entry, either as practitioners or researchers/developers (not both).

1 min read