The Association of Digital Forensics, Security and Law (ADFSL)
Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an advantage over participants with a criminal justice background. Study participants were volunteers ranging in age from 20 to over 60 and had a variety of backgrounds and prior work experience. Volunteers completed a timed trial comprised of four timed subtasks. Results were compared for both quality and speed in task. Qualitative, quantitative and observational data were gathered throughout the course of this study. Data gathered by this research study indicated that while students in the campus cohort were able to complete the subject trial within a 10% variance of those in the workshop cohort, the quality of the tasks completed was not within the 10% variance.
Al-Zarouni, M. (2007). Introduction to mobile phone flasher devices and considerations for their use in mobile phone forensics. Proceedings of the 5th Australian Digital Forensics Conference, Edith Cowan University, P. Perth Western Australia: Research Online.
Al-Zarouni, M. (2006). Mobile handset forensic evidence: a challenge for law enforcement. 4th Australian Digital Forensics Conference. Perth Western Autralia: Research Onlin.
Bergslien, E. (2006). Teaching to avoid the "CSI effect": keeping the science in forensic science. Journal of Chemical Education, 83 (5), 690-691.
Breeuwsma, M., de Johngh, M., Klaver, C., van der Knijff, R., & Roeloffs, M. (2007). Forensic data recovery from flash memory. Small Scale Digital Device Forensics Journal, 1 (1), 1-17.
Campbell, M. (2012, December 27). Apple Insider. Retrieved December 31, 2012, from appleinsider.com: http://appleinsider.com/articles/12/12/27/christmas-2012-17m-ios-and-android-device-activated-87-jump-in-app-store-downloads
Cantrell, G. (2012). Creation and resting of a semi-automated digital triage process model. Mississippi State University.
Casey, E., Bann, M., & Doyle, J. (2010). Introduction to window mobile forensics. Digital Investigation, 6, pp. 136-146.
Elder, R. (2012, May-June). Chip-off and JTAG analysis for mobile device forensics. Evidence Magazine, 10 (3), pp. 10-15.
Garfinkel, S., Farrell, P., Rousseu, F., & Dinolt, G. (2009). Bringing science to digital forensics with standardized forensic corpora. Digital Investigations, 6 (S), pp. 2-11.
Hoog, A. (2011). Android forensics: investigation, analysis and mobile security for google android. Waltham, MA, USA: Syngress.
Houck, M. (2006). CSI: Reality. Scientific American, 295 (1), 84-89.
Irons, A., Stephens, P., & Ferguson, R. (2009, April 2). Digital investigation as a distinct discipline: a pedagogic perspective. Digital Investigations, 6, pp. 82-90.
Jonathan Clark. (2000). Forensic Telecommunications Services. Retrieved January 15, 2013, from About FTS: http://www.forensicts.co.uk
Kessler, G., & Shirling, M. E. (2006). The design of an undergraduate degree program in computer & digital forensics. Journal of Digital Forensics, Security and Law, 1 (3), 37-50.
Mardis, M. A. (2006, September/October). "The CSI effect": science learning, and the school library. Knowledge Quest, 35 (1), pp. 12-17.
Matthews, W. (2013, January 12). Southwest Regional Computer Crime Institute Director. (J. R. Through, Interviewer)
McCarthy, P. (2005). Forensic analysis of mobile phones. University of South Australia, School of Computer and Information Science. Mawson Lakes: University of South Australia.
Muncaster, P. (2013, May 27). The Register. Retrieved June 4, 2013, from www.theregister.com.uk: http://www.theregister.co.uk/2013/05/27/lenovo_us_smartphone_launch/
Reisinger, D. (2011, June 28). news.cnet.com. Retrieved December 31, 2012, from cnet.com: http://news.cnet.com/8301-13506_3-20074956-17/google-500000-android-devices-activated-each-day/
Roane, K. R. (2005, April 25). The CSI effect. U.S. News & World Report, 138 (15), pp. 48-54.
Rogers, M. K., & Seigfried, K. (2004, January 6). The future of computer forensics: a needs analysis survey. Computers & Security, 23, pp. 12-16.
Russell Brewis. (2012). Forensic Telecommunications Services. Retrieved January 12, 2012, from forensicts: http://www.forensicts.co.uk/SubCategory.aspx?ID=80&SMID=103
Science Daily. (2009, January 1). Retrieved December 31, 2012, from sciencedaily.com: http://www.sciencedaily.com/videos/2009/0104-digital_evidence.htm
Wassenaar, D., Woo, D., & Wu, P. (2009). A eertificate program in computer forensics. Consortium for Computing Sciences in Colleges: Southwestern Conference.24, pp. 158-167. University of Maryland University College Europe.
Runs Through, Joan and Cantrell, Gary D.
"Varying Instructional Approaches to Physical Extraction of Mobile Device Memory,"
Journal of Digital Forensics, Security and Law: Vol. 12
, Article 4.
Available at: https://commons.erau.edu/jdfsl/vol12/iss4/4