This tag is associated with 6 posts

Unreal Steganography: Using A VR Application As A Steganography Carrier

by Stuart Wilson This report focuses on the use of virtual reality as a potential steganography carrier file to avoid detection of forensic analysis applications commonly used within law enforcement. The goal is to show how a virtual reality game/environment can be made with little training, what file types can be stored within it and … Continue reading

Simple Steganography on NTFS when using the NSRL

First published October 2009 Adam Hurwitz Business Intelligence Associates, Inc. 39 Broadway, NYC, NY 10006 Abstract NTFS is structured so that there can be a physical separation of the data that comprises a file and the properties or metadata of the file. One side-effect of this is that when a file is hashed on … Continue reading

Real-Time Steganalysis

First published October 2005 A Key Component of a Comprehensive Insider Threat Solution James E. Wingate, CISSP-ISSEP, CISM, IAM Director, Steganography Analysis & Research Center (SARC) and Vice President for West Virginia Operations Backbone Security.Com and Chad W. Davis, CCE Computer Security Engineer Backbone Security.Com Introduction “Ignorance is bliss.” “What you don’t know can’t hurt … Continue reading

An Analytical Approach to Steganalysis

First published August 2005 by James E. Wingate, CISSP-ISSEP, CISM, IAM Director, Steganography Analysis & Research Center Chad W. Davis Computer Security Engineer Backbone Security.Com Introduction Rapidly evolving computer and networking technology coupled with a dramatic expansion in communications and information exchange capability within government organizations, public and private corporations and even our … Continue reading

Steganography: Implications for the Prosecutor and Computer Forensics Examiner

First published May 2005 by Gary C. Kessler April 2004 [An edited version of this paper will appear in the June 2004 issue of the National District Attorney’s Association Newsletter.] “Steganography,” my colleague asked, “is that a dinosaur or an icicle hanging down in a cave?” Steganography is the science of “covered writing” and is … Continue reading

Forensic Accounting – the recorded electronic data found on Computer Hard Disk Drives, PDAs and numerous other Digital Devices

First published September 2004 Where is the hidden money for the Creditors in the Bankrupt Estate? The Importance of Applying Section 521(4) in obtaining the Debtor’s electronic data. Jack Seward Rosenfarb Winters, LLC New York, NY 10016 or Introduction A trustee has the duty to investigate the financial affairs of the Debtor and … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,289 other followers