Aug 182014
Wearable technology: Big companies get involved in Big Brother-style monitoring of staff

  A nice article (that our researcher Lee Tobin contributed to) in The Irish Times newspaper on how wearable technology might impact our working lives. Here is an excerpt: ” …Wearable technologies are nothing new. The Google Glass consumer-oriented product allows owners to do many of the things they could do on their tablet with a pair […]

Aug 062014
Reverse engineering a CCTV system, a case study

A paper Lee Tobin, Ahmed Shosha and Pavel Gladyshev wrote has just been accepted to the Digital Investigation journal, it details an efficient and time economical way of reverse engineering a piece of hardware (a CCTV system in this case study paper). Title: Reverse engineering a CCTV system, a case study. Abstract: Given a disk image of a […]

Jan 012014
DigitalFIRE Mutual Legal Assistance Study

Please help DigitalFIRE Labs understand the current state of Mutual Legal Assistance Requests relating to digital evidence, and be entered for a chance to win a FIREBrick write-blocker or an Amazon gift card. The survey on Mutual Legal Assistance Requests Concerning Digital Evidence can be found here: This survey has been commissioned by the United Nations Office […]

Aug 032013
An Argument for Assumed Extra-territorial Consent During Cybercrime Investigations

During cybercrime investigations it’s common to find that a suspect has used technology in a country outside of the territorial jurisdiction of Law Enforcement investigating the case. The suspects themselves may also be located outside of the territory of the investigating group. A country may be able to claim jurisdiction over a suspect or device […]

Jul 172013
Challenges with Automation in Digital Forensic Investigations

Abstract The use of automation in digital forensic investigations is not only a technological issue, but also has political and social implications. This work discusses some challenges with the implementation and acceptance of automation in digital forensic investigation, and possible implications for current digital forensic investigators. Current attitudes towards the use of automation in digital forensic investigations are examined, as […]

May 282013
Forensics in Private Cloud SAN

SAN or Storage Area Network is one of the vital components in the Cloud and performing digital forensics Cloud storage is so challenging not only because of the size but also the technology involved. The two main SAN types in the market are fiber channel and iSCSI. There are many different SAN vendors in the market, […]

 Posted by at 12:27 am
Apr 082013
Automated Network Traige

In many police investigations today, computer systems are somehow involved. The number and capacity of computer systems needing to be seized and examined is increasing, and in some cases it may be necessary to quickly find a single computer system within a large number of computers in a network. To investigate potential evidence from a […]

Apr 082013
DigitalFIRE Virtual Cloud Environment

The Digital Forensic Investigation Research Laboratory conducts a lot of research on Cloud environments. However, Cloud environments can sometimes be cumbersome to create and configure, taking time away from testing and research. In order to streamline this process, DigitalFIRE has created a virtualised Cloud environment for Cloud security and investigation researchers. By virtualising Cloud components, this allows researchers […]

Apr 042013
What is Cybersecurity?

Last week, a number of Korean organizations fell victim to cyber attacks. This has prompted discussions about cybersecurity in Korea, and while following this issue I’ve realized that Korea’s main challenge appears to be understanding what cybersecurity actually is. From many of the discussions, representatives from various organizations appear to believe that security is a […]

Mar 262013
Legal Protest and Distributed Denial of Service

The United States government, via the “We the People” portal (, was petitioned by Dylan K. [1] to “Make, distributed denial-of-service (DDoS), a legal form of protest”. The petition states that: With the advance in [Internet technology], comes new grounds for protesting. Distributed denial-of-service (DDoS), is not any form of hacking in any way. It […]