{"id":177,"date":"2021-09-14T11:41:29","date_gmt":"2021-09-14T15:41:29","guid":{"rendered":"https:\/\/www.marshall.edu\/fsc\/?page_id=177"},"modified":"2021-09-14T11:45:10","modified_gmt":"2021-09-14T15:45:10","slug":"resources-digital","status":"publish","type":"page","link":"https:\/\/www.marshall.edu\/fsc\/resources\/resources-digital\/","title":{"rendered":"Digital Forensics"},"content":{"rendered":"<p>This organized collection of digital forensics, digital evidence, and mobile forensics has been placed online by <abbr class=\"initialism\" title=\"Marshall University Forensic Science Center\">MUFSC<\/abbr> to help professionals and students stay current with the latest news, events, research and technologies. Below you can find related organizations and websites; unordered but grouped by organization, government, <abbr class=\"initialism\" title=\"Regional Computer Forensics Laboratory\">RCFL<\/abbr>s, challenges, publications, online resources, and hardware-software vendors.<\/p>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Digital Forensics Organizations<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Abbreviation<\/th>\n<th scope=\"col\" width=\"491\">Organization and URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>NW3C<\/td>\n<td><a href=\"https:\/\/www.nw3c.org\/\">National White Collar Crime Center<\/a><\/td>\n<\/tr>\n<tr>\n<td>IACIS<\/td>\n<td><a href=\"https:\/\/www.iacis.com\/\">International Association of Computer Investigative Specialists<\/a><\/td>\n<\/tr>\n<tr>\n<td>DFCB<\/td>\n<td><a href=\"https:\/\/www.dfcb.org\/\">Digital Forensics Certification Board<\/a><\/td>\n<\/tr>\n<tr>\n<td>ADFSL<\/td>\n<td><a href=\"https:\/\/www.adfsl.org\/\">Association of Digital Forensics, Security and Law<\/a><\/td>\n<\/tr>\n<tr>\n<td>DFRWS<\/td>\n<td><a href=\"https:\/\/www.dfrws.org\/\">Digital Forensic Research Workshop<\/a><\/td>\n<\/tr>\n<tr>\n<td>DFA<\/td>\n<td><a href=\"https:\/\/www.digitalforensicsassociation.org\/\">Digital Forensics Association<\/a><\/td>\n<\/tr>\n<tr>\n<td>CIACS<\/td>\n<td><a href=\"https:\/\/www.cias.utsa.edu\/\">Center for Infrastructure Assurance and Security<\/a><\/td>\n<\/tr>\n<tr>\n<td>CDFS<\/td>\n<td><a href=\"https:\/\/www.cdfs.org\/\">Consortium of Digital Forensic Specialists<\/a><\/td>\n<\/tr>\n<tr>\n<td>HTCC<\/td>\n<td><a href=\"https:\/\/www.hightechcrimecops.org\/\">High Tech Crime Consortium<\/a><\/td>\n<\/tr>\n<tr>\n<td>HTCIA<\/td>\n<td><a href=\"https:\/\/www.htcia.org\/\">High Technology Crime Investigation Association<\/a><\/td>\n<\/tr>\n<tr>\n<td>ASDFED<\/td>\n<td><a href=\"https:\/\/www.asdfed.com\/\">American Society of Digital Forensics &amp; eDiscovery<\/a><\/td>\n<\/tr>\n<tr>\n<td>CIS<\/td>\n<td><a href=\"https:\/\/www.cisecurity.org\/\">Center for Internet Security<\/a><\/td>\n<\/tr>\n<tr>\n<td>MS-ISAC<\/td>\n<td><a href=\"https:\/\/msisac.cisecurity.org\/\">Multi-State Information Sharing and Analysis Center<\/a><\/td>\n<\/tr>\n<tr>\n<td>IJIS<\/td>\n<td><a href=\"https:\/\/www.ijis.org\/\">Integrated Justice Information Systems Institute<\/a><\/td>\n<\/tr>\n<tr>\n<td>NCFTA<\/td>\n<td><a href=\"https:\/\/www.ncfta.net\/\">National Cyber-Forensics and Training Alliance<\/a><\/td>\n<\/tr>\n<tr>\n<td>LEVA<\/td>\n<td><a href=\"https:\/\/leva.org\/\">Law Enforcement and Emergency Services Video Association<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>United States Government &#8211; Digital Forensics Related<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Abbreviation<\/th>\n<th scope=\"col\" width=\"491\">Organization and URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>DoD DC3<\/td>\n<td><a href=\"https:\/\/www.dc3.mil\/\">Department of Defense Cyber Crime Center<\/a><\/td>\n<\/tr>\n<tr>\n<td>DFI LINK<\/td>\n<td><a href=\"https:\/\/www.dfilink.net\/\">National Repository for Digital Forensic Intelligence<\/a><\/td>\n<\/tr>\n<tr>\n<td>NSA\/CSS IA<\/td>\n<td><a href=\"https:\/\/www.nsa.gov\/ia\/\">NSA&#8217;s Information Assurance<\/a><\/td>\n<\/tr>\n<tr>\n<td>ECTCoE<\/td>\n<td><a href=\"https:\/\/www.ectcoe.net\/\">Electronic Crime Technology Center of Excellence<\/a><\/td>\n<\/tr>\n<tr>\n<td>NCCoE<\/td>\n<td><a href=\"https:\/\/csrc.nist.gov\/nccoe\/\">National Cybersecurity Center of Excellence<\/a><\/td>\n<\/tr>\n<tr>\n<td>NIJ<\/td>\n<td><a href=\"https:\/\/nij.gov\/topics\/forensics\/evidence\/digital\/welcome.htm\">National Institute of Justice<\/a><\/td>\n<\/tr>\n<tr>\n<td>NIST<\/td>\n<td><a href=\"https:\/\/www.nist.gov\/oles\/forensics\/digital_evidence.cfm\">National Institute of Standards and Technology<\/a><\/td>\n<\/tr>\n<tr>\n<td>US-CERT<\/td>\n<td><a href=\"https:\/\/www.us-cert.gov\/\">United States Computer Emergency Readiness Team<\/a><\/td>\n<\/tr>\n<tr>\n<td>NCFI<\/td>\n<td><a href=\"https:\/\/www.ncfi.usss.gov\/ncfi\/\">National Computer Forensics Institute<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Regional Computer Forensics Laboratories (RCFL)<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Region<\/th>\n<th scope=\"col\" width=\"491\">Organization and URL<\/th>\n<\/tr>\n<tr>\n<td>National RCFL<\/td>\n<td><a href=\"https:\/\/www.rcfl.gov\/\">National Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Chicago<\/td>\n<td><a href=\"https:\/\/www.chicagorcfl.org\/\">Chicago Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>Greater Houston<\/td>\n<td><a href=\"https:\/\/www.ghrcfl.org\/\">Greater Houston Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Heart of America<\/td>\n<td><a href=\"https:\/\/www.harcfl.org\/\">Heart of America Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Intermountain West<\/td>\n<td><a href=\"https:\/\/www.iwrcfl.org\/\">Intermountain West Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Kentucky<\/td>\n<td><a href=\"https:\/\/www.krcfl.org\/\">Kentucky Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Miami Valley<\/td>\n<td><a href=\"https:\/\/www.miamivalleyrcfl.org\/\">Miami Valley Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>New Jersey<\/td>\n<td><a href=\"https:\/\/www.njrcfl.org\/\">New Jersey Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>New Mexico<\/td>\n<td><a href=\"https:\/\/www.nmrcfl.org\/\">New Mexico Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>North Texas<\/td>\n<td><a href=\"https:\/\/www.ntrcfl.org\/\">North Texas Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Northwest<\/td>\n<td><a href=\"https:\/\/www.nwrcfl.org\/\">Northwest Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Orange County<\/td>\n<td><a href=\"https:\/\/www.ocrcfl.org\/\">Orange County Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Philadelphia<\/td>\n<td><a href=\"https:\/\/www.phrcfl.org\/\">Philadelphia Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Rocky Mountain<\/td>\n<td><a href=\"https:\/\/www.rmrcfl.org\/\">Rocky Mountain Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>San Diego<\/td>\n<td><a href=\"https:\/\/www.sdrcfl.org\/\">San Diego Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Silicon Valley<\/td>\n<td><a href=\"https:\/\/www.svrcfl.org\/\">Silicon Valley Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<tr>\n<td>Western New York<\/td>\n<td><a href=\"https:\/\/www.wnyrcfl.org\/\">Western New York Regional Computer Forensics Laboratory<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Digital Forensics Challenges<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Abbreviation<\/th>\n<th scope=\"col\" width=\"491\">Organization and URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>DC3 Challenge<\/td>\n<td><a href=\"https:\/\/www.dc3.mil\/challenge\/\">Department of Defense Cyber Crime Center &#8211; Cyber Crimes Challenge<\/a><\/td>\n<\/tr>\n<tr>\n<td>NCCDC<\/td>\n<td><a href=\"https:\/\/www.nationalccdc.org\/\">National Collegiate Cyber Defense Competition<\/a><\/td>\n<\/tr>\n<tr>\n<td>AFA CyberPatriot<\/td>\n<td><a href=\"https:\/\/www.uscyberpatriot.org\/\">AFA&#8217;s CyberPatriot Challenge<\/a><\/td>\n<\/tr>\n<tr>\n<td>CSC UK<\/td>\n<td><a href=\"https:\/\/cybersecuritychallenge.org.uk\/\">Cyber Security Challenge UK<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Digital Forensics Publications<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Name<\/th>\n<th scope=\"col\" width=\"491\">Organization and URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>DFI News<\/td>\n<td><a href=\"https:\/\/www.dfinews.com\/\">Digital Forensic Investigator News<\/a><\/td>\n<\/tr>\n<tr>\n<td>DFM<\/td>\n<td><a href=\"https:\/\/digitalforensicsmagazine.com\/\">Digital Forensics Magazine<\/a><\/td>\n<\/tr>\n<tr>\n<td>Forensic Focus<\/td>\n<td><a href=\"https:\/\/www.forensicfocus.com\">Forensic Focus: For Digital Forensics and EDiscovery Professionals<\/a><\/td>\n<\/tr>\n<tr>\n<td>JDFSL<\/td>\n<td><a href=\"https:\/\/www.jdfsl.org\/\">Journal of Digital Forensics, Security and Law<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Online Resources<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Name<\/th>\n<th scope=\"col\" width=\"491\">URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>Engadget<\/td>\n<td><a href=\"https:\/\/www.engadget.com\">http:\/\/www.engadget.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Gizmodo<\/td>\n<td><a href=\"https:\/\/www.gizmodo.com\">http:\/\/www.gizmodo.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Phone Scoop<\/td>\n<td><a href=\"https:\/\/www.phonescoop.com\">http:\/\/www.phonescoop.com<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Digital Forensics Hardware\/Software Vendors<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"202\">Name<\/th>\n<th scope=\"col\" width=\"449\">URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>Paraben Corporation<\/td>\n<td><a href=\"https:\/\/www.paraben.com\">http:\/\/www.paraben.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Wiebetech<\/td>\n<td><a href=\"https:\/\/www.wiebetech.com\">http:\/\/www.wiebetech.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Forensic Computers<\/td>\n<td><a href=\"https:\/\/www.forensic-computers.com\">http:\/\/www.forensic-computers.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Ocean Systems<\/td>\n<td><a href=\"https:\/\/www.oceansystems.com\">http:\/\/www.oceansystems.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Guidance Software<\/td>\n<td><a href=\"https:\/\/www.guidancesoftware.com\">http:\/\/www.guidancesoftware.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>AccessData<\/td>\n<td><a href=\"https:\/\/www.accessdata.com\">http:\/\/www.accessdata.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Digital Intelligence<\/td>\n<td><a href=\"https:\/\/www.digitalintelligence.com\">http:\/\/www.digitalintelligence.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Wetstonetech<\/td>\n<td><a href=\"https:\/\/www.wetstonetech.com\">http:\/\/www.wetstonetech.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Logicube<\/td>\n<td><a href=\"https:\/\/www.logicube.com\">http:\/\/www.logicube.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Cyber Security Technologies<\/td>\n<td><a href=\"https:\/\/www.cyberstc.com\/\">http:\/\/www.cyberstc.com\/<\/a><\/td>\n<\/tr>\n<tr>\n<td>Foray Technology<\/td>\n<td><a href=\"https:\/\/www.foray.com\">http:\/\/www.foray.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Mideosystems<\/td>\n<td><a href=\"https:\/\/www.mideosystems.com\">http:\/\/www.mideosystems.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Kroll Ontrack<\/td>\n<td><a href=\"https:\/\/www.krollontrack.com\">http:\/\/www.krollontrack.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Forensic Photoshop<\/td>\n<td><a href=\"https:\/\/www.forensicphotoshopbook.com\">http:\/\/www.forensicphotoshopbook.com<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div class=\"table-responsive\">\n<table class=\"table table-striped\">\n<caption>\n<h2>Mobile Forensics Hardware\/Software Vendors<\/h2>\n<\/caption>\n<thead>\n<tr>\n<th scope=\"col\" width=\"160\">Name<\/th>\n<th scope=\"col\" width=\"491\">URL<\/th>\n<\/tr>\n<\/thead>\n<tfoot><\/tfoot>\n<tbody>\n<tr>\n<td>Cellebrite<\/td>\n<td><a href=\"https:\/\/www.cellebrite.com\">http:\/\/www.cellebrite.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Mobile Forensics Inc.<\/td>\n<td><a href=\"https:\/\/www.mobileforensicsinc.com\">http:\/\/www.mobileforensicsinc.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>Oxygen Forensic<\/td>\n<td><a href=\"https:\/\/www.oxygen-forensic.com\">http:\/\/www.oxygen-forensic.com<\/a><\/td>\n<\/tr>\n<tr>\n<td>BitPim<\/td>\n<td><a href=\"https:\/\/www.bitpim.org\">http:\/\/www.bitpim.org<\/a><\/td>\n<\/tr>\n<tr>\n<td>SIMCon Forensics<\/td>\n<td><a href=\"https:\/\/www.simcon.no\">http:\/\/www.simcon.no<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This organized collection of digital forensics, digital evidence, and mobile forensics has been placed online by MUFSC to help professionals and students stay current with the latest news, events, research and technologies. Below you can find related organizations and websites; unordered but grouped by organization, government, RCFLs, challenges, publications, online resources, and hardware-software vendors. Digital<\/p>\n","protected":false},"author":224,"featured_media":0,"parent":152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-177","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/pages\/177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/users\/224"}],"replies":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/comments?post=177"}],"version-history":[{"count":2,"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/pages\/177\/revisions"}],"predecessor-version":[{"id":196,"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/pages\/177\/revisions\/196"}],"up":[{"embeddable":true,"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/pages\/152"}],"wp:attachment":[{"href":"https:\/\/www.marshall.edu\/fsc\/wp-json\/wp\/v2\/media?parent=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}