Forensics and Law Enforcement

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(Cloud Warrant Return)
 
(One intermediate revision by one user not shown)
Line 46: Line 46:
 
*[[Facebook Warrent Return]]
 
*[[Facebook Warrent Return]]
 
*[[Skype Warrant Return]]
 
*[[Skype Warrant Return]]
*[[Snapchat Warrent Return]]
+
*[[Snapchat Warrant Return]]
*[[Discord Warrent Return]]
+
*[[Discord Warrant Return]]
*[[Instagram Warrent Return]]
+
*[[Instagram Warrant Return]]
 +
 
 +
== Uncategorized ==
 +
* [[Forensics vs. Data Recovery vs. Data Preservation]]
  
 
== Links ==
 
== Links ==

Latest revision as of 15:29, 15 October 2023

File Format
Name Forensics and Law Enforcement
Ontology

{{{caption}}}

See also Law

Contents

[edit] Forensic images of disks and computer network data

In the course of investigations, detectives sometimes need to preserve digital information. These are formats used in this process. See also Disk Image Formats. In contrast to those raw disk images, forensic formats also store various metadata as well as hash tables to track the origin of data and ensure it is not altered after the fact.

[edit] Biometrics

See also Fingerprints

  • ANSI 378 (used to store minutae of fingerprints)
  • ANSI 379 (used to store images of irises)
  • ANSI 381 (used to store images of fingerprints)
  • ANSI 385 (used to store face recognition data)
  • CBEFF
  • ISO 19794-2 (used to store minutae of fingerprints)
  • NIST IHead (one of its uses is storing fingerprint images)
  • WSQ (used to store images of fingerprints)

[edit] Mobile-related

[edit] Oxygen

[edit] Cloud Warrant Return

[edit] Uncategorized

[edit] Links

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox