Forensics and Law Enforcement
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) (→Fingerprint data) |
Dan Tobias (Talk | contribs) (→Forensic images of disks and computer network data) |
||
Line 14: | Line 14: | ||
* [[Digital Evidence Bag]] (DEB) | * [[Digital Evidence Bag]] (DEB) | ||
* [[EnCase hash map]] (Expert Witness) | * [[EnCase hash map]] (Expert Witness) | ||
+ | * [[Expert Witness]] | ||
== Fingerprint data == | == Fingerprint data == |
Revision as of 23:33, 1 October 2020
See also Law
Forensic images of disks and computer network data
In the course of investigations, detectives sometimes need to preserve digital information. These are formats used in this process. See also Disk Image Formats. In contrast to those raw disk images, forensic formats also store various metadata as well as hash tables to track the origin of data and ensure it is not altered after the fact.
- Advanced Forensics Format (AFF)
- Digital Evidence Bag (DEB)
- EnCase hash map (Expert Witness)
- Expert Witness
Fingerprint data
See also Fingerprints
- ANSI 378 (used to store minutae of fingerprints)
- ANSI 381 (used to store images of fingerprints)
- ISO 19794-2 (used to store minutae of fingerprints)
- NIST IHead (one of its uses is storing fingerprint images)
- WSQ (used to store images of fingerprints)
Links
- ShmooCon 2014 - You Don't Have the Evidence (January 2014) (video)
- The Sleuth Kit and Autopsy can read raw, Expert Witness, and AFF formats
- Is AFF the best choice for digital preservationists who create images?