<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:a="urn:schemas-microsoft-com:office:access" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s="uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs="urn:schemas-microsoft-com:rowset" xmlns:z="#RowsetSchema" xmlns:b="urn:schemas-microsoft-com:office:publisher" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xmlns:c="urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc="urn:schemas-microsoft-com:office:odc" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:html="http://www.w3.org/TR/REC-html40" xmlns:q="http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc="http://microsoft.com/officenet/conferencing" xmlns:D="DAV:" xmlns:Repl="http://schemas.microsoft.com/repl/" xmlns:mt="http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2="http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda="http://www.passport.com/NameSpace.xsd" xmlns:ois="http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir="http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:dsp="http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc="http://schemas.microsoft.com/data/udc" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:sub="http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec="http://www.w3.org/2001/04/xmlenc#" xmlns:sp="http://schemas.microsoft.com/sharepoint/" xmlns:sps="http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs="http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf="http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p="http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf="http://schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss="http://schemas.microsoft.com/office/2006/digsig-setup" xmlns:dssi="http://schemas.microsoft.com/office/2006/digsig" xmlns:mdssi="http://schemas.openxmlformats.org/package/2006/digital-signature" xmlns:mver="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns:mrels="http://schemas.openxmlformats.org/package/2006/relationships" xmlns:spwp="http://microsoft.com/sharepoint/webpartpages" xmlns:ex12t="http://schemas.microsoft.com/exchange/services/2006/types" xmlns:ex12m="http://schemas.microsoft.com/exchange/services/2006/messages" xmlns:pptsl="http://schemas.microsoft.com/sharepoint/soap/SlideLibrary/" xmlns:spsl="http://microsoft.com/webservices/SharePointPortalServer/PublishedLinksService" xmlns:Z="urn:schemas-microsoft-com:" xmlns:st="" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 12 (filtered medium)"><!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:"MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
@font-face
        {font-family:"\@MS Mincho";
        panose-1:2 2 6 9 4 2 5 8 3 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.5pt;
        font-family:Consolas;}
p
        {mso-style-priority:99;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Arial","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:Consolas;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle21
        {mso-style-type:personal-compose;
        font-family:"Arial","sans-serif";
        font-weight:bold;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:815026325;
        mso-list-type:hybrid;
        mso-list-template-ids:1873201166 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level2
        {mso-level-tab-stop:1.0in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level3
        {mso-level-tab-stop:1.5in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level4
        {mso-level-tab-stop:2.0in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level5
        {mso-level-tab-stop:2.5in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level6
        {mso-level-tab-stop:3.0in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level7
        {mso-level-tab-stop:3.5in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level8
        {mso-level-tab-stop:4.0in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l0:level9
        {mso-level-tab-stop:4.5in;
        mso-level-number-position:left;
        text-indent:-.25in;}
@list l1
        {mso-list-id:1230918274;
        mso-list-template-ids:55991362;}
@list l1:level1
        {mso-level-number-format:image;
        list-style-image:url("cid:image002.gif\@01CBF37C.6A6ACEB0");
        mso-level-text:\F0B7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l2
        {mso-list-id:1322735901;
        mso-list-template-ids:-371536116;}
@list l2:level1
        {mso-level-number-format:image;
        list-style-image:url("cid:image002.gif\@01CBF37C.6A6ACEB0");
        mso-level-text:\F0B7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l3
        {mso-list-id:1891765490;
        mso-list-template-ids:-1486211066;}
@list l3:level1
        {mso-level-number-format:image;
        list-style-image:url("cid:image002.gif\@01CBF37C.6A6ACEB0");
        mso-level-text:\F0B7;
        mso-level-tab-stop:.5in;
        mso-level-number-position:left;
        text-indent:-.25in;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="12290" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-US link=blue vlink=purple><div class=WordSection1><table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width=509 style='width:381.75pt;background:yellow;border-collapse:collapse'><tr><td width=509 colspan=2 style='width:381.75pt;border:solid windowtext 1.5pt;padding:0in 5.4pt 0in 5.4pt'><p class=MsoPlainText align=center style='text-align:center'><b><span style='font-size:11.0pt;font-family:"Arial","sans-serif"'>ANNOUNCEMENT: Conference on Digital Forensics, Security and Law</span></b><b><span style='font-family:"Arial","sans-serif"'><o:p></o:p></span></b></p></td></tr><tr style='height:66.0pt'><td width=119 style='width:89.25pt;border-top:none;border-left:solid windowtext 1.5pt;border-bottom:solid windowtext 1.5pt;border-right:none;background:transparent;padding:0in 5.4pt 0in 5.4pt;height:66.0pt'><p class=MsoPlainText><img width=89 height=82 id="Picture_x0020_0" src="cid:image001.jpg@01CBE750.BF6B6EC0" alt=adfslgraphic.jpg><o:p></o:p></p></td><td width=390 style='width:292.5pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.5pt;border-right:solid windowtext 1.5pt;background:transparent;padding:0in 5.4pt 0in 5.4pt;height:66.0pt'><p class=MsoPlainText><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'>Venue: Richmond, Virginia USA <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'>Dates: 25-27 May 2011<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:9.0pt;font-family:"Arial","sans-serif"'>Conference Website: <br><a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>  <o:p></o:p></span></p></td></tr></table><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Dear colleagues: <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>The ADFSL 2011 Conference on Digital Forensics, Security and Law will be hosted by Longwood University and held at the Omni Hotel in Richmond, Virginia on 25-27 of May 2011. <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>The ADFSL Conference on Digital Forensics, Security and Law is a unique and innovative event.  It is managed by the Association of Digital Forensics, Security and Law (ADFSL). The conference focuses on the current and expanding role of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but also are very much focused on how to prepare students for careers in digital forensics. Curriculum is a very important topic at the conference and the new DoD initiative on certification and Centers of Academic Excellence will be very important areas of discourse. Conference papers are double blind refereed and provide a forum for high quality research, communication and debate on the subject of digital forensics and directly related fields.<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><b><span style='font-family:"Arial","sans-serif"'>Opening Remarks<o:p></o:p></span></b></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>This year’s opening remarks will be delivered by Longwood University's new president, Brigadier General Patrick Finnegan. Brigadier General Finnegan was previously at West Point having been confirmed by the United States Senate as its 12th Dean of the Academic Board. Brigadier General Finnegan was selected as Longwood University’s 25th president in March 2010 and assumed his duties in that position on July 1, 2010.  Brigadier General Finnegan was born in Fukuoka, Japan, on September 20th, 1949, and was appointed to the United States Military Academy in 1967. As a cadet, he was the Chairman of the Honor Committee and Head Manager of the Army Football Team. After graduating from West Point and being commissioned a second lieutenant in 1971, he attended the Kennedy School of Government at Harvard University and earned a Master of Public Administration degree in 1973.<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><b><span style='font-family:"Arial","sans-serif"'>Keynote Speakers<o:p></o:p></span></b></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Our Wednesday Keynote Speaker will be Brian Snow. Brian Snow was previously with the NSA is now a Security Consultant and Ethics Advisor. Brian's years at NSA were the model for what it means to be a senior Technical Director at NSA (similar to a Chief Scientist or Senior Technical Fellow in industry); he served in that capacity in three major mission components: The Research Directorate (1994-1995), The Information Assurance Directorate (1996-2002), and The Directorate for Education and Training - NSA’s Corporate University (2003-2006). He was the first Technical Director appointed at the “Key Component” level at NSA, and the only “techie” at NSA to serve in such a role across three different Directorates.<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Our Thursday Keynote Speaker will be Ricky Windsor.</span> <span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Mr. Windsor leads multiple programs within the DC3 Future Explorations directorate focusing on digital forensics education, resource sharing, and consolidation across the Law Enforcement, Counter Intelligence, Intelligence Community, Academia, and the Department of Defense.<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><b><span style='font-family:"Arial","sans-serif"'>Preliminary Partial List of Papers, Presentations and Workshops<o:p></o:p></span></b></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p style='margin-bottom:4.5pt'><b><i><span style='color:black'>Wednesday, May 25</span></i></b><span style='color:black'><o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Keynote: Brian Snow, Security and the Technology Debt<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Digital Forensics and the Law<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Sampling: Making Electronic Discovery More Cost Effective<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Software Piracy Forensics: Impact and Implications of post-piracy modifications<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>MAC OS X Forensics: Password Discovery<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l1 level1 lfo3'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Development of A Distributed Print-Out Monitoring System For Efficient Forensic Investigation<o:p></o:p></span></p><p style='margin-bottom:4.5pt'><b><i><span style='color:black'>Thursday, May 26</span></i></b><span style='color:black'><o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Keynote: Ricky Windsor, National Centers of Digital Forensics Academic Excellence Program<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Panel: Cyber Forensics Curricula<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Presentation: National Information Assurance and Forensics Education Repository (NAIFER)<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Presentation: DC3 Center of Digital Forensics Academic Excellence Program<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Presentation: Digital Forensics Investigation in A Collegiate Environment<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Creating Realistic Corpora for Forensic and Security Education<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l3 level1 lfo4'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>AACSB-Accredited Schools’ Adoption of Information Security Curriculum<o:p></o:p></span></p><p style='margin-bottom:4.5pt'><b><i><span style='color:black'>Friday, May 27</span></i></b><span style='color:black'><o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Panel: Defining the Definition: What is the future of legal obligations relating to evidence contained mobile devices?<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Workshop: Physical Image Analysis in Mobile Devices<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Forensic Analysis of Smartphones: The Android Data Extractor Lite (ADEL)<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Forensicating iOS Mobile Devices<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>A Practitioners Guide to the Forensic Investigation of Xbox 360 Gaming Consoles<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Identity Theft through Gaming Consoles<o:p></o:p></span></p><p style='mso-margin-top-alt:0in;margin-right:0in;margin-bottom:4.5pt;margin-left:.5in;text-indent:-.25in;mso-list:l2 level1 lfo5'><![if !supportLists]><span style='font-family:Symbol;color:black'><span style='mso-list:Ignore'><img width=11 height=11 src="cid:image002.gif@01CBF37C.6A6ACEB0" alt="*"><span style='font:7.0pt "Times New Roman"'>       </span></span></span><![endif]><span dir=LTR></span><span style='color:black'>Kindle Forensics: Acquisition & Analysis<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Additional papers, presentations and panels are being reviewed and will be added to the list soon. The actual conference schedule will be posted by April 15.<o:p></o:p></span></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><b><span style='font-size:11.0pt;font-family:"Arial","sans-serif"'>Participants<o:p></o:p></span></b></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences. <o:p></o:p></span></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><b><span style='font-size:11.0pt;font-family:"Arial","sans-serif"'>Best Papers<o:p></o:p></span></b></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Selected papers from the conference will be considered for inclusion in the following journal:<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Journal of Digital Forensics, Security and Law<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><a href="http://www.jdfsl.org">http://www.jdfsl.org</a> <o:p></o:p></span></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT: <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>   <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>REGISTRATION INFORMATION IS POSTED AT: <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><a href="http://www.digitalforensics-conference.org/registration.htm">http://www.digitalforensics-conference.org/registration.htm</a>   <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>The Chair of the conference is Dr. Glenn S. Dardick<o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>(<a href="mailto:gdardick@dardick.net">gdardick@dardick.net</a>)   <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Association for Digital Forensics, Security and Law <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Website: <a href="http://www.adfsl.org">http://www.adfsl.org</a>   <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Journal of Digital Forensics, Security and Law <o:p></o:p></span></p><p class=MsoPlainText><span style='font-size:10.0pt;font-family:"Arial","sans-serif"'>Website: <a href="http://www.jdfsl.org">http://www.jdfsl.org</a>    <o:p></o:p></span></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><span style='font-family:"Arial","sans-serif"'><o:p> </o:p></span></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText><o:p> </o:p></p><p class=MsoPlainText><o:p> </o:p></p></div></body></html>