<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:a="urn:schemas-microsoft-com:office:access" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s="uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs="urn:schemas-microsoft-com:rowset" xmlns:z="#RowsetSchema" xmlns:b="urn:schemas-microsoft-com:office:publisher" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xmlns:c="urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc="urn:schemas-microsoft-com:office:odc" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:html="http://www.w3.org/TR/REC-html40" xmlns:q="http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc="http://microsoft.com/officenet/conferencing" xmlns:D="DAV:" xmlns:Repl="http://schemas.microsoft.com/repl/" xmlns:mt="http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2="http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda="http://www.passport.com/NameSpace.xsd" xmlns:ois="http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir="http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:dsp="http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc="http://schemas.microsoft.com/data/udc" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:sub="http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec="http://www.w3.org/2001/04/xmlenc#" xmlns:sp="http://schemas.microsoft.com/sharepoint/" xmlns:sps="http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs="http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf="http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p="http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf="http://schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss="http://schemas.microsoft.com/office/2006/digsig-setup" xmlns:dssi="http://schemas.microsoft.com/office/2006/digsig" xmlns:mdssi="http://schemas.openxmlformats.org/package/2006/digital-signature" xmlns:mver="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns:mrels="http://schemas.openxmlformats.org/package/2006/relationships" xmlns:spwp="http://microsoft.com/sharepoint/webpartpages" xmlns:ex12t="http://schemas.microsoft.com/exchange/services/2006/types" xmlns:ex12m="http://schemas.microsoft.com/exchange/services/2006/messages" xmlns:pptsl="http://schemas.microsoft.com/sharepoint/soap/SlideLibrary/" xmlns:spsl="http://microsoft.com/webservices/SharePointPortalServer/PublishedLinksService" xmlns:Z="urn:schemas-microsoft-com:" xmlns:st="" xmlns="http://www.w3.org/TR/REC-html40" xmlns:ns1="http://www.w3..org/2000/09/xmldsig#">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.5pt;
        font-family:Consolas;}
p
        {mso-style-priority:99;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Arial","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:Consolas;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle22
        {mso-style-type:personal-compose;
        font-family:"Arial","sans-serif";
        font-weight:bold;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="545" style="width:408.75pt;background:yellow;border-collapse:collapse">
<tbody>
<tr>
<td width="545" colspan="2" style="width:408.75pt;border:solid windowtext 1.5pt;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText" align="center" style="text-align:center"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">ANNOUNCEMENT: Conference on Digital Forensics, Security and Law</span></b><b><span style="font-family:"Arial","sans-serif""><o:p></o:p></span></b></p>
</td>
</tr>
<tr style="height:66.0pt">
<td width="119" style="width:89.25pt;border-top:none;border-left:solid windowtext 1.5pt;border-bottom:solid windowtext 1.5pt;border-right:none;background:transparent;padding:0in 5.4pt 0in 5.4pt;height:66.0pt">
<p class="MsoPlainText"><img width="89" height="82" id="Picture_x0020_0" src="cid:image001.jpg@01CBE750.BF6B6EC0" alt="Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: adfslgraphic.jpg"><o:p></o:p></p>
</td>
<td width="426" style="width:319.5pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.5pt;border-right:solid windowtext 1.5pt;background:transparent;padding:0in 5.4pt 0in 5.4pt;height:66.0pt">
<p class="MsoPlainText"><span style="font-size:9.0pt;font-family:"Arial","sans-serif"">Venue: Richmond, Virginia USA
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:9.0pt;font-family:"Arial","sans-serif"">Dates: 10-12 June 2013<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:9.0pt;font-family:"Arial","sans-serif"">Conference Website:
<br>
<a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>  <o:p></o:p></span></p>
</td>
</tr>
</tbody>
</table>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Dear colleagues:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The ADFSL 2013 Conference on Digital Forensics, Security and Law will be held on June 10-12, 2013. A conference committee will be formed in the next few months and more
 details will be announced at that time.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The conference committee will be calling for papers and proposals in, or related to, the following areas:<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">CURRICULUM
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">1) Digital forensics curriculum
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">2) Cyber law curriculum
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">3) Information assurance curriculum
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">4) Accounting digital forensics curriculum
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">TEACHING METHODS
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">5) Digital forensics teaching methods
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">6) Cyber law teaching methods
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">7) Information assurance teaching methods
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">8) Accounting digital forensics teaching methods
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">CASES
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">9) Digital forensics case studies
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">10) Cyber law case studies
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">11) Information assurance case studies
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">12) Accounting digital forensics case studies
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">INFORMATION TECHNOLOGY
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">13) Digital forensics and information technology
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">14) Cyber law and information technology
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">15) Information assurance and information technology
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">16) Accounting digital forensics information technology
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">NETWORKS AND THE INTERNET
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">17) Digital forensics and the Internet
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">18) Cyber law and the Internet
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">19) Information assurance and Internet
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">20) Digital forensics accounting and the Internet
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">ANTI-FORENSICS AND COUNTER ANTI-FORENSICS
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">21) Steganography
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">22) Stylometrics and Author Attribution
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">23) Anonymity and Proxies
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">24) Encryption and Decryption
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">INTERNATIONAL ISSUES
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">25) International issues in digital forensics
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">26) International issues in cyber law
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">27) International issues in information assurance
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">28) International issues in accounting digital forensics
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">THEORY
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">29) Theory development in digital forensics
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">30) Theory development in information assurance
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">31) Methodologies for digital forensic research
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">32) Analysis techniques for digital forensic and information assurance research<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">PRIVACY ISSUES<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">33) Privacy issues in digital forensics<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">34) Privacy issues in information assurance<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">35) Privacy issues in cyber law<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">36) Privacy issues in digital rights management<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">SOFTWARE FORENSICS<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">37) Software piracy investigation<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">38) Software quality forensics<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">NATIONAL SECURITY AND CYBERCRIME
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">39) Cyber culture and cyber terrorism<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Deadlines<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The deadline for submissions will be midnight EST, 28 February 2013.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The submission system will be available starting in January.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Submission Types</span></b><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Short briefing papers: A technology or a management briefing on an aspect of digital forensics, information assurance, and/or cyber law. Such papers will be presented by
 the author in a round table discussion format at the conference. These papers need not be extensive. Typical length is about 1500-2000 words.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Research papers: A research question or an argument is posed and subsequently conducted. Empirical work (quantitative or qualitative) is necessary. Research papers will
 be presented by the authors in a regular conference session. These papers should be extensive. Typical length is about 5000-6000 words. All research papers will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Case Studies: Case studies are typically descriptions of a given digital forensics situation. Names of organizations/actors can be kept anonymous to maintain confidentiality.
 Case studies will be presented by the authors at the conference. Typical length is about 5000-6000 words. All case studies will be considered for publication in the Journal of Digital Forensics, Security and Law (JDFSL).
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Student Scholar Track: Up to six student papers will be selected for the Paraben Sponsored Student Scholar Track. Of the six papers, one will be selected for the Paraben
 Student Scholar Award. The primary author must be present at the conference. To participate, the primary author of the paper must be a student. The primary author must email the conference chair and specify that they wish their submitted paper to be considered
 for the Student Scholar track. <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Panels: Panels and workshop proposals are welcome. Typical length is about 1000 words long and covers a current technology or a controversial issue.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Participants<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital
 forensics, security, and law. This conference will be of value to both academic and practitioner audiences.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Submissions<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">All submissions are double blind peer reviewed.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif"">         <o:p>
</o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Best Papers<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Selected papers from the conference will be considered for inclusion in the following journal:<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Journal of Digital Forensics, Security and Law<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.jdfsl.org">http://www.jdfsl.org</a>
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">REGISTRATION INFORMATION IS POSTED AT:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.digitalforensics-conference.org/registration.htm">http://www.digitalforensics-conference.org/registration.htm</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Association for Digital Forensics, Security and Law
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Website:
<a href="http://www.adfsl.org">http://www.adfsl.org</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Journal of Digital Forensics, Security and Law
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Website:
<a href="http://www.jdfsl.org">http://www.jdfsl.org</a>    <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><o:p> </o:p></span></p>
</div>
</body>
</html>