<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:x="urn:schemas-microsoft-com:office:excel" xmlns:p="urn:schemas-microsoft-com:office:powerpoint" xmlns:a="urn:schemas-microsoft-com:office:access" xmlns:dt="uuid:C2F41010-65B3-11d1-A29F-00AA00C14882" xmlns:s="uuid:BDC6E3F0-6DA3-11d1-A2A3-00AA00C14882" xmlns:rs="urn:schemas-microsoft-com:rowset" xmlns:z="#RowsetSchema" xmlns:b="urn:schemas-microsoft-com:office:publisher" xmlns:ss="urn:schemas-microsoft-com:office:spreadsheet" xmlns:c="urn:schemas-microsoft-com:office:component:spreadsheet" xmlns:odc="urn:schemas-microsoft-com:office:odc" xmlns:oa="urn:schemas-microsoft-com:office:activation" xmlns:html="http://www.w3.org/TR/REC-html40" xmlns:q="http://schemas.xmlsoap.org/soap/envelope/" xmlns:rtc="http://microsoft.com/officenet/conferencing" xmlns:D="DAV:" xmlns:Repl="http://schemas.microsoft.com/repl/" xmlns:mt="http://schemas.microsoft.com/sharepoint/soap/meetings/" xmlns:x2="http://schemas.microsoft.com/office/excel/2003/xml" xmlns:ppda="http://www.passport.com/NameSpace.xsd" xmlns:ois="http://schemas.microsoft.com/sharepoint/soap/ois/" xmlns:dir="http://schemas.microsoft.com/sharepoint/soap/directory/" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:dsp="http://schemas.microsoft.com/sharepoint/dsp" xmlns:udc="http://schemas.microsoft.com/data/udc" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:sub="http://schemas.microsoft.com/sharepoint/soap/2002/1/alerts/" xmlns:ec="http://www.w3.org/2001/04/xmlenc#" xmlns:sp="http://schemas.microsoft.com/sharepoint/" xmlns:sps="http://schemas.microsoft.com/sharepoint/soap/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:udcs="http://schemas.microsoft.com/data/udc/soap" xmlns:udcxf="http://schemas.microsoft.com/data/udc/xmlfile" xmlns:udcp2p="http://schemas.microsoft.com/data/udc/parttopart" xmlns:wf="http://schemas.microsoft.com/sharepoint/soap/workflow/" xmlns:dsss="http://schemas.microsoft.com/office/2006/digsig-setup" xmlns:dssi="http://schemas.microsoft.com/office/2006/digsig" xmlns:mdssi="http://schemas.openxmlformats.org/package/2006/digital-signature" xmlns:mver="http://schemas.openxmlformats.org/markup-compatibility/2006" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns:mrels="http://schemas.openxmlformats.org/package/2006/relationships" xmlns:spwp="http://microsoft.com/sharepoint/webpartpages" xmlns:ex12t="http://schemas.microsoft.com/exchange/services/2006/types" xmlns:ex12m="http://schemas.microsoft.com/exchange/services/2006/messages" xmlns:pptsl="http://schemas.microsoft.com/sharepoint/soap/SlideLibrary/" xmlns:spsl="http://microsoft.com/webservices/SharePointPortalServer/PublishedLinksService" xmlns:Z="urn:schemas-microsoft-com:" xmlns:st="" xmlns="http://www.w3.org/TR/REC-html40" xmlns:ns7="http://www.w3..org/2000/09/xmldsig#">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.5pt;
        font-family:Consolas;}
p
        {mso-style-priority:99;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Arial","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:Consolas;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle22
        {mso-style-type:personal-compose;
        font-family:"Arial","sans-serif";
        font-weight:bold;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:1353073837;
        mso-list-type:hybrid;
        mso-list-template-ids:-1131151052 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        text-indent:-.25in;
        font-family:Wingdings;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="545" style="width:408.75pt;background:yellow;border-collapse:collapse">
<tbody>
<tr>
<td width="545" colspan="2" style="width:408.75pt;border:solid windowtext 1.5pt;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText" align="center" style="text-align:center"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">ANNOUNCEMENT: Conference on Digital Forensics, Security and Law</span></b><b><span style="font-family:"Arial","sans-serif""><o:p></o:p></span></b></p>
</td>
</tr>
<tr style="height:66.0pt">
<td width="119" style="width:89.25pt;border-top:none;border-left:solid windowtext 1.5pt;border-bottom:solid windowtext 1.5pt;border-right:none;background:transparent;padding:0in 5.4pt 0in 5.4pt;height:66.0pt">
<p class="MsoPlainText"><img width="89" height="82" id="Picture_x0020_0" src="cid:image001.jpg@01CBE750.BF6B6EC0" alt="Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: adfslgraphic.jpg"><o:p></o:p></p>
</td>
<td width="426" style="width:319.5pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.5pt;border-right:solid windowtext 1.5pt;background:transparent;padding:0in 5.4pt 0in 5.4pt;height:66.0pt">
<p class="MsoPlainText"><span style="font-size:9.0pt;font-family:"Arial","sans-serif"">Venue: Richmond, Virginia USA
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:9.0pt;font-family:"Arial","sans-serif"">Dates: 10-12 June 2013<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:9.0pt;font-family:"Arial","sans-serif"">Conference Website:
<br>
<a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>  <o:p></o:p></span></p>
</td>
</tr>
</tbody>
</table>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Dear colleagues:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The ADFSL 2013 Conference on Digital Forensics, Security and Law will be held on June 10-12, 2013.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The ADFSL Conference on Digital Forensics, Security and Law is a unique and innovative event.  It is managed by the Association of Digital Forensics, Security and Law (ADFSL).
 The conference focuses on the current and expanding role of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but
 also are very much focused on how to prepare students for careers in digital forensics. Conference papers are double blind refereed and provide a forum for high quality research, communication and debate on the subject of digital forensics and directly related
 fields. <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">2013 KEYNOTE SPEAKERS<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><i><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">MONDAY KEYNOTE SPEAKER: Craig Valli</span></i></b><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Craig Valli is the Director of ECU Security Research Institute. He has over 20 years’ experience in the IT industry and consults to industry on network security and digital
 forensics issues. His main consultancy focus is on securing networks and critical infrastructures, detection of network borne threats and forensic analysis of cyber security incidents. He is the Congress Chair for the annual secau Security Congress. Craig
 is also the Editor of Journal of Network Forensics and Co-Editor of the Journal of Information Warfare. He has over 60 publications to his name on security related topics.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><i><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">TUESDAY KEYNOTE SPEAKER: Jake Kouns</span></i></b><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Jake Kouns is the Director of Cyber Security and Technology Risks Underwriting for Markel Corporation. In this unique role, Mr. Kouns is responsible for strategy and oversight
 of the Enterprise Information Security Program for the company as well as the management of Cyber Liability insurance products. In his role as product line leader, he has broad responsible for all aspects of the products including the development of underwriting
 guidelines, pricing, risk analysis, claims oversight, training & marketing initiatives as well as risk management services for policy holders.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">In addition, Jake is the co-founder, CEO, and CFO of the Open Security Foundation, a non-profit organization that oversees the operations of the Open Source Vulnerability
 Database (OSVDB.org), DataLossDB.org, Cloutage.org and SECore.info. All projects are independent and open web-based databases that provide detailed and unbiased technical information on security vulnerabilities, cloud security, security conferences and data
 loss incidents world-wide. Mr. Kouns has presented at many well-known security conferences including RSA, DEF CON, CISO Executive Summit, EntNet IEEE GlobeCom, CanSecWest, SOURCE and SyScan. He is the co-author of the book Security in an IPv6 Environment,
 Francis and Taylor, 2009, Information Technology Risk Management in Enterprise Environments, Wiley, 2010 and The Chief Information Security Officer, IT Governance, 2011. He holds both a Bachelor of Business Administration and a Master of Business Administration
 with a concentration in Information Security from James Madison University. In addition, he holds a number of certifications including ISC2's CISSP, and ISACA's CISM, CISA and CGEIT.<o:p></o:p></span></p>
<p class="MsoPlainText"><b><i><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></i></b></p>
<p class="MsoPlainText"><b><i><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">TUESDAY SPECIAL INVITED SPEAKER: Dan Ryan</span></i></b><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Daniel J. Ryan is a lawyer in private practice, a businessman providing analyses of policy issues significant to national security, and an educator teaching cyberlaw and
 information security as a Senior Fellow at the National Defense University and as an adjunct professor for George Washington University. Prior to returning to the private sector in 2012, he served for eight years as a Professor at the National Defense University,
 teaching cyberlaw, information security, information assurance, cryptography, network security and computer forensics. Prior to joining NDU, he was a lawyer in private practice.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Earlier he served as Corporate Vice President of Science Applications International Corporation with responsibility for information security for Government customers and
 commercial clients who operate worldwide and must create, store, process and communicate sensitive information and engage in electronic commerce. While at SAIC, he developed and provided security products and services for use in assessing security capabilities
 and limitations of client systems and networks, designing or re-engineering client systems and networks to ensure security, enhancing protection through a balanced mix of security technologies, detecting intrusions or abuses, and reacting effectively to attacks
 to prevent or limit damage. <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Prior to joining SAIC, Mr. Ryan served as Executive Assistant to the Director of Central Intelligence. Before that, he was Director of Information Systems Security for the
 Office of the Secretary of Defense serving as the principal technical advisor for all aspects of information security. He developed information security policy for the Department of Defense and managed the creation, operation and maintenance of secure computers,
 systems and networks. His specific areas of responsibility spanned information systems security (INFOSEC), including classification management, communications security (COMSEC) and cryptology, computer security (COMPUSEC) and transmission security (TRANSEC),
 as well as TEMPEST, technical security countermeasures (TSCM), operational security (OPSEC), port security, overflight security and counterimagery.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">2013 WORKSHOPS and PANELS<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Workshop & Panel: Examining the Forensic Expert: an ADFSL Panel<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">In today's litigation climate, battles are often waged between experts throughout all phases of litigation. Forensic quality evidence is the primary deliverable from expert
 witnesses who are generally retained by litigants. This panel specifically explores the often daunting dynamics of cyberforensic expert testimony given in pre-trial depositions, as expert witness testimony at trial, and before various other tribunals. The
 panel will deploy role play to explore a range of issues confronting expert witnesses and special masters to illustrate how they approach negotiating engagement letters, performing expert forensic work, complying with forensic standards of professional conduct,
 establishing their own credibility on the witness stand, and “holding up” under intense cross-examination by opposing counsel. The panelists will play roles of judge, sponsoring legal counsel, opposing counsel and expert cyberforensic witnesses. The audience
 is invited to participate as mock jurors who can “debrief” during Q&A to confirm the impact of particular behaviors of cyberforensic experts on the witness stand.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Workshop & Panel: Digital Forensics Readiness<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The concept of forensic readiness for a system describes the capability of the system to efficiently collect credible digital evidence that can then be used in legal proceedings.
 Efficiency for digital forensics has been described in terms of cost since costs tend to be significant especially for systems that are not forensics ready. Credible digital evidence refers to data that has been collected and preserved through a process that
 does not invalidate the legitimacy of the data. <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Forensic readiness is one of the few proposed forensics characteristics discussed in the forensics literature. Forensic readiness was proposed by Tan in 2001 in order to
 meet two objectives for systems used in digital investigations: 1) Costs should be minimized for incident responses and 2) An environment’s ability to collect digital evidence should be maximized. In his original paper on forensic readiness, Tan described
 many specific techniques for achieving digital forensic readiness including logging techniques, IDS data usage, forensic acquisition and evidence handling.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">A later paper describes how forensic readiness can be built into an enterprise forensics program and outlines ten steps to achieving forensic readiness. The main point is
 that forensic readiness makes sense from a business perspective and can result in cost savings should there be an investigation. Enterprises should be actively collecting potential evidence such as log files, network traffic records, e-mail and telephone records
 prior to involvement in an investigation.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Others described different aspects of system forensic readiness including policies for enhancing digital forensics readiness, incorporation into existing response plans
 and making sure forensic readiness leads to sound investigation. Another perspective discusses ensuring that hardware devices used to capture forensic evidence are reliable enough to enforce forensic readiness. As the wide divergence of these studies illustrate,
 there is no one methodology or approach to enabling forensic readiness within a system or enterprise.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Although the concept of forensic readiness has been circulating for years, only recently are applications appearing in products. With civil and criminal cases relying heavily
 on digital evidence, it’s time to revisit forensic readiness: what does the term mean today? What progress has been made in defining it? What products and systems incorporate forensic readiness concepts in their design?<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Please join us for a discussion of these ideas. Your contributions will assist in defining the state of the digital forensic readiness in theory and practice. The outcome
 will be a call for chapters in this specific area.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">2013 PAPERS and PRESENTATIONS<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">An Ontology-Based forensic Analysis Tool, United Arab Emirates<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Significance of Semantic Reconciliation in Digital Forensics, South Africa
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Identifying Peer-to-Peer Traffic on Shared Wireless Networks, USA<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The Development of Computer Forensic Legal System in mainland China, China<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">A Thematic Review of User Compliance with Information Security Policies Literature, USA<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">An Image Forensic Scheme with Robust and Fragile Watermarking for Business Documents, China<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">System-Generated Digital Forensic Evidence in Graphic Design Applications, South Africa<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">First glance: An Introductory Analysis of Network Forensics of TOR, USA<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Money Laundering Detection Framework to Link the Disparate and Evolving Schemes, USA / Chile<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Windows 8 Forensic Overview, USA<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">A Forensic Study of the Effectiveness of Selected Anti-Virus Products Against SSDT Hooking Rootkits,Canada<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Cybercrime and Punishment: An Analysis of the Deontological and Utilitarian Functions of Punishment in the Information Age,USA<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.5in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Electronic Discovery and Proportionality in Minnesota:  A Harbinger for the Federal Court System?, USA<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Participants<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The primary audience will include individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas of digital
 forensics, security, and law. This conference will be of value to both academic and practitioner audiences.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Submissions<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">All submissions are double blind peer reviewed.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif"">         <o:p>
</o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">Best Papers<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Selected papers from the conference will be considered for inclusion in the following journal:<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Journal of Digital Forensics, Security and Law<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.jdfsl.org">http://www.jdfsl.org</a>
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">REGISTRATION INFORMATION IS POSTED AT:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.digitalforensics-conference.org/registration.htm">http://www.digitalforensics-conference.org/registration.htm</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Association for Digital Forensics, Security and Law
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Website:
<a href="http://www.adfsl.org">http://www.adfsl.org</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Journal of Digital Forensics, Security and Law
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Website:
<a href="http://www.jdfsl.org">http://www.jdfsl.org</a>    <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><o:p> </o:p></span></p>
</div>
</body>
</html>