<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Generator" content="Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Wingdings;
        panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0in;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p.MsoPlainText, li.MsoPlainText, div.MsoPlainText
        {mso-style-priority:99;
        mso-style-link:"Plain Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.5pt;
        font-family:Consolas;}
p
        {mso-style-priority:99;
        margin:0in;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Arial","sans-serif";}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
        {mso-style-priority:99;
        mso-style-link:"Balloon Text Char";
        margin:0in;
        margin-bottom:.0001pt;
        font-size:8.0pt;
        font-family:"Tahoma","sans-serif";}
span.PlainTextChar
        {mso-style-name:"Plain Text Char";
        mso-style-priority:99;
        mso-style-link:"Plain Text";
        font-family:Consolas;}
span.BalloonTextChar
        {mso-style-name:"Balloon Text Char";
        mso-style-priority:99;
        mso-style-link:"Balloon Text";
        font-family:"Tahoma","sans-serif";}
span.EmailStyle22
        {mso-style-type:personal-compose;
        font-family:"Arial","sans-serif";
        font-weight:bold;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page WordSection1
        {size:8.5in 11.0in;
        margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:1158419997;
        mso-list-type:hybrid;
        mso-list-template-ids:204918238 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:.25in;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level2
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:.75in;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level3
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:1.25in;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level4
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:1.75in;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level5
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:2.25in;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level6
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:2.75in;
        text-indent:-.25in;
        font-family:Wingdings;}
@list l0:level7
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:3.25in;
        text-indent:-.25in;
        font-family:Symbol;}
@list l0:level8
        {mso-level-number-format:bullet;
        mso-level-text:o;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:3.75in;
        text-indent:-.25in;
        font-family:"Courier New";}
@list l0:level9
        {mso-level-number-format:bullet;
        mso-level-text:\F0A7;
        mso-level-tab-stop:none;
        mso-level-number-position:left;
        margin-left:4.25in;
        text-indent:-.25in;
        font-family:Wingdings;}
ol
        {margin-bottom:0in;}
ul
        {margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-US" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">SPEAKERS and TOPICS Announced<o:p></o:p></span></b></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<table class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" style="border-collapse:collapse">
<tbody>
<tr>
<td width="504" colspan="4" valign="top" style="width:5.25in;border:solid windowtext 1.5pt;border-bottom:none;background:yellow;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText"><o:p> </o:p></p>
</td>
</tr>
<tr>
<td width="18" rowspan="3" valign="top" style="width:13.5pt;border-top:none;border-left:solid windowtext 1.5pt;border-bottom:none;border-right:solid windowtext 1.5pt;background:yellow;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText"><o:p> </o:p></p>
</td>
<td width="468" colspan="2" valign="top" style="width:351.0pt;border-top:solid windowtext 1.5pt;border-left:none;border-bottom:none;border-right:solid windowtext 1.5pt;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText" align="center" style="text-align:center"><b><span style="font-size:11.0pt;font-family:"Arial","sans-serif"">9<sup>th</sup> ADFSL Conference on Digital Forensics, Security and Law</span></b><o:p></o:p></p>
</td>
<td width="18" rowspan="3" valign="top" style="width:13.5pt;border:none;border-right:solid windowtext 1.5pt;background:yellow;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText"><o:p> </o:p></p>
</td>
</tr>
<tr style="height:66.15pt">
<td width="174" valign="top" style="width:130.5pt;padding:0in 5.4pt 0in 5.4pt;height:66.15pt">
<p class="MsoPlainText" align="right" style="text-align:right"><img width="89" height="82" id="Picture_x0020_0" src="cid:image001.jpg@01CBE750.BF6B6EC0" alt="Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: Description: adfslgraphic.jpg"><o:p></o:p></p>
</td>
<td width="294" style="width:220.5pt;border:none;border-right:solid windowtext 1.5pt;padding:0in 5.4pt 0in 5.4pt;height:66.15pt">
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Venue: Richmond, Virginia USA
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Dates: 28-29 May 2014<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Conference Website:
<br>
<a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>  </span><o:p></o:p></p>
</td>
</tr>
<tr>
<td width="468" colspan="2" valign="top" style="width:351.0pt;border-top:none;border-left:none;border-bottom:solid windowtext 1.5pt;border-right:solid windowtext 1.5pt;padding:0in 5.4pt 0in 5.4pt">
</td>
</tr>
<tr>
<td width="504" colspan="4" valign="top" style="width:5.25in;border:solid windowtext 1.5pt;border-top:none;background:yellow;padding:0in 5.4pt 0in 5.4pt">
<p class="MsoPlainText"><o:p> </o:p></p>
</td>
</tr>
<tr>
<td width="18" style="width:13.5pt;padding:0in 0in 0in 0in"></td>
<td width="174" style="width:130.5pt;padding:0in 0in 0in 0in"></td>
<td width="294" style="width:220.5pt;padding:0in 0in 0in 0in"></td>
<td width="18" style="width:13.5pt;padding:0in 0in 0in 0in"></td>
</tr>
</tbody>
</table>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><b><i><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Dear colleagues:
<o:p></o:p></span></i></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The ADFSL 2014 Conference on Digital Forensics, Security and Law will be held on May 28-29, 2014.  The venue for the conference will be the Westin Hotel in Richmond, Virginia.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The ADFSL Conference on Digital Forensics, Security and Law is a unique and innovative event.  It is managed by the Association of Digital Forensics, Security and Law (ADFSL).
 The conference focuses on the current and expanding role of digital forensics within investigations and the courts as well as its important role within cyber security - both national as well as corporate. Topics not only include technology and evidence, but
 also are very much focused on how to prepare students for careers in digital forensics. Conference papers are double blind refereed and provide a forum for high quality research, communication and debate on the subject of digital forensics and directly related
 fields. <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">The conference is of particular interest to individuals who are interested in developing curriculum and teaching methods as well as conducting research related to the areas
 of digital forensics, security, and law. This conference will be of value to both academic and practitioner audiences.
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">2014 KEYNOTE SPEAKER<o:p></o:p></span></b></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">This year’s keynote speaker will be Mark Pollitt.</span>
<span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Mark Pollitt served over thirty years in the U. S. government, over ten years as a military officer in the Marine Corps and Coast Guard and then another twenty as a Special Agent of the Federal
 Bureau of Investigation. In addition to conducting criminal and national security investigations for over 13 years, he supervised online investigations, was the Chief of the FBI’s computer forensic unit (CART) and was the Director of the Regional Computer
 Forensic Laboratory Program.<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><b><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">TOPICS / PAPERS</span></b><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Tejashree D. Datar: Awareness of Scam E-mail: An Exploratory Research Study
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Craig Valli: Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Ibrahim Baggili: LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Kathryn C. Seigfried-Spellar: Using Internet Artifacts to Profile a Child Pornography Suspect
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Rachel Sitarz: Internet Addiction to Child Pornography<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Nicolai Kuntze: Generation and Handling of Hard Drive Duplicates as Piece of Evidence
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Emilio Raymond Mumba: Testing The Harmonised Digital Forensic Investigation Process in Post Mortem Digital Investigation
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Igor Korkin: Applying Memory Forensics to Rootkit Detection
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Grover Kearns: Computer Forensics for Accountants
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Masooda Bashir: Development and Dissemination of a New Multidisciplinary Undergraduate Curriculum in Digital Forensics
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Brian O. Cusack: Botnet Forensic Investigation Techniques and Cost Evaluation
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Angela Orebaugh : Visualizing Instant Messaging Author Writeprints for Forensic Analysis<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Enrique García: Application Of Toral Automorphisms to Preserve Confidentiality Principle in Video Live Streaming
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Raymond Hansen: Work in Progress: An Architecture for Network Path Reconstruction via Backtraced OSPF LSDB Synchronization
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Gary Warner, Michael Nagy: Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus
<o:p></o:p></span></p>
<p class="MsoPlainText" style="margin-left:.25in;text-indent:-.25in;mso-list:l0 level1 lfo2">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol"><span style="mso-list:Ignore">·<span style="font:7.0pt "Times New Roman"">        
</span></span></span><![endif]><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Gary Warner: Hot Zone Identification: Analyzing Effects of Data Sampling on SPAM Clustering<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Selected papers from the conference will be considered for inclusion in the following journal:<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Journal of Digital Forensics, Security and Law<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.jdfsl.org">http://www.jdfsl.org</a>
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">ADDITIONAL INFORMATION FOR THE CONFERENCE CAN BE FOUND AT:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.digitalforensics-conference.org">http://www.digitalforensics-conference.org</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">REGISTRATION INFORMATION IS POSTED AT:
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><a href="http://www.digitalforensics-conference.org/registration.htm">http://www.digitalforensics-conference.org/registration.htm</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Association for Digital Forensics, Security and Law
<o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif"">Website:
<a href="http://www.adfsl.org">http://www.adfsl.org</a>   <o:p></o:p></span></p>
<p class="MsoPlainText"><span style="font-size:10.0pt;font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoNormal"><b><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></b></p>
<p class="MsoNormal"><img border="0" width="207" height="50" id="Picture_x0020_8" src="cid:image002.png@01CF2F92.0333F0A0" alt="cid:image002.png@01CF2F92.0333F0A0"><span style="font-size:9.0pt;color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><i><span style="font-size:9.0pt;color:#1F497D">"Verum Vacuus Proclivitas"<o:p></o:p></span></i></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">Glenn S. Dardick, Ph.D., CCE (ISFCE), CCFP (ISC2)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D"><img border="0" width="77" height="72" id="Picture_x0020_9" src="cid:image003.jpg@01CF2F92.0333F0A0" alt="cce-logo"></span><span style="font-size:9.0pt;color:#1F497D">  
<img border="0" width="140" height="70" id="Picture_x0020_10" src="cid:image004.jpg@01CF2F92.0333F0A0" alt="ccfp"></span> <img border="0" width="264" height="70" id="Picture_x0020_11" src="cid:image005.png@01CF2F92.0333F0A0" alt="cid:image005.png@01CF2F92.0333F0A0"><span style="font-size:9.0pt;color:#1F497D"><br>
804-402-9239<br>
<a href="mailto:gdardick@dardick.net">gdardick@dardick.net</a><br>
gdardick (Skype)<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">Director<br>
Longwood Center for Cyber Security, Longwood University, USA<br>
<i>A National Center for Digital Forensics Academic Excellence<br>
</i><a href="mailto:dardickgs@longwood.edu">dardickgs@longwood.edu</a><br>
<br>
Director<br>
Association for Digital Forensics, Security and Law <br>
</span><img border="0" width="83" height="84" id="Picture_x0020_12" src="cid:image006.png@01CF2F92.0333F0A0" alt="cid:image006.png@01CF2F92.0333F0A0"><img border="0" width="55" height="73" id="Picture_x0020_1" src="cid:image007.png@01CF2F92.0333F0A0" alt="cid:image007.png@01CF2F92.0333F0A0"><span style="font-size:9.0pt;color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><i><span style="font-size:9.0pt;color:#1F497D">Publisher of the Journal of Digital Forensics, Security and Law<o:p></o:p></span></i></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D"><a href="mailto:gdardick@adfsl.org">gdardick@adfsl.org</a>
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">  <o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">Adjunct Associate Professor<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">ECU Security Research Institute, Edith Cowan University, Australia
<o:p></o:p></span></p>
<p class="MsoNormal" style="margin-bottom:12.0pt"> <img border="0" width="96" height="75" id="Picture_x0020_14" src="cid:image008.png@01CF2F92.0333F0A0" alt="cid:image008.png@01CF2F92.0333F0A0"><span style="font-size:9.0pt;color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">International Society of Forensic Computer Examiners
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">Infragard, Richmond, Virginia 
<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">LexConverge, University of Malta<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">Fellow, African Center for Cyberlaw and Cybercrime Prevention (ACCP), Kampala Uganda<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal" style="margin-bottom:12.0pt"><span style="font-size:9.0pt;color:#1F497D">Shipping/Postal Address:<br>
Glenn S. Dardick / ADFSL<br>
1642 Horsepen Hills Road<br>
Maidens, Virginia 23102<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:9.0pt;color:#1F497D">This electronic message is intended only for the use of the individual or company named above. If the intended recipient is a client, the information contained in this message is considered confidential,
 proprietary, privileged, and may contain client confidential information and work product. It may also contain trade secrets protected by State and Federal law. If you are not the addressee please do not copy or deliver this message to anyone. You should immediately
 delete the message without reading the contents and notify us by return email that the message was misdirected. I apologize for the inconvenience. Any other use of this information is strictly prohibited.<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></b></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><span style="font-family:"Arial","sans-serif""><o:p> </o:p></span></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoPlainText"><o:p> </o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:"Times New Roman","serif""><o:p> </o:p></span></p>
</div>
</body>
</html>