May 30, 2008
Purdue offers Macintosh forensics workshop June 3-5WEST LAFAYETTE, Ind. - Purdue University for the first time will offer an introductory training course for law-enforcement officers on how to examine Macintosh computers for digital forensic evidence.
The Cyber Forensics Lab, located in the Department of Computer and Information Technology, will conduct "Introduction to Macintosh Forensics" from 8 a.m. to 5 p.m. June 3-5 in Knoy Hall, Room 228.
Officers from around the state and region will learn how to forensically examine a Macintosh computer and related devices (iPod, iPhone, Apple TV) for digital evidence, including pictures, e-mail, Web history, chat logs, contacts and documents.
Marc Rogers, a professor of computer and information technology and director of Purdue's cyber forensics program, said Purdue made the decision to offer the Macintosh-only training because of a special request by the Indiana State Police, U.S. Attorney's Office and the Internet Crimes Against Children Task Force officers.
"We have offered many digital forensics courses in the past, but this is the first course on Macs we have ever hosted," he said. "We have and are publishing various articles in journals on Mac forensics, and as these computers and devices become more popular, we have found ourselves actively investigating these types of systems every two to three months."
Rogers said this workshop complements the training the Cyber Forensics Lab has offered in the past on forensics for Windows-based computers and cell phones.
He said Purdue plans to offer an advanced class on Macintosh computer forensics in the fall.
Purdue's Cyber Forensics Lab trains about 100 law-enforcement offers a year and is a teaching center for students and a resource for national and international law enforcement officers and other investigators. The work there includes research on how to retrieve information from cell phones and other digital devices in a criminal investigation, the development of software that helps first responders deal with crimes involving digital pictures, and analysis of technology such as malware and botnets as they relate to complex international cybercrime.
Writer: Kim Medaris, (765) 494-6998, email@example.com
Source: Marc Rogers, (765) 494-2561, firstname.lastname@example.org
Purdue News Service: (765) 494-2096; email@example.com
To the News Service home page