OSIRT: a tool for law enforcement research and investigation

Conference keynote


Williams, J. and Stephens, P. 2015. OSIRT: a tool for law enforcement research and investigation.
AuthorsWilliams, J. and Stephens, P.
TypeConference keynote
Year2015
Conference11th Annual Teaching Computer Forensics Workshop
File
Publication process dates
Deposited26 Nov 2015
Permalink -

https://repository.canterbury.ac.uk/item/87936/osirt-a-tool-for-law-enforcement-research-and-investigation

  • 441
    total views
  • 121
    total downloads
  • 5
    views this month
  • 2
    downloads this month

Export as

Related outputs

Digital policing
Stephens, P. and Bradbury, P. 2024. Digital policing. in: Wood, D., Dickens, T., Bradshaw, S., Parker-McLeod, J. and Davis, C. (ed.) Blackstone's Handbook for Policing Students 2024 Oxford Oxford University Press. pp. 280-293
Is the digital forensic tool user interface broken?
Werb, D. and Stephens, P. 2022. Is the digital forensic tool user interface broken?
Cybercrime
Stephens, P. and Brady, E. 2022. Cybercrime. in: Wood, D., Bradshaw, S., Dickens, T., Parker-McLeod, J., Simpson, F. and Weaver, G. (ed.) Blackstone's Handbook for Policing Students 2023 Oxford University Press.
The future of policing cybercrime: Reflections on the Strategic Review of Policing in England and Wales
Stephens, P. 2022. The future of policing cybercrime: Reflections on the Strategic Review of Policing in England and Wales .
Analysis of the ‘Open Source Internet Research Tool’: a usage perspective from UK law enforcement
Williams, J. and Stephens, P. 2020. Analysis of the ‘Open Source Internet Research Tool’: a usage perspective from UK law enforcement. in: Clarke, N. and Furnell, S. (ed.) Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings Springer.
Preventing digital crime
Bennett, D. and Stephens, P. 2016. Preventing digital crime. in: Bryant, R. (ed.) Policing Digital Crime New York Routledge. pp. 63-82
The effectiveness of policing cybercrime
Stephens, P. 2018. The effectiveness of policing cybercrime.
Analysis of a training package for law enforcement to conduct open source research
Williams, J. and Humphries, G. 2019. Analysis of a training package for law enforcement to conduct open source research. International Journal of Cyber Research and Education. 1 (1). https://doi.org/10.4018/IJCRE.2019010102
Creating and integrating a FLOSS product into UK law enforcement
Williams, J. 2018. Creating and integrating a FLOSS product into UK law enforcement. in: Open Source Systems: Enterprise Software and Solutions Springer.
Synchronous diversification of Sulawesi’s iconic artiodactyls driven by recent geological events
Frantz, L., Rudzinski, A., Mansyursyah Surya Nugraha, A., Evin, A., Burton, J., Hulme-Beaman, A., Linderholm, A., Barnett, R., Vega, R., Irving-Pease, E., Haile, J., Allen, R., Leus, K., Shephard, J., Hillyer, M., Gillemot, S., van den Hurk, J., Ogle, S., Atofanei, C., Thomas, M., Johansson, F., Haris Mustari, A., Williams, J., Mohamad, K., Siska Damayanti, C., Djuwita Wiryadi, I., Obbles, D., Mona, S., Day, H., Yasin, M., Meker, S., McGuire, J., Evans, B., von Rintelen, T., Hoult, S., Searle, J., Kitchener, A., Macdonald, A., Shaw, D., Hall, R., Galbusera, P. and Larson, G. 2018. Synchronous diversification of Sulawesi’s iconic artiodactyls driven by recent geological events. Proceedings of the Royal Society B: Biological Sciences. https://doi.org/10.1098/rspb.2017.2566
Legal and ethical issues surrounding open source research for law enforcement purposes
Williams, J. 2017. Legal and ethical issues surrounding open source research for law enforcement purposes. in: Skarzauskiene, A. and Gudeliene, N. (ed.) Proceedings of the 4th European Conference on Social Media ACPIL.
An open source "open source internet research tool"
Williams, J. 2016. An open source "open source internet research tool".
Open source internet research tool (OSIRT): an investigative tool for law enforcement officials
Williams, J. 2017. Open source internet research tool (OSIRT): an investigative tool for law enforcement officials.
Application of problem based learning – Cybersecurity
Irons, A., Lallie, H., Thomas, P. and Stephens, P. 2017. Application of problem based learning – Cybersecurity.
Problem-based learning in cybersecurity at CCCU
Stephens, P. 2016. Problem-based learning in cybersecurity at CCCU.
Open source Internet research tool
Williams, J. and Stephens, P. 2015. Open source Internet research tool.
Resourcing computer forensics courses
Stephens, P. and Humphries, G. 2014. Resourcing computer forensics courses.
Policing digital crime
Bryant, R., Bryant, R., Bennett, D., Day, E., Kennedy, I. and Stephens, P. Bryant, R. and Bryant, R. (ed.) 2014. Policing digital crime. Farnham Ashgate.
Quantifying the problem of live data forensics
Stephens, P. and Quay-Ross, A. 2013. Quantifying the problem of live data forensics.
Cutting the costs of cybercrime forensics training without cutting corners
Stephens, P. 2013. Cutting the costs of cybercrime forensics training without cutting corners.
The political construction of social inclusion through Further Education policy (1997 – 2007)
Williams, J. 2009. The political construction of social inclusion through Further Education policy (1997 – 2007). PhD Thesis University of Kent
An evaluation of Linux Cybercrime Forensics courses for European law enforcement
Stephens, P. 2012. An evaluation of Linux Cybercrime Forensics courses for European law enforcement. in: Clarke, N. and Furnell, S. (ed.) Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012) Plymouth University. pp. 119-128
Employability from computer forensics programmes
Irons, A. and Stephens, P. 2011. Employability from computer forensics programmes.
The challenges of live data forensics
Stephens, P. and Irons, A. 2011. The challenges of live data forensics.
What is the best approach for providing Cybercrime Education for Law Enforcement (LE)?
Stephens, P. 2011. What is the best approach for providing Cybercrime Education for Law Enforcement (LE)?
What can a computer forensics examiner learn from an ethical hacker?
Stephens, P. and Stock, G. 2008. What can a computer forensics examiner learn from an ethical hacker?
Why should we be teaching Linux forensics?
Stephens, P. 2008. Why should we be teaching Linux forensics?
An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl
Stephens, P. and Childs, D. 2008. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl.
Group-based assignments in computing courses
Stephens, P. and Stock, G. 2008. Group-based assignments in computing courses.
A usability analysis of autopsy forensic browser
Bennett, D. and Stephens, P. 2008. A usability analysis of autopsy forensic browser.
Dealing with contract cheating: policies and procedures
Stephens, P. and Edgar-Nevill, D. 2008. Dealing with contract cheating: policies and procedures.
Teaching European law enforcement forensic scripting using bash
Stephens, P. 2009. Teaching European law enforcement forensic scripting using bash.
Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement
Stephens, P. 2009. Teaching ''Linux as a Forensic Tool'' (Online) to European Law Enforcement.
Cybercrime training versus computer forensics education
Stephens, P. 2007. Cybercrime training versus computer forensics education.
Cybercrime investigation training and specialist education for the European Union
Stephens, P. and Induruwa, A. 2007. Cybercrime investigation training and specialist education for the European Union.
Developing cybercrime forensics: the growing pains of a new discipline
Edgar-Nevill, D. and Stephens, P. 2007. Developing cybercrime forensics: the growing pains of a new discipline.
Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors
Stephens, P. 2010. Teaching the police to program: building a simple IDE to teach shell scripting and reduce syntax errors.
The teaching and learning programme in Wales: the Foundation Phase
Maynard, T., Morgan, A., Waters, J. and Williams, J. 2010. The teaching and learning programme in Wales: the Foundation Phase. Welsh Assembly Government.
Developing cybercrime forensics: the growing pains of a new discipline
Stephens, P. and Edgar-Nevill, D. 2008. Developing cybercrime forensics: the growing pains of a new discipline. in: Petratos, P. and Dandapani, P. (ed.) Current Advances in Computing, Engineering and Information Athens Athens Institute for Education and Research. pp. 105-114
The future of forensic computing: challenges, techniques and tools
Stephens, P. 2008. The future of forensic computing: challenges, techniques and tools. in: Petratos, P. and Marcoulides, G. (ed.) Recent Advances in Computing and Management Information Systems Athens Athens Institute for Education and Research. pp. 55-62
Plastic card crime
Bryant, R. and Stephens, P. 2008. Plastic card crime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 133-151
Identity and identity theft
Marshall, A. and Stephens, P. 2008. Identity and identity theft. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 179-193
Digitalisation and crime
Bryant, R. and Stephens, P. 2008. Digitalisation and crime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 211-230
Encryption
O'Reilly, D. and Stephens, P. 2008. Encryption. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 97-120
IPR and technological protection measures
Stephens, P. 2008. IPR and technological protection measures. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 121-131
Countering cybercrime
Edgar-Nevill, D. and Stephens, P. 2008. Countering cybercrime. in: Bryant, R. (ed.) Investigating Digital Crime Chichester Wiley. pp. 79-96
Digital investigation as a distinct discipline: a pedagogic perspective
Irons, A., Stephens, P. and Ferguson, R. 2009. Digital investigation as a distinct discipline: a pedagogic perspective. Digital Investigation. 6 (1-2), pp. 82-90. https://doi.org/10.1016/j.diin.2009.05.002
The Foundation Phase
Maynard, T., Morgan, A., Waters, J. and Williams, J. 2010. The Foundation Phase. in: Furlong, J. (ed.) The Teaching and Learning Programme in Wales Welsh Assembly Government.
ESRC/TLRP (WERN) The Foundation Phase: a policy review
Maynard, T., Waters, J., Morgan, A. and Williams, J. 2009. ESRC/TLRP (WERN) The Foundation Phase: a policy review. Swansea, Wales Teaching and Learning Research Programme.
IT forensics: training or education?
Edgar-Nevill, D. and Stephens, P. 2007. IT forensics: training or education? Infosecurity. 4 (7), pp. 12-13. https://doi.org/10.1016/S1754-4548(07)70166-3
An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl
Childs, D. and Stephens, P. 2009. An analysis of the accuracy and usefulness of Vinetto, Pasco and Mork.pl. International Journal of Electronic Security and Digital Forensics. 2 (2), pp. 182-198. https://doi.org/10.1504/IJESDF.2009.024902
A cognitive walkthrough of Autopsy Forensic Browser
Bennett, D. and Stephens, P. 2009. A cognitive walkthrough of Autopsy Forensic Browser. Information Management & Computer Security. 17 (1), pp. 20-29. https://doi.org/10.1108/09685220910944731