[DFSci] FY08 NIJ Electronic Crime and Digital Evidence Recovery Soliciation
Baker, Dave
bakerd at mitre.org
Tue Oct 23 05:26:46 PDT 2007
Saw this from Martin Novak, thought it would be of interest to some on
this list:
--------------------------------
NIJ has recently released it FY 08 Electronic Crime and Digital
Evidence Recovery solicitation. It was posted on October 15, 2007.
The specific topic areas of research include the following:
1. Data-carving tools. NIJ seeks the development of data-carving tools
and technologies that can perform more rapidly and effectively than
currently available tools. Data carving is the process of extracting
specific data subsets that correspond to specific files from larger
data sets. This function is frequently employed during analysis of
unallocated space on a digital media device-that is, areas on devices
that are not currently assigned to a file but may still hold data from
files that were deleted. Applicants are encouraged to consider sector
hashing and carving techniques, particularly for recovery of full or
partial multimedia files. NIJ seeks the development of data-carving
tools and technologies that can perform more rapidly and effectively
than currently available tools. Data carving is the process of
extracting specific data subsets that correspond to specific files
from larger data sets. This function is frequently employed during
analysis of unallocated space on a digital media device-that is, areas
on devices that are not currently assigned to a file but may still
hold data from files that were deleted. Applicants are encouraged to
consider sector hashing and carving techniques, particularly for
recovery of full or partial multimedia files.
2. Peer-to-peer investigative tools. NIJ seeks the development of
tools to investigate the use of peer-to-peer technologies to
facilitate criminal activity such as the distribution or sharing of
contraband material. Such tools will be specifically designed to
address decentralized peer-to-peer network protocols (e.g., KaZaA), or
unstructured peer-to-peer network protocols, such as Gnutella. State
and local law enforcement is particularly interested in solutions that
result in tools that will identify users who are sharing known
contraband on a particular network based on a known hash value. NIJ
seeks the development of tools to investigate the use of peer-to-peer
technologies to facilitate criminal activity such as the distribution
or sharing of contraband material. Such tools will be specifically
designed to address decentralized peer-to-peer network protocols
(e.g., KaZaA), or unstructured peer-to-peer network protocols, such as
Gnutella. State and local law enforcement is particularly interested
in solutions that result in tools that will identify users who are
sharing known contraband on a particular network based on a known hash
value.
3. Tools for small-scale devices. NIJ is interested in tools for
small-scale devices (e.g., BlackBerrys(R), Palm(R) devices, cell
phones, and personal digital assistants). State and local law
enforcement need tools for small-scale devices that can recover system
files, operating system information, applications, deleted files, and
unallocated space. Proposals should also address the development of
tools that can perform the following:
. Better identify data formats on small-scale devices.
. Create image files of data on small form factor devices.
. Recover digital media files on small-scale devices.
. Facilitate the forensic analysis of digital media on small-scale devices.
4. Increased data storage capability. NIJ is interested in the
development of innovative tools and technologies to address the need
for increased data storage capacity to archive large-volume data sets
generated in computer forensic examinations. Proposals that involve
purchasing more (and larger) media for storage will not be considered
an innovative solution. Proposals should address such solutions as
greater compression algorithms or other methods as a means of
addressing the legal requirements for data storage.
5. Imaging tools for networks and network-attached devices. NIJ is
interested in the development of imaging tools for networks as well as
network attached or connected devices. In the development of these
solutions, applicants should address one or more of the following
issues:
. Redundant Array of Independent Disks (RAID): A RAID is a disk
subsystem that is used to increase performance and/or provide fault
tolerance. A RAID uses a set of two or more ordinary hard disks and a
specialized disk controller that contains the RAID functionality.
. Wireless network devices including; routers, gateways, network
interface cards (NICs), repeaters, switches, hubs, and wirelessly
connected external digital media.
. Network data storage devices connected via computer to the network
as well as data storage devices connected directly to the network via
a wired or wireless network interface or connection.
NIJ encourages innovative and creative approaches to developing
solution for the aforementioned topic areas. NIJ cannot fund a
provision of training or direct service;
proposals primarily to purchase equipment, materials, or supplies; or
work that will be funded under another specific solicitation.
The full solicitation can be retrieved at
http://www.ojp.usdoj.gov/nij/funding.htm. You may also refer to
Frequently Asked Questions on Solicitation and Awarding at
http://www.ojp.usdoj.gov/nij/funding/faq_funding.htm.
If you have any specific questions regarding the solicitation, please
contact me directly at (703) 216-9231, or martin.novak at usdoj.gov.
Thank you,
Martin Novak
novakm1 at gmail.com
(703) 216-9231
---------------------------
--------------------------------------------------------------------
David W. Baker bakerd at mitre.org
Lead Information Systems Engineer
G122 - Information Analysis and Engineering (703) 983-3658
The MITRE Corporation (703) 983-5864 (F)
Mailstop T730 (877) 682-0632 (P)
7515 Colshire Drive McLean, VA, 22102
--------------------------------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3505 bytes
Desc: not available
URL: <http://lists.dfrws.org/pipermail/dfsci-dfrws.org/attachments/20071023/a9b01fb1/attachment.bin>
More information about the DFSci
mailing list