±Forensic Focus Partners

±Your Account


Forgotten password/username?

New Today: 0
New Yesterday: 3
Overall: 28298
Visitors: 89

±Forensic Focus Partner Links

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Expert-Level (ISC)2 CCFP Digital Forensics Training Available from May-July

Friday, April 17, 2015 (14:55:45)
From May 11-July 1, 2015, (ISC)2 is delivering Live OnLine Training courses to provide expert-level instruction for those interested in attaining CCFP certification (Certified Cyber Forensics Professional).

The courses are delivered through the (ISC)2 Learning Center, a centralized platform that allows learners to access CCFP training materials, educational resources and manage their (ISC)2 online training in one environment.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (824 reads)

Interview with Matt Davies, Digital Forensics Analyst, Sytech

Friday, April 17, 2015 (11:57:48)
Matt, you're a digital forensics analyst at Sytech. Tell us a bit about your role and what it involves.

My role at Sytech predominantly involves the extraction and analysis of embedded devices, such as mobile phones, tablets, satellite navigation systems, games consoles, unknown devices etc. The examinations I am involved in vary considerably and range from indecent images of children (IIOC) to providing assistance in murder investigations. Working for a private organisation, such as Sytech, allows me to experience both prosecution and defence based cases.

What first made you interested in digital forensics as a field?

It was the varied nature of the work accompanied by the opportunity to make a difference that attracted me to the field of Digital Forensics.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (828 reads)

Interview with Joe Williams, PhD Student, Canterbury Christ Church University

Wednesday, April 15, 2015 (13:10:32)
Joe, you presented an internet research tool at DFRWS. Could you briefly outline your presentation for our readers?

The presentation offered an early glimpse into a tool that will allow law enforcement officials to conduct online research. Essentially what that means is every action an official does while researching on the Internet is kept in an audit trail, for example in the cases of files being downloaded, hashed and logged. The presentation also touched upon the fact that, as far as we are aware, there are no overall guidelines within the UK on how Internet evidence should be gathered. Presently, ACPO guidelines only look at dead and live-box forensics, so there’s a real challenge in creating a tool where there is little official guidance.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1574 reads)

Review: Mobile Phone Examiner Plus (MPE+) - Part 2

Thursday, April 09, 2015 (15:45:02)
Reviewed by Si Biles, Thinking Security

One of the things that I love about being in IT is that it is an ever changing field. I find myself coming across new things daily. This even occasionally applies to my own “infrastructure”, such as it is. Once upon a time, in a land far, far away (well, Scotland) I started my IT career as a Linux SysAdmin – bouncing around corporate IT departments and getting into security. I strayed for a long time from this true path. I covered my guilt by generally trying to use a Mac, because at least it had a BSD based operating system, but I have once again seen the light, and have returned to my “root”s (hopefully at least one or two UNIX people got that joke)...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2233 reads)

Electronic Voiceprints: The Crime Solving Power of Biometric Forensics

Thursday, April 09, 2015 (12:50:54)
By Jared Stern

Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person’s voice, a so-called “voiceprint.” Sometimes, a person’s voice is the only clue that police and forensic teams have to go on.

What Is It?

Voiceprinting is a new kind of forensic evidence that uses a person’s voice to determine certain key facts about a situation or investigation. Voice identification involves the analysis and comparison of a person’s voice, using advanced computer systems and software which can analyze how words flow together, pauses, breath, and the unique patterns generated by each individual’s mouth and larynx.

First, the quality of the recording is established using special instrumentation. In a classic sound spectrograph, the person’s voice is recorded on a magnetic disk and then sent through an amplifier.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1525 reads)

International Police Operation Targets Polymorphic Beebone Botnet

Thursday, April 09, 2015 (10:25:06)
On 8 April, Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT), joined forces with the Dutch authorities and the FBI, and U.S-based representatives at the National Cyber Investigative Joint Task Force- International Cyber Crime Coordination Cell (IC4) along with private sector partners, to target the Beebone (also known as AAEH) botnet, a polymorphic downloader bot that installs various forms of malware on victims’ computers. Initial figures show that over 12,000 computers have been infected, however it is likely there are many more.

In the operation, led by the Dutch National High Tech Crime Unit, the J-CAT’s Cyber Liaison Officers worked together with Europol officials and representatives from Intel Security, Kaspersky and Shadowserver. The botnet was 'sinkholed' by registering, suspending or seizing all domain names with which the malware could communicate and traffic was then redirected.

Read More (Europol)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1434 reads)

Interview with Martin Harran, Developer, Visual JPEG

Wednesday, April 08, 2015 (09:05:27)
Martin, you've been demonstrating Visual JPEG at DFRWS. Could you tell us about the concept behind it, and how you came up with the idea?

It's a tool to make life easier for people examining files.

The background of this was that for a Master's research project, I was looking at ways of working with JPEGs with Digiprove, a company that uses digital certificates for files, and they wanted to get a way of building the digital certificate actually inside the file instead of travelling as a separate item. And I did come up with a way of doing that, but I found it frustrating that I had to work a lot with JPEGs, and I was having to use things like hex editors. It's so much hard work. And I just said no, there has to be an easier way of doing this.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1818 reads)

DFRWS Europe 2015 Annual Conference – Recap

Tuesday, April 07, 2015 (19:09:41)
This article is a recap of some of the main highlights of the Digital Forensics Research Workshop (DFRWS) held in Dublin from the 23rd – 26th of March 2015. Over the next few weeks Forensic Focus will also be bringing you a number of interviews and research updates from the conference.

Conference Highlights

DFRWS began with a series of workshops held at the Hilton Double Tree in Dublin. Frédéric Baguelin and Solal Jacob from Arxsys demonstrated Digital Forensics Framework and provided exercises for the attendees, who were able to perform a full forensic analysis of a provided disk image. The workshop covered several areas including Skype and SQLite analysis, antivirus scanning, bookmarking, tagging and reporting.

Upstairs in the meeting rooms, Michael Cohen from Google discussed the recently released Rekall platform, and how to use it for memory analysis in forensic investigations.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1376 reads)

Oxygen Forensic Suite 7.2 Adds WhatsApp Voice Calls Analysis

Tuesday, April 07, 2015 (14:05:02)
Oxygen Forensics releases a major update to its flagship mobile forensic solution, Oxygen Forensic® Suite. New version introduces industry-first analysis of WhatsApp voice calls parsing, recovers deleted entries directly in each application section, displays messages in convenient conversion view, imports BlackBerry 10 Chip-off extractions and adds Advanced Logical extraction for iOS 8.x devices. Also in this version: support for 9500+ devices and 550+ applications.

Download Oxygen Forensic® Suite 2015 v.7.2 Release Notes.
Watch Oxygen Forensic® Suite 2015 v.7.2 Release Video.

Webinar: Being Your Own Expert Witness

Friday, April 03, 2015 (16:27:29)
A recording of the recent (ISC)2 webinar "Being Your Own Expert Witness" is now online here.

With data breaches and data leakage incidents becoming front page news, cyber investigations are taking on more importance within organizations. This calls for a new set of skills to be developed such as the ability to work with all levels of law enforcement, lawyers and attorneys and within the judicial system. Many of these investigations will call for the cybersecurity practitioner to be a witness and give testimony. What's the best way to do this to protect yourself and the organization, while also providing the information that will help law enforcement and the justice system to get the information they need? Join (ISC)2 in this "From the Trenches" webinar where they will talk about what it means to be an expert witness and the best practices for serving as one.

View the webinar.

Presenters: Brandon Dunlap, Global CISO at Black & Veatch and Managing Director - Research at Brightfly, Inc.; Herbert Joe, Certified Forensics Consultant, Yonovitz & Joe, LLP; Andrew Neal, TransPerfect
  • Posted by: jamie
  • Topic: All
  • Score: 0 / 5
  • (1450 reads)