±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36205
New Yesterday: 4 Visitors: 147

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 3

How To Collect And Share Digital Evidence Files With Prosecutors

Thursday, October 31, 2019 (08:57:53)
In this short How To video, digital forensic specialist Rich Frawley will show you how to collect and share digital evidence files with prosecutors and third parties using ADF Software. This video is ideal for learning how to share evidence with prosecutors for review.

If you are tasked with the collecting specific files or collecting all files from a specific location, ADF digital forensic software makes this fast and easy. Collecting and sharing evidence can be useful

• due to a legal hold
• specific need in your investigation
• a limitation placed on of claimed privilege
• legal limitations set forth by a judge

This lesson is helpful if, for instance, if you have a need to collect only PDF files from a specific computer or collect all files from a specific User Profile.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (804 reads)

What Changes Do We Need To See In eDiscovery? Part IV

Wednesday, October 30, 2019 (21:29:55)
by Harold Burt-Gerrans

In Part 3, I introduced the concept of consolidating duplicates by tracking Metadata at a DocID level and coding and/or document actions at a Document Level. For ease, I’m duplicating part of the example charts here as I will refer back to them to illustrate some of the following discussion.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (525 reads)

Register For Webinar - Addressing The Serious Threat Of Cybercrime

Wednesday, October 30, 2019 (14:32:19)
Cybercrime provides its own unique challenges. Every case of fraud, workplace harassment, insider threats, identify theft, data exfiltration, IP theft, network intrusions, malware and ransomware attacks have the potential to devastate not only individuals, but corporations of all sizes.

In fact, in 2015, cybercrime cost the world over $3 trillion and if current trends continue, it’s predicted that by 2021 the cost of cybercrime will be in excess of $6 trillion.

When cybercrime occurs, it’s critical to understand the extent of what was done, how it happened, and who did it.

Join Drew Roberts, Product Manager at Magnet Forensics, as he introduces Magnet AXIOM Cyber: a new solution that helps digital forensics professionals acquire and examine evidence from computer, mobile, and cloud sources and is purpose-built to address the unique challenges presented by cybercrime.

During the webinar, Drew will demonstrate the power of AXIOM Cyber including:

• Creation and deployment of a remote acquisition agent that can connect to and collect evidence from target endpoints
• Collection of evidence from Amazon S3 buckets
• Use of Admin credentials to acquire evidence from a user’s account in Enterprise deployments of Google, Microsoft, and Box as well as Slack
• Magnet AXIOM Cyber is currently in beta testing. To learn more about AXIOM Cyber and sign up to participate in the beta program, visit: magnetaxiomcyber.com.

Date: November 5th, 2019
Time: 10am EST

Presenters: Sal Aziz & Drew Roberts

Register here
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1891 reads)

Webinar: Atola TaskForce Demo

Tuesday, October 29, 2019 (13:45:42)
A new webinar, Atola TaskForce Demo, is available to view here.

Join the forum discussion here.
View the webinar on YouTube here.
Read a full transcript of the webinar here.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (810 reads)

Uses Of Unmanned Aerial Vehicles (UAVs) In Crime Scene Investigations

Monday, October 28, 2019 (20:18:57)
by Chirath De Alwis and Chamalka De Silva

Recent advancements in technology have helped many people to have a better quality of life. Unmanned Aerial Vehicles (UAVs), also known as ‘drones’, are one such technological advancement that can help society to simplify day-to-day activities. These drones are now widely used in many industries such as agriculture, photography, transportation. But this same technology can also be used to conduct unethical activities.

Capturing privacy related content, illegal interception of other drones, and military use of drones in bombings are some common scenarios of unethical activities that can be done using drones. Investigating each scenario requires different approaches, as the availability of evidence can vary. Therefore, digital forensics investigators need to be able to examine drones in crime scene investigations. This article focuses on the technology behind drones and how drones can be useful in crime scene investigations. This helps investigators to simplify their digital forensics investigations when looking at drones.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1057 reads)

Forensic Focus Forum Round-Up

Monday, October 28, 2019 (10:39:42)
Welcome to this month’s round-up of recent posts to the Forensic Focus forums.

How can you find login information when the user profile no longer exists?

Can you help pronie2121 with a device seizure acquisition problem?

How do you verify the public IP of a virtual machine, if there is no browser installed and ifconfig only shows the private IP?

Djzngo is investigating the originality of documents - add your thoughts and suggestions on the forum.

What Mac imaging software would you recommend?
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1257 reads)

Crimes Against Children Conference 2019 Recap Part II: Digital Evidence

Friday, October 25, 2019 (12:54:17)
By Christa Miller, Forensic Focus

Our first article in this two-part series focused on the technology associated with crimes against children: mobile peer-to-peer software; cryptocurrency used to buy and sell child sexual abuse material (CSAM); the virtual worlds where abuse might take place; and how technology can help reduce investigators’ vicarious trauma.

In Part II, we focus on how the data you capture can be leveraged to work together with forensic interviewers and prosecutors to corroborate evidence and build cases. It’s very much a team effort, where the work you do supports multiple aspects of an entire investigation.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (5131 reads)

TikTok Data Extraction In Oxygen Forensic Detective

Friday, October 25, 2019 (10:57:52)
What is it?

TikTok, an emerging app is rapidly gaining popularity. It recently unseated Instagram, YouTube and Snapchat as the top free app in Apple’s App Store . As of Nov. 6 2018, according to industry research firm App Annie, the app ranked first among photo and video apps in daily iPhone downloads in the US.

Comprehending The IoT Cyber Threat Landscape

Thursday, October 24, 2019 (17:59:08)
Morteza Safaei Pour shares his research at DFRWS EU 2019.

Morteza: Hello and good morning - my name is Morteza Safaei Pour, from CTI Lab Florida Atlantic University. Today I'm going to talk about comprehending the IoT cyber threat landscape, and how we get information about IoT maliciousness and IoT probing campaigns.

So we heard a lot about the Internet of Things. There are many of these devices produced every day and connected to the network. We expect by 2025 that more than 75 billion of these devices [will be] connected to the network. These devices are ranging from network devices, IP cameras, smart homes, to cyber physical systems and serial control systems.

And usually, people connect these devices directly to the internet, or these devices use some protocols like ports and connect to the public network. It's kind of interesting to mention that, if you have a brand new device and connect it to the network, it takes a few seconds to a few minutes to get infected by one of the IoT malwares.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1029 reads)

Unlock Mobile Devices Using These Popular Codes

Thursday, October 24, 2019 (15:37:45)
We have collected thousands of pattern lock codes for Android using our Burner Breaker technology and we have discovered the top gesture codes used to UNLOCK Android devices.

For example, the most popular pattern lock code is 3 > 2 > 5 > 8 > 7, as displayed in the image.

We are giving away ALL of our findings for multiple types of passcodes!

Get the Codes Now!