±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 32893
New Yesterday: 9 Visitors: 136

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 4

New Security Measures In iOS 11 And Their Forensic Implications

Wednesday, September 13, 2017 (09:51:01)
by Oleg Afonin, Elcomsoft

Apple is about to launch its next-generation iOS in just a few days. Researching developer betas, we discovered that iOS 11 implements a number of new security measures. The purpose of these measures is better protecting the privacy of Apple customers and once again increasing security of device data. While some measures (such as the new S.O.S. sequence) are widely advertised, some other security improvements went unnoticed by the public. Let us have a look at the changes and any forensic implications they have.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1008 reads)

Review Of MacQuisition 2017 From BlackBag Technologies

Tuesday, September 12, 2017 (10:01:45)
Reviewed by David Flynn, Forensic Examiner for the Pitt County Sheriff’s Office, Greenville, North Carolina.

MacQuisition has been the go-to tool for acquisition of Apple computers for quite some time. With the most recent changes in the methods of acquiring data from Apple products, the MacQuisition software is now needed more than ever.

This tool has been time tested and remains at the top of the list for must have tools in the arena of computer forensics.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (799 reads)

BlackBag Technologies Launch Forensic Software Educational Program

Monday, September 11, 2017 (10:52:49)
A partner recently commented to BlackBag Technologies that their digital forensic software ‘performed like a champ.’ The fact this partner, Bay Path University, is educating the next generation of digital forensic investigators, adds even more to the endorsement.

BlackBag Technologies fully appreciates the value Universities and Colleges of Higher and Further Education bring to the forensic community. To support this, BlackBag Technologies proudly announces the launch of their Educational Program, including multiple user licensing and instructor training.

Cellular GPS Evidence: Waze + Cellebrite + CellHawk

Friday, September 08, 2017 (13:55:53)
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting

It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of civil, criminal and investigative matters. Law enforcement agencies use cellular location evidence from service providers to help place a criminal suspect at or near a crime scene in a given time frame. Search and rescue analysts can use cellular call detail records to help locate missing persons as well. And as we’ve detailed in previous articles, this type of evidence can be useful in any number of other matters, from divorce to alimony to fraud investigations and beyond.

So where does all of this evidence come from and how can we best utilize it? It can come from a variety of different places, but the two main areas are the mobile device itself and the records from the cellular provider.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (972 reads)

Webinar: Hyperscale Your Investigation And Intelligence Capabilities

Friday, September 08, 2017 (12:00:17)
How do you future-proof your investigative lab capabilities to handle the expanding complexity and volumes of digital evidence involved in cases today?

During this session you will hear some ideas and concepts to help tackle this ever growing problem and how intelligent, defensible workflows enable investigators to work together at a national level, giving them one view over multiple jurisdictions and multi-terabyte case files.

Learn how to:

• Automatically identify and link key artifacts and intelligence items such as named entities and digitally fingerprinted material across multiple evidence sources and historical cases
• Set up collaborative investigations involving hundreds of investigators, officers and analysts, who can all work together on cases no matter where they are located
• Prioritise and distribute key data to users of differing skill levels to maximise skill sets and resources.

Date: 14 September 2017
Time: 11am BST

Presenter: Paul Slater, Global Head of Investigations, Nuix

Register here
  • Posted by: scar
  • Topic: All
  • Score: 0 / 5
  • (933 reads)

Interview With Thomas Barton, Research Associate, Canterbury Christ Church

Thursday, September 07, 2017 (12:46:16)
Thomas, tell us a bit about yourself - what's your background, what are you studying at the moment, and how did you become interested in digital forensics?

I have always been interested in engineering, electronics, and computing from a young age. By the time I reached sixth form I knew I wanted to go into computing, but still had no direction. I saw a lot of people interested in gaming, coding and networking, but none of it really appealed to me. It was at a careers fair, I heard the words "digital forensics", which caught my attention, and for a project I did an investigation into the extraction of data from used electronics.

That was 4 years ago now, and I recently completed my undergrad BSc Forensic Computing at CCCU with a few publications on top while at university, and have not looked back.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (750 reads)

Blog Series: Using F-Response In Enterprise Investigations

Thursday, September 07, 2017 (11:09:07)
This month, Jamie McQuaid, a Forensics Consultant at Magnet Forensics, looked at how F-Response and Magnet AXIOM can be used together to recover data remotely in enterprise investigations.

In this three-part series, Jamie discusses how to establish a read-only, secure connection to a remote host allowing examiners to acquire or analyze physical disks and volatile data. The series uses Magnet AXIOM as an example of a tools that can be used to recover and examine the data, but as F-Response is tool-agnostic, any tool could conceivably be used.

Oxygen Forensics Adds An Industry Leading Ability To Decode Drone Data

Wednesday, September 06, 2017 (10:32:20)
Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, can now parse and decode drone data from Phantom 3 and Inspire 1 drones manufactured by DJI.

When No Conclusion Can Be A Conclusion

Tuesday, September 05, 2017 (11:18:49)
by James Zjalic

Before CCTV systems were conceived, eye-witness accounts were the only method of identifying a suspect based on their facial features. The pitfalls of this type of identification have been well documented numerous times with regard to the brain’s ability to both forget and modify what a person thinks they witnessed, due to the stress of the situation. It is not surprising therefore that estimations put this method of identification as the greatest factor in wrongful conviction proven by DNA testing.

Facial Comparison, also known as facial mapping, is a field that has seen increased prevalence over the last 20 years due to the proliferation of CCTV cameras in our towns and cities. It has the advantage of not being compromised by stress and the possibility of limiting biases as far as possible. The basic premise is to compare the face of a suspect from a CCTV recording with the face of an individual from a high-quality reference photo (such as a mugshot), to determine the possibility of them being the same person.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (843 reads)

Webinar: The Forensic Kill Chain

Monday, September 04, 2017 (10:57:35)
The Forensic Kill Chain: Often a military concept for the necessary elements for a successful victory in combat, but also used in the computer security model of cyber-attacks. The term can be used for both offensive and defensive missions, but what about in forensics: particularly mobile device forensics? Overlaying a mobile device forensic examination into the "kill chain" can prove to be a blueprint and guide in an area that does not have a set of strict procedures. In this session you will gain information while working a theoretical concept into a real case in an effort to build a forensic kill chain.

Date: Thursday September 7th 2017
Time: 4:00pm BST / 11:00am EST

Presenter: Lee Reiber, COO, Oxygen Forensics

Register here
  • Posted by: scar
  • Topic: All
  • Score: 0 / 5
  • (1418 reads)