±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36312
New Yesterday: 7 Visitors: 159

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Digital Forensics, Computer Forensics, eDiscovery

Magnet Forensics And Child Rescue Coalition Partner On Magnet OUTRIDER

Thursday, December 12, 2019 (17:27:40)
Technology partnership brings cutting edge technology to CSAM-related investigations — helping law enforcement as they rescue victims and bring criminals to justice.

Magnet Forensics, a global leader in the development of digital investigation software and Child Rescue Coalition (CRC), a nonprofit organization dedicated to combating the sexual exploitation of children, today announced that they have partnered to bring Magnet OUTRIDER to CSAM investigators who can benefit from quick triaging on-scene.

Recently released by Magnet Forensics, Magnet OUTRIDER is a preview tool used to quickly scan smartphones and computers to determine if illicit material is present — often identifying it in five minutes or less. From there, a risk profile of the target user can be quickly developed. OUTRIDER reduces demand on digital forensic units by limiting the number of seized devices and prioritizing those that require urgent full forensic analysis — decreasing the timeframe between arrest and charge.

Walkthrough: VFC From MD5

Thursday, December 12, 2019 (15:37:56)
VFC was first launched to the forensic community in 2007. It makes it easy to create a virtual machine (VM) replica of a target system, enabling an investigator to recreate and interact with the “digital crime scene”.

Using accepted forensic practices, VFC interrogates the target drive to gather relevant system information, so that it can very quickly build the VMware framework to create a forensically sound replica of the target system (the exhibit) as a Virtual Machine (VM). This process is automated by the VFC software to avoid BSOD and driver errors, saving the user hours of manual diagnosis and repair.

VFC allows virtualisation of Windows, Linux, Solaris & other OS platforms.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (246 reads)

Solving The Mystery Behind Imaging A Mac Computer

Thursday, December 12, 2019 (15:05:28)

Join BlackBag experts for an upcoming webinar on imaging a Mac computer installed with APFS and/or a T2 secured Mac computer.

Case Study: Using Susteen's Data Pilot 10 In Law Enforcement Investigations

Wednesday, December 11, 2019 (15:38:58)
Detectives from Lima PD discuss their experiences with the Data Pilot 10.

"Having been a detective for fourteen years, I immediately thought of interacting with witnesses and victims, and their apprehension to turn over their phones for days on end, and the expediency of being able to extract just the limited amount of data we need, that's been pertinent to a case."

"Data Pilot has been able to speed up our process. I have had a victim that would have been in an interview room: a lot of times I would know beforehand if we were going to need that information off of their phone, so I was asking for consent. They'd be more willing to give that phone to us knowing that it's not going to take us long to extract that information. And then usually I'll go and conduct the interview, and then at the conclusion, or shortly after, it would be completed and we could give that phone to them."
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (628 reads)

Magnet AXIOM 3.8 Brings AirDrop Artifacts, Checkra1n Acquisition Updates & More

Wednesday, December 11, 2019 (14:14:50)
Magnet AXIOM 3.8 is now available with new mobile artifact and acquisition enhancements — including AirDrop and full logical acquisition of iOS devices jailbroken using checkra1n, new Slack updates and much more!

If you haven’t tried AXIOM yet, request a free 30-day trial here.

Considerations When Investigating Data From Password Managers

Tuesday, December 10, 2019 (13:21:38)
by Dr Tristan Jenkinson

In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We now discuss some of the potential issues that can arise in such investigations and some areas where early consideration may help ease or avoid these issues.

In the UK, if you access a computer without the authority to do so, this would likely constitute a breach of the Computer Misuse Act. This means that if credentials such as an email address and password are identified, while it would be possible to use those credentials to collect the relevant data, it still may not be possible to do so legally without additional steps seeking the relevant authorisation.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (572 reads)

Interview With Eric Oldenburg, Law Enforcement Liaison, Griffeye

Tuesday, December 10, 2019 (13:07:34)
Eric, when we interviewed you last year, you'd just come on board with Griffeye as Technical Liaison to law enforcement. What has the past year in this role taught you, and based on these lessons, where are you taking your role in the coming year?

If this last year has taught me anything, it is that everyone who works CSAM related investigations are the same, all over the world. These are all dedicated, passionate people who want to help, who are eager to help save children and willing to do so at the potential expense of their own mental health. Everywhere in the world, there are huge backlogs and cases that sit for too long due to short staffing, low budgets and inferior tools. It has also taught me that there are large numbers of investigators in this field that are still using tools that just aren’t designed for this type of work. I feel so happy to show them Griffeye Analyze DI, because I know it will do for them what it did for me, keep them in this fight longer and protect their mental health.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (478 reads)

What's Happening In Forensics - Dec 9, 2019

Monday, December 09, 2019 (19:26:26)
The inaugural Digital Forensics for National Security Symposium will take place tomorrow and Wednesday in Alexandria, VA.

Pro Digital Forensic Consulting share how digital forensics can help in sexual assault cases.

Keren Carmeli from Cellebrite shows how to gather data from iOS and Android apps with SQLite Wizard.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (581 reads)

How To Use Quin-C’s Simple Review Widget

Monday, December 09, 2019 (15:42:04)
Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review.

Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches or keyword searches; perform tagging, bookmarking, viewing, labelling and exporting data. So if you are one of those users, Simple Review is going to be very helpful to you, and you can use it in your everyday job, to make the work more efficient for you.

So we will take a look at first of all how the Simple Review has been designed to run. Simple Review has been designed to run in a full-screen mode. So that means, if you are a user who has been assigned the Simple Review widget, you will not see anything else, but just the Simple Review and its interface.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (536 reads)

How To Help Small Governments To Respond To Ransomware Attacks

Monday, December 09, 2019 (14:53:33)
by Christa Miller

Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular affected 23 Texas communities in July, and a new interactive map from StateScoop shows all attacks since 2013, updating with new ones as they occur.

In fact, Recorded Future’s Allan Liska reported in May that “State and local governments were among the first organizations to be hit with ransomware.” His research confirmed that ransomware attacks are on the rise, affecting 48 states and the District of Columbia. CBS News’ Irina Ivanova reported that of the 70 reported ransomware attacks in the first half of 2019, more than 50 targeted cities.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (472 reads)