±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 34077
New Yesterday: 0 Visitors: 96

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Latest Forum Posts

 Topics   Replies   Author   Views   Last Post 
  S7 Edge secure startup 12 pcook8198 1108   Fri Jun 22, 2018 7:42 am 
  Whatsapp ChatSearchV3 sqlite database 7 chillichicken 572   Fri Jun 22, 2018 5:47 am 
  Password-Protected Windows 10 14 mhibert 2525   Fri Jun 22, 2018 1:03 am 
  Encrypted Mac image missing Recovery HDD and Un-mountable 4 one234 362   Fri Jun 22, 2018 1:03 am 
  OSX Recovery of Deleted User / Time Machine Backup 5 cs1337 549   Thu Jun 21, 2018 12:50 pm 

Digital Forensics News June 2018

Thursday, June 21, 2018 (13:35:02)
The Forensic 4:Cast Awards results have been released, with Forensic Focus winning Blog of the Year and Resource of the Year. Thank you to everyone who voted!

Magnet Forensics have released a new ebook looking at how to run child exploitation investigations.

Registration is open for the next Techno Security & Forensic Investigation conference, which is taking place in September in San Antonio, TX. Forensic Focus members can get a 30% discount on the registration fee by quoting FFOCUSTX18 at the checkout.

Cellebrite have released UFED Physical Analyzer 7.6.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (369 reads)

Electromagnetic Side-Channel A‚ttacks: Potential For Progressing Hindered Digita

Thursday, June 21, 2018 (10:45:36)
by Asanka Sayakkara, Nhien-An Le-Khac & Mark Scanlon

Digital forensics is a fast-growing €field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are o‰ften hampered by the data contained on these devices being encrypted. Furthermore, the increasing use of IoT devices with limited standardisation makes it difficult to analyse them with traditional techniques. ŒThis paper argues that electromagnetic side-channel analysis has signi€ficant potential to progress investigations obstructed by data encryption. Several potential avenues towards this goal are discussed.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (266 reads)

Forensic Focus Forum Round-Up

Wednesday, June 20, 2018 (17:34:05)
Welcome to this month’s round-up of recent posts to the Forensic Focus forums.

Tootypeg has created a flow chart for digital forensic investigators to use when making decisions about their cases - add your thoughts on the forum.

What are the appropriate terms to use when discussing child abuse material?

Can you help cs1337 to recover data from an OSX running High Sierra?

What tools would you recommend to extract data from an Amazon Fire Stick?

Forum members give their impressions of UK MPs' discussion about disclosing digital evidence.

How do you register seized evidence? Share your thoughts on the forum.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (463 reads)

Deep Learning At The Shallow End: Malware Classification For Non-Domain Experts

Wednesday, June 20, 2018 (13:31:52)
by Quan Le, Oisín Boydell, Brian Mac Namee & Mark Scanlon

Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification. Moreover, these signatures are often limited to local, contiguous sequences within the data whilst ignoring their context in relation to each other and throughout the malware file as a whole. We present a Deep Learning based malware classification approach that requires no expert domain knowledge and is based on a purely data driven approach for complex pattern and feature identification.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (395 reads)

Job Opening: Business Development Representative- Mobile Forensics

Wednesday, June 20, 2018 (10:19:08)
Susteen has multiple openings for Business Development Representatives throughout the United States. With the launch of our new Field Acquisition Device and current demand, we have immediate sales openings for representatives with law enforcement/DOD/Forensic backgrounds.

Evaluating Automated Facial Age Estimation Techniques For Digital Forensics

Tuesday, June 19, 2018 (10:34:39)
by Felix Anda, David Lillis, Nhien-An Le-Khac & Mark Scanlon

In today’s world, closed circuit television, cellphone photographs and videos, open-source intelligence (i.e., social media/web data mining), and other sources of photographic evidence are commonly used by police forces to identify suspects and victims of both online and offline crimes. Human characteristics, such as age, height, weight, gender, hair color, etc., are often used by police officers and witnesses in their description of unidentified suspects. In certain circumstances, the age of the victim can result in the determination of the crime’s categorization, e.g., child abuse investigations. Various automated machine learning-based techniques have been implemented for the analysis of digital images to detect soft biometric traits, such as age and gender, and thus aid detectives and investigators in progressing their cases. This paper documents an evaluation of existing cognitive age prediction services.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (384 reads)

Review Of SQLite Forensics By Paul Sanderson

Monday, June 18, 2018 (10:12:48)
Reviewed by Scar de Courcier, Forensic Focus

SQLite forensics is an important part of many digital forensic investigations. Most smartphones and computer operating systems use SQLite, with each device often including hundreds of databases. Despite this extreme proliferation, SQLite forensics is often overlooked in conversations about current trends in digital forensics. Paul Sanderson's book attempts to redress the balance and bring attention to the importance of SQLite forensics.

The book opens with an introduction to SQLite forensics: what it covers, and how SQLite differs from most other databases. Astonishingly, there are over one trillion SQLite databases in circulation, a fact that the reader is introduced to on the first page - which definitely sets the scene for this being an important book!

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (664 reads)

Techno Security Myrtle Beach 2018 – Recap

Sunday, June 17, 2018 (13:34:13)
by Scar de Courcier

This article is a recap of some of the main highlights from the Techno Security & Forensic Investigation Conference 2018, which took place in Myrtle Beach, SC from the 3rd-6th June 2018.

Under the sunny skies of South Carolina, the digital forensic community got together at the beginning of June this year to discuss topics ranging from international espionage to the admissibility of evidence obtained from the cloud. The conference was split into several streams: audit / risk management; forensics; information security; and investigations. There were also labs run by Cellebrite and Magnet Forensics, and various sponsor demos throughout the conference. The exhibition hall was open at various points throughout the day, allowing attendees to meet representatives from universities, forensics companies and law enforcement agencies and discuss current industry trends.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (523 reads)

Magnet Forensics And Child Rescue Coalition Integrate Technology

Friday, June 15, 2018 (09:44:07)
As Magnet Forensics exhibit this week at the National ICAC Conference in Atlanta, Georgia, we’re extremely honored to unveil a new technology integration. Magnet AXIOM will soon be able to ingest data from Child Rescue Coalition (CRC)’s Child Protection System (CPS), a comprehensive system that compiles and curates millions of online child predator records.

Read the complete press release here.

Learn more about the CPS-AXIOM integration here.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (809 reads)

Immediately Acquire Evidence In The Field From Any Cell Phone - Join Webinar

Monday, June 11, 2018 (11:12:00)
Susteen's new Field Acquisition Device is designed to immediately pull evidence data from mobile devices in the field. Cutting-edge new methods of acquiring evidence, allow for the acquisition of encrypted apps, texts, images and more, in less than 5 minutes.

Susteen will be hosting a free live webinar presentation on their new Field Acquisition Device, this Wednesday, June 13th at 11:00 am pacific and Tuesday, June 19th at 1:00 pm pacific.