±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36312
New Yesterday: 7 Visitors: 127

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Latest Forum Posts

 Topics   Replies   Author   Views   Last Post 
  Android imaging 0 afsfr 60   Thu Dec 12, 2019 5:34 am 
  Decrypting an APFS Image 4 4Rensics 383   Wed Dec 11, 2019 5:34 pm 
  imaging using encase, FTK and X-ways 1 afsfr 342   Wed Dec 11, 2019 3:00 pm 
  commercial linux distribution to do forensic investigation 1 afsfr 286   Wed Dec 11, 2019 11:32 am 
  NSF Converter 9 blueDragon 5258   Wed Dec 11, 2019 7:41 am 

Case Study: Using Susteen's Data Pilot 10 In Law Enforcement Investigations

Wednesday, December 11, 2019 (15:38:58)
Detectives from Lima PD discuss their experiences with the Data Pilot 10.

"Having been a detective for fourteen years, I immediately thought of interacting with witnesses and victims, and their apprehension to turn over their phones for days on end, and the expediency of being able to extract just the limited amount of data we need, that's been pertinent to a case."

"Data Pilot has been able to speed up our process. I have had a victim that would have been in an interview room: a lot of times I would know beforehand if we were going to need that information off of their phone, so I was asking for consent. They'd be more willing to give that phone to us knowing that it's not going to take us long to extract that information. And then usually I'll go and conduct the interview, and then at the conclusion, or shortly after, it would be completed and we could give that phone to them."
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (454 reads)

Magnet AXIOM 3.8 Brings AirDrop Artifacts, Checkra1n Acquisition Updates & More

Wednesday, December 11, 2019 (14:14:50)
Magnet AXIOM 3.8 is now available with new mobile artifact and acquisition enhancements — including AirDrop and full logical acquisition of iOS devices jailbroken using checkra1n, new Slack updates and much more!

If you haven’t tried AXIOM yet, request a free 30-day trial here.

Considerations When Investigating Data From Password Managers

Tuesday, December 10, 2019 (13:21:38)
by Dr Tristan Jenkinson

In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We now discuss some of the potential issues that can arise in such investigations and some areas where early consideration may help ease or avoid these issues.

In the UK, if you access a computer without the authority to do so, this would likely constitute a breach of the Computer Misuse Act. This means that if credentials such as an email address and password are identified, while it would be possible to use those credentials to collect the relevant data, it still may not be possible to do so legally without additional steps seeking the relevant authorisation.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (532 reads)

Interview With Eric Oldenburg, Law Enforcement Liaison, Griffeye

Tuesday, December 10, 2019 (13:07:34)
Eric, when we interviewed you last year, you'd just come on board with Griffeye as Technical Liaison to law enforcement. What has the past year in this role taught you, and based on these lessons, where are you taking your role in the coming year?

If this last year has taught me anything, it is that everyone who works CSAM related investigations are the same, all over the world. These are all dedicated, passionate people who want to help, who are eager to help save children and willing to do so at the potential expense of their own mental health. Everywhere in the world, there are huge backlogs and cases that sit for too long due to short staffing, low budgets and inferior tools. It has also taught me that there are large numbers of investigators in this field that are still using tools that just aren’t designed for this type of work. I feel so happy to show them Griffeye Analyze DI, because I know it will do for them what it did for me, keep them in this fight longer and protect their mental health.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (446 reads)

What's Happening In Forensics - Dec 9, 2019

Monday, December 09, 2019 (19:26:26)
The inaugural Digital Forensics for National Security Symposium will take place tomorrow and Wednesday in Alexandria, VA.

Pro Digital Forensic Consulting share how digital forensics can help in sexual assault cases.

Keren Carmeli from Cellebrite shows how to gather data from iOS and Android apps with SQLite Wizard.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (537 reads)

How To Use Quin-C’s Simple Review Widget

Monday, December 09, 2019 (15:42:04)
Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review.

Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches or keyword searches; perform tagging, bookmarking, viewing, labelling and exporting data. So if you are one of those users, Simple Review is going to be very helpful to you, and you can use it in your everyday job, to make the work more efficient for you.

So we will take a look at first of all how the Simple Review has been designed to run. Simple Review has been designed to run in a full-screen mode. So that means, if you are a user who has been assigned the Simple Review widget, you will not see anything else, but just the Simple Review and its interface.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (507 reads)

How To Help Small Governments To Respond To Ransomware Attacks

Monday, December 09, 2019 (14:53:33)
by Christa Miller

Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular affected 23 Texas communities in July, and a new interactive map from StateScoop shows all attacks since 2013, updating with new ones as they occur.

In fact, Recorded Future’s Allan Liska reported in May that “State and local governments were among the first organizations to be hit with ransomware.” His research confirmed that ransomware attacks are on the rise, affecting 48 states and the District of Columbia. CBS News’ Irina Ivanova reported that of the 70 reported ransomware attacks in the first half of 2019, more than 50 targeted cities.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (451 reads)

Oxygen Forensics Now Offers Image Categorization And TamTam Cloud Extraction

Monday, December 09, 2019 (13:54:11)
Oxygen Forensics, a global leader in digital forensics for law enforcement, federal, and corporate clients, today announced their flagship software, Oxygen Forensic Detective 12.1 will bring image categorization and grouping, allowing investigators to use AI to sort and categorize images into twelve categories, including drugs, weapons, alcohol, and nudity, to more quickly find pertinent images to an investigation. The latest update also includes TamTam Messenger extraction capabilities, following the breaking news that as of early December 2019, it is suspected TamTam is the new, preferred communication service for ISIS supporters. Now Oxygen Forensic Detective 12.1 will allow investigators to extract chats, calls, contacts, and other information from the TamTam cloud.

How To Easily And Accurately Play CCTV With Amped Replay

Friday, December 06, 2019 (18:53:45)
by Blake Sawyer, Amped Software

For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most of their time managing the many players from each DVR manufacturer. In my old casework, I would handle close to 80-90 video requests a month, most of the time coming from proprietary CCTV video. One tool that helped me as a full-time video examiner was Amped FIVE. Through daily use, we were able to get images and video clarified and out to the officers and media, as well as keep our backlog at a minimum.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (774 reads)

Analysis Of Jump Lists With Belkasoft Evidence Center

Friday, December 06, 2019 (13:26:10)
Jump Lists are an artifact of the Windows OS. It first emerged in Windows 7: this artifact has been present in all the subsequent versions of the Windows OS ever since.