±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 3
Overall: 26796
Visitors: 52

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

The Complete Workflow of Forensic Image and Video Analysis

Tuesday, July 29, 2014 (11:00:10)
In this article we’ll describe the complete workflow for image and video forensics. In fact, just like computer forensics in not only dumb copying and looking at files, forensic video analysis is broad and complex and there are many steps that are commonly missed and rarely taken into account. It can be quite overwhelming if we think of all the tasks related to analysis.

As a forensic video analyst, it is important to be aware of all the possible steps needed for a really complete analysis. This way, you can stay organized and minimize the possibility of skipping or missing steps. Also, if you do have to go to court, you have an outline that serves as the basis of your presentation.

It is important to remember that the job of a forensic video analyst does not start and end with viewing and enhancing a video...

Read More

Investigating the Dark Web

Monday, July 28, 2014 (15:58:38)
The recent rise in the number of people who suspect they may be being tracked on the internet, whether by government agencies, advertisers or nefarious groups, has led to increased interest in anonymising services such as TOR.

TOR, or The Onion Router, conceals a user’s identity and network activity from others who wish to uncover information about them. It has been used by journalists and individuals working under strict regimes, and by whistleblowers and others who need to be able to disseminate information both safely and anonymously.

Of course, TOR also has its applications in the criminal world, and it is perhaps for this that it is most well known. Silk Road, one of its largest sites, found itself under press scrutiny when the FBI shut it down in October 2013...

Read More

Cloud Computing Stymies Digital Forensics Investigations

Monday, July 28, 2014 (10:28:29)
In recent years, cloud computing has made the leap from an emerging technology to government mainstay, allowing agencies an IT avenue to share services, save money and increase efficiency.

However, cloud computing still presents some major technical challenges in government, as illustrated by a recent draft report issued by the National Institute of Standards and Technology.

Prepared by the NIST Cloud Computing Forensic Science Working Group, the report summarizes a staggering 65 challenges cloud computing presents to forensics investigators who sift through bits and bytes of digital evidence to solve crimes...

Read More (Nextgov)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (836 reads)

Interview with Oleg Fedorov, CEO and Founder, Oxygen Software

Thursday, July 24, 2014 (10:48:17)
Oleg, please tell us about your role at Oxygen Software and why you decided to set up the company in 2000.

I started out as a developer, but in 1999 I decided that I needed a new challenge since I wanted to grow as a professional. I was advised to look into the market of Shareware and so I quit all my jobs and started Oxygen Software. Soon after, my friend Oleg Davydov joined me and we began to try different software markets.

That was the time of the “Matrix” cult movie. Do you remember the phones used by the actors? They were custom ones, but very similar to the Nokia 7110. It was a revolutionary device, the first phone that was able to store several phone fields for every contact and had advanced calendar features. We at Oxygen were lucky that we released Oxygen Phone Manager for Nokia 7110 before Nokia included its support into their official PC Suite. This product gave us a great start...

Read More

Forensic Focus Forum Round-Up

Friday, July 18, 2014 (15:10:05)
Welcome to this round-up of recent posts to the Forensic Focus forums.

Forum members discuss the best way to retrieve Facebook profile data.

What does it mean when a mail header shows two X-Originating IP addresses?

Forensic imaging of a USB with a corrupt file system.

Forum members discuss how to find an XLS file on a computer that has been reformatted.

Unexpected SQLite field data in WhatsApp databases provokes discussion on the forum.

Forum members discuss how to process several thousand images on a hard drive.

Do you have any recommendations for mobile forensic tools? Add yours in the forum.

What is the most effective way to extract data from a Nokia Lumia 520?