±Forensic Focus Partners

±Your Account


Forgotten password/username?

New Today: 4
New Yesterday: 9
Overall: 28081
Visitors: 53

±Forensic Focus Partner Links

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 3

Forensics and Bitcoin

Friday, January 30, 2015 (13:36:49)
This article does not attempt to provide a beginners guide to Bitcoin, nor an in-depth thesis on Bitcoin forensics. Rather, it will be an overview of the potential opportunities available to digital forensics and traditional investigators to obtain evidence in relation to attributing transactions or holdings to a specific person and (legally) seizing those funds.

I will discuss academic work that has been undertaken in this area, what precautions a security aware user may take and the issues introduced by them doing so. I will also discuss an open-source Python tool called BTCscan, which has been created to accompany this article and will carve out bitcoin addresses, private keys and other Bitcoin artifacts.

This article may be of interest to persons conducting investigations for criminal, civil, personal or business reasons. Some elements may be of limited relevance to agencies without powers of seizure and/or subpoena...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1048 reads)

Estonia President wants China and Russia to help fight cyber-crime

Wednesday, January 28, 2015 (09:47:41)
Speaking on the ‘Fighting Shadows' panel at the Davos convention in Switzerland on Saturday,Toomas Hendrik Ilves joined senior figures from Kaspersky, Microsoft and the United Nations in calling for improved cyber-crime policing, laws and collaboration – whilst also calling into question how – and if - countries can respond to cyber-attacks.

Estonian websites were famously hit by distributed-denial-of-service (DDoS) attacks in 2007, which at the time was rumoured to be work of the Russian government. Subsequently, the country became one of the world's most advanced countries on cyber-security, even establishing the NATO Cooperative Cyber Defence of Excellence in Tallinn in August 2010. Ilves – who said that the country also helped with similar DDoS attacks against Georgian websites a year later – admitted that DDoS and nation-state attacks are very different things, but said that defending against cyber-criminals is almost impossible considering outdated laws...

Read More (SC Magazine)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1132 reads)

Dealing With Records Found in SQLite Rollback Journals

Tuesday, January 27, 2015 (11:16:35)
Sanderson Forensics was recently contacted by a customer at a police force with a question relating to deleted SQLite records that were found in a rollback journal. The requirement was to create a report(s) showing both the live records in the Kik database as well as the deleted records that were found by a filename search in the rollback journal.

The article at the link below goes into a little detail of how the rollback journal works, some thoughts on recovering data from it and then details how the data was recovered from the rollback journal and then how we distinguished and created a report showing the deleted records in the journal vs the live records that were also present in the journal...

Read More (Sanderson Forensics)

Secure View 4 Almost Here - Free Upgrade To All Current Users And New Customers

Monday, January 26, 2015 (16:26:57)
Susteen Inc. has announced that Secure View 4 will be a free upgrade to ALL active Secure View users.

This will include all new customers up until the time Secure View 4 is launched. The current price for Secure View 3 stands at $2495. Although no current price for Secure View 4 has been listed, it is expected to start at $2995. This means that a new customer can still purchase Secure View at the current cost and get a free upgrade when Secure View 4 launches in late February 2015.

Secure View 4 will include industry first ACCE (Advanced Cross Case Examination) analytics allowing users to probe old cases with new data. SV4 will also include new deleted data features, an all new interface and a redesigned analytics engine. For a trial version of Secure View 3, contact: jkirby@susteen.com

Free Webcasts Available to Become Certified as a Digital Forensics Expert

Monday, January 26, 2015 (13:44:22)
(ISC)2® offers the Certified Cyber Forensics Professional (CCFP), the only global cyber forensics credential that provides a comprehensive validation of a candidate’s knowledge and skills as a digital forensics expert. Free CCFP Webcasts are now available that provide insight into what candidates need to know before taking this exam. It includes a detailed overview of each domain, the value of certification, and how to study for the exam

First introduced in 2013, CCFP provides the industry’s first global standard for assessing experienced digital forensics professionals’ mastery and professionalism. The credential provides digital forensics employers and the legal community with validation that a digital forensics professional can lead digital investigations that assure complete, accurate, and reliable results.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2047 reads)

Magnet Forensics presents: IEF User Summit @ Techno Security

Monday, January 26, 2015 (10:42:14)
Registration Opening Soon!

Join us for Magnet Forensics’ first-ever IEF User Summit at the 2015 Techno Security & Forensics Investigations Conference. Internet Evidence Finder users, and digital forensics professionals considering adding IEF to their toolkit, will learn how to use the software to its full potential to overcome key challenges in computer and mobile forensics. The program will include a mix of lectures and lab sessions led by Jad Saliba and Magnet Forensics’ team of digital forensics experts. If you’re attending Techno Security, extend your stay and join us for this no-cost event!

Wednesday, June 3 to Thursday, June 4 (immediately following Techno Security)

Myrtle Beach Marriott Resort & Spa at Grande Dunes
8400 Costa Verde Drive
Myrtle Beach, SC 29572

Read More (Magnet Forensics)

Webinar (recording): Investigating Sexual Crimes in the Tinder Age

Thursday, January 22, 2015 (15:24:00)
A recording of last month's webinar "Investigating Sexual Crimes in the Tinder Age" is now available online here.


The usage of location-based mobile dating applications like Tinder and Grindr has exploded over the last year. This new class of mobile app allows singles to identify, chat with, and meet other singles located in their immediate vicinity. As the popularity of these apps continues to grow, they will become increasingly important sources of evidence for digital forensics examiners.

Join Jad Saliba and Jamie McQuaid from Magnet Forensics as they explore what you need to know about finding and analyzing evidence from this new class of mobile dating application using a real-world case scenario...

View Webinar
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1577 reads)

Introducing HddSurgery - Tools for Data Recovery Specialists

Wednesday, January 21, 2015 (15:26:33)
HddSurgery is an innovative young technology company devoted to building professional hard disk data recovery tools. The company was founded in 2009 in Belgrade, Serbia by experienced data recovery experts from Helpdisc Data recovery company.

HddSurgery cover all steps in physical data recovery operation and provide best equipment that will help data recovery and computer forensics companies to improve their clean room techniques and data recovery processes.

Top 6 Reasons to Use EnCase and IEF Together

Monday, January 19, 2015 (15:50:32)
As a forensic examiner, you rely on a variety of tools to conduct your investigations. The types and needs of every case vary, often making it necessary to use more than one tool to find what you’re looking for. Depending on the scenario, investigators need to use the tools that will enable them to work through cases thoroughly and efficiently.

EnCase and IEF are both excellent tools to have in your toolkit. One of the major challenges faced by forensic investigators is knowing where to begin an investigation. Using EnCase and IEF together allows you to maximize the benefits of both tools: the versatility of EnCase and the simplicity, speed and comprehensiveness of IEF.

Take a look at the top 6 reasons to use EnCase and IEF together to get the best results for your investigations...

Read More (Magnet Forensics)

Job Vacancy: Experienced Mobile Phone Forensic Analyst - Tamworth, UK

Monday, January 19, 2015 (10:40:42)
Disklabs are looking to expand their Mobile Phone Forensics Team with the addition of an experienced Mobile Phone Forensics Analyst based in Tamworth, Staffordshire, UK.

The successful candidate will benefit from a package that includes a VERY Competitive Salary, Private Healthcare, 1 additional day holiday per year served, (up to 5 days), 36.5hr working week. The successful candidate will have opportunities to progress in a company that is expanding and be provided with relevant ongoing training. This position is available immediately...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1726 reads)