The Certified Cyber Forensics Professional (CCFP) from (ISC) 2 assures that certification holders have the necessary breadth and depth of knowledge and thinking skills needed to address today’s cyber forensic challenges. CCFP indicates expertise in the forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law. It also indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response.
±Forensic Focus Partners
New Today: 0
New Yesterday: 6
±Follow Forensic Focus
· Acquiring Windows PCs
· Evidence Acquisition and Analysis from iCloud
· TSFIC 2015 – Myrtle Beach 31st May – 3rd June
· Forensics Europe Expo 2015 – Recap
· Capturing RAM Dumps and Imaging eMMC Storage on Windows Tablets
· TDFCon 2015 – Middlesbrough 15th May
· Electronic Voiceprints: The Crime Solving Power of Biometric Forensics
· DFRWS Europe 2015 Annual Conference – Recap
· DFRWS EU 2015 – Dublin 23rd – 26th March
Digital Forensics, Computer Forensics, eDiscoveryBack to top Back to main Skip to menu
The theme for this year’s programme was ‘The Future of Digital Forensics’, and the topics discussed certainly fulfilled the brief, looking at how current trends in computer crime are informing digital forensics and vice versa, as well as how digital forensics education is changing and shaping the development of future forensic examiners.
The day began with a discussion of SCADA security in the UK and whether it is sufficient to protect against network security breaches. Jack McIntyre spoke about how SCADA is unprotected at the device level, and uses web applications which are often vulnerable to attacks such as authentication bypass or SQL injection.
In our previous article, we talked about acquiring tablets running Windows 8 and 8.1. In this publication, we will talk about the acquisition of Windows computers – desktops and laptops. This class of devices has their own share of surprises when it comes to acquisition.
The obvious path of acquiring a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence”. Sound familiar? Well, in today’s connected world things do not work quite like that.
In this article, we will have a look at measures the investigator has to take before taking the disk out, and even before pulling the plug, review Windows security measures and how they can work in combination with the computer’s hardware.
The main focus of our research is on identifying the key elements of resilience and robustness in digital forensics frameworks. In this paper, we aimed to identify the elements that allow an organization with digital forensic capabilities to adapt to change in a controlled and managed way; one of the main questions was how organisations can sustain their digital forensics capabilities and stay agile within controlled boundaries when dealing with new technological advances, new modi operandi, staff turnover, etc., while at the same time minimizing the risk of non-conformity i.e. ensuring that the basic principles of police work are maintained while adapting to a changing environment.
Date: Tuesday May 26, 2015
Time: 7am PT/10am ET/2pm GMT/3pm BST
Presenter: Tatiana Pankova, Marketing Manager, Oxygen Forensics
Learn how to uncover a suspect or victim's activities with timeline, communication and location data. Discover how investigators can track user locations, build and map their historic routes, and clearly see all activities performed by the user at each location. Learn how to discover social connections between the users of multiple mobile devices and produce charts and tables revealing the user's closest circle at a glance. Find out what information mobile devices can hide about the device owner and what data can be uncovered which might otherwise be overlooked.
Register now at: https://attendee.gotowebinar.com/register/6044973458626959618
"As technology changes and the way people use that technology changes, legislatures must address whether amendments are necessary to address the technological changes," he said.
Presently, as it relates to harassment or abuse of an individual, many of the remedies available to a victim are civil in nature.
"There are, however, some limited contexts in which actions taken or statements made in social media may constitute a criminal offense under the laws of the State of West Virginia," Wharton said.
The West Virginia Computer Crime and Abuse Act makes it unlawful for a person to use a computer, mobile phone, personal digital assistant or other electronic communication device to threaten to commit a crime against any person or property.
Read More (News And Sentinel)
Improving investigators’ ability to make decisions about their cases, including whether they need to escalate mobile evidence to a forensic lab at all, is the focus for many organizations in both law enforcement and the private sector. This focus reflects a need for in-field mobile device forensic solutions that span field locations: both stationary kiosks at satellite offices or stations, and mobile data extraction devices.
Cellebrite is pleased to announce the launch of its new UFED InField Kiosk, a key component to the UFED Field Series. Leveraging the trusted UFED Platform, the UFED InField Kiosk extends basic logical extraction and analysis capabilities to first responders and detectives, allowing users to quickly view, qualify and act on potential evidence - all while ensuring strict access control and data management.
Designed specifically with field personnel in mind, the UFED InField Kiosk features an intuitive interface which makes extracting and analyzing live device data simple. Whether located at a police station, border check point or airport, this fully networked solution delivers the actionable intelligence necessary to focus forensic examinations, reduce device backlogs and shorten case cycle times.