±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 7 Overall: 29249
New Yesterday: 2 Visitors: 144

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

Subscribe to news

Subscribe to forums

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Magnet Forensics welcomes new Vice President and General Manager

Wednesday, September 16, 2015 (10:50:54)
Magnet Forensics is pleased to announce Neil Condon as the new Vice President and General Manager, Magnet Forensics USA.

“I’m thrilled to have Neil on the executive team to help us accomplish our mission of impacting people’s lives by uncovering the truth and empowering others to make a difference”, said Adam Belsher, CEO at Magnet Forensics. “Neil is passionate about serving the law enforcement community by bringing them innovative digital forensics solutions to help them combat both traditional and cybercrimes that impact society.”

Neil has over 25 years of experience in information technology. For the past 10 years, he has worked for digital forensics companies in federal government-facing roles. In his most recent position at Nuix, Neil was responsible for designing and implementing the US public sector strategy. His experience also includes similar roles at AccessData and Guidance Software...

Read More (Magnet Forensics)

Countering Anti-Forensic Efforts – Part 2

Tuesday, September 15, 2015 (08:58:24)
In the first part of this paper we talked about the most common – and also some of the simplest – ways suspects can try to cover their tracks in an attempt to slow down the investigation. This part of the article is dedicated to some of the more advanced techniques that sometimes can really be challenging to deal with. Let’s take a look at some of the possible workarounds when the data we are looking for was deleted or encrypted.

Attempting to securely wipe or otherwise destroy evidence stored on hard drives and other media can be the planned last resort. If done properly, secure erase will irreversibly destroy evidence without giving investigators the slightest chance of recovery. However, computer users with average literacy can make mistakes that will result in incomplete destruction. Let’s have a look at what the suspect can do to erase the hard drive.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1936 reads)

FBI Director Claims Tor and the “Dark Web” Won’t Let Criminals Hide From Agents

Monday, September 14, 2015 (07:47:40)
FBI Director James Comey said on Thursday that criminals who think they can evade law enforcement using the “dark web” and the Tor Network, which is designed to conceal the Internet addresses of the computers being used, are “kidding themselves.”

Comey was asked about criminal use of the so-called dark web — parts of the Internet walled off from ready access — at a House Intelligence Committee hearing on cybersecurity on Thursday. His answer referenced Tor, which was originally known as “the onion router.”

Read More (The Intercept)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2942 reads)

DoJ Says It Can Demand Every Email From Any US-Based Provider

Thursday, September 10, 2015 (13:13:18)
The United States government has the right to demand the emails of anyone in the world from any email provider headquartered within US borders, Department of Justice (DoJ) lawyers told a federal appeals court on Wednesday.

The case being heard in the second circuit court of appeals is between the US and Microsoft and concerns a search warrant that the government argues should compel Microsoft to retrieve emails held on a Hotmail server in Ireland.

Read More (Guardian)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (3337 reads)

Webinar: EnCase & Python – Extending Your Investigative Capabilities

Tuesday, September 08, 2015 (11:41:44)
Date: Wednesday September 9th, 2015
Time: 11:00am PDT / 2:00pm EDT / 7:00pm BST


Presenters: Chet Hosmer, Founder of Python Forensics, Inc. and author of Python Forensics; James Habben, Master Instructor, Guidance Software Training; Robert Bond, Product Marketing Manager, Guidance Software

Digital forensic investigators are quickly becoming familiar with the power of Python. The open source programming language named after Monty Python has been around for approximately 20 years and is fairly simple to read and learn. While EnCase users have used the EnScripting language for 15 years to extend the capabilities of EnCase and create the 130+ EnScripts on EnCase App Central, Python has the ability to add additional powerful investigative capabilities.

In this webinar, Chet Hosmer, Founder of Python Forensics, Inc. and James Habben, Master Instructor at Guidance Software will demonstrate examples of those capabilities in an investigation demonstration using EnCase. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps.

Register now at
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2458 reads)

Hack It and Track It training at Black Hat Europe 2015

Friday, September 04, 2015 (08:49:29)
The fast-paced training course designed for forensic investigators and pentesters - Hack It and Track It - will be available to a European audience for the first time at Black Hat Europe 2015 from 10th to 11th November 2015

Inside the HGST Helium Hard Drive

Thursday, September 03, 2015 (08:52:53)
Helium-filled hard drives may be our future storage option. Increased storage, less noise and reduced heating, reduced power consumption are just some improvements behind these types of hard drives.

Yet, no one had an opportunity to look inside the helium hard drives and to do a proper inspection of its mechanics. We believed that this challenge should be suitable for us, since we have a lot of experience in examination of the hard drives.

The Value of Obtaining a Digital Forensics Certification

Wednesday, September 02, 2015 (09:30:25)
After having gained experience working in the field of digital forensics, advance your career with industry recognition as a Certified Cyber Forensics Professional (CCFP) certification.

Digital forensics has grown from a niche law enforcement discipline to a full-blown vital profession that permeates information security as well as law enforcement and the legal community. In today's world, these fields simply cannot function as needed without the support of cyber forensics professionals. As an advanced professional-level certification, the CCFP recognizes qualified practitioners who are equipped to lead complex and diverse cyber forensics investigations.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (3970 reads)

Inside the police sting that netted one of the world's largest paedophile rings

Wednesday, September 02, 2015 (07:44:24)
The Australian head of an online paedophile ring has been caught by a police operation that ventured on to the dark web and covertly infiltrated a global crime network involved in the abuse of hundreds, possibly thousands, of children around the world.

Last year, a finely-hatched police operation netted not only the Australian head of a global online paedophile ring, but also senior members of the international network.

Officers covertly infiltrated the group. It was involved in the abuse of hundreds, possibly thousands of children around the world.

Read More (ABC)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2431 reads)

Countering Anti-Forensic Efforts – Part 1

Tuesday, September 01, 2015 (09:25:04)
Computer forensic techniques allow investigators to collect evidence from various digital devices. Tools and techniques exist allowing discovery of evidence that is difficult to get, including destroyed, locked, or obfuscated data. At the same time, criminals routinely make attempts to counter forensic efforts by wiping data, deleting files, faking or clearing logs, histories and other traces of performed activities. Anti-forensic efforts are not limited to just that. In this whitepaper, we will have a brief overview of common anti-forensic techniques frequently used by suspects who are not specialists in high-tech, and ways to counter them during the investigation.

What this paper does not discuss is the suspects’ use of advanced tools dedicated to countering forensic efforts. Instead, we will talk about the most common anti-forensic techniques.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2337 reads)