±Forensic Focus Partners

±Your Account


Forgotten password/username?

New Today: 4
New Yesterday: 7
Overall: 27513
Visitors: 53

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Digital Forensics, Computer Forensics, eDiscovery

Search on This Topic: Links

[ Go to Home | Select a New Topic ]

X-Ways X-Tension for C4All users (forum topic)

Wednesday, June 11, 2014 (12:50:15)
C4All is a program used by law enforcement and others to categorize pictures and videos.

This X-Tension is for Users of C4All. The guides that are included describe how to best use the X-Tension with the Strategy hash sets , but your own hash sets can be used. Also it is based on the file types (video and pictures) that C4All presently uses and searches for.

With this X-Tension, you will be able to process with the speed of X-Ways, and be completing most of the C4Prep stage all at once (like skin tone % and video stills)...

Read More
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1375 reads)

Making it easy or hard: Computer forensics expert testimony

Monday, June 09, 2014 (14:46:12)
Every time I am preparing for testimony at deposition or trial, I ask the attorney I am working for whether I should make it “easy” or “hard.” Even very experienced attorneys examining a technical witness often ask the wrong question. In a recent exchange during cross-examination at trial, the issue was whether the opposition’s client had altered a hard drive, rendering it inaccessible by a prior computer forensics expert. The opposition attorney first asked about a particular type of disk encryption. In the follow-up question, the attorney changed the hypothetical and did not specify the supposed encryption mechanism. When he confronted me claiming I had changed my answer, I simply explained that no, he had changed the question. When dealing with technical testimony, seemingly minor details in how the question is asked can alter the answer you receive...

Read More (Inside Counsel)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1062 reads)

Survey: Reducing Backlogs in Digital Forensics

Thursday, June 05, 2014 (15:00:00)
The number of crimes that require digital forensics expertise is increasing, and alongside it the amount of data that must be analysed is growing exponentially. However, the number of experts is not growing in line with these elements, leading to a backlog in both law enforcement and private sector investigations.

Even when effective triage has identified the most salient points of an investigation, it is still necessary to involve forensics experts. The level of training necessary to adequately investigate digital forensic evidence can be prohibitive, particularly within law enforcement agencies where budgets are tight and time even tighter.

With this in mind, Nina van der Knaap from Leiden University has put together a short survey for digital investigators regarding backlogs and what can be done to ease them. The survey can be accessed here and is open to investigators internationally.

If you have any questions or would like more information, please contact n.van.der.knaap@law.leidenuniv.nl
  • Posted by: scar
  • Topic: Links
  • Score: 0 / 5
  • (1463 reads)

Laying out the role of the computer forensics neutral expert

Friday, May 30, 2014 (09:53:13)
When discovery in litigation involves the inspection of computer systems, setting out reasonable and effective protocols often involves a neutral expert in computer evidence. Working for the court, oftentimes at the direction of a special master, the neutral expert will engage with both parties, and often with computer forensics experts, to craft a reasonable inspection protocol. The challenge is to achieve consensus on the approach to preserving, performing analysis and review, and then producing relevant data. Protecting the producing party’s privacy/privilege while identifying only data that is responsive to the inspection demand must be balanced with the requesting party’s goal of finding all relevant evidence...

Read More (Inside Counsel)
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1076 reads)

Quicker Forensic Imaging? (ongoing forum discussion of Ballistic Imager)

Wednesday, May 28, 2014 (12:19:55)
"My work is based around scene-of-crime data collection, and I am often frustrated by the speed of imaging hard drives, particularly if we need to leave the laptop/pc where it is.

Has anyone on here heard of, or used, Ballistic Imager? I've been doing some research and this seems like the fastest solution at the moment, claiming around 5 minutes for 128GB drive, forensically imaged..."

Read More
  • Posted by: jamie
  • Topic: Links
  • Score: 0 / 5
  • (1712 reads)