±Partners and Sponsors
New Today: 2
New Yesterday: 2
±Follow Forensic Focus
· Samsung Galaxy Android 4.3 Jelly Bean acquisition using Joint Test Action Group (JTAG)
· Safer Internet Day
· Webmail Forensics – Digging deeper into Browsers and Mobile Applications
· Operation Endeavour: The Tip of the Iceberg?
· Forensic analysis of the ESE database in Internet Explorer 10
· WhatsApp – discovering timestamps of deleted messages
· Man In The Middle Attack: Forensics
· Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
· Windows 8 File History Analysis
InterviewsBack to top Back to main Skip to menu
I have been interested in Information Technology and Law for quite some time. I know that there needs to be critical development in the overlap between the two disciplines. I have completed both my LLB and BSc in Computer Science. Its application to digital forensics had developed significantly over the past few years and that seemed like the best place to start with my research. In South Africa digital forensics has been used to a limited extent in that examinations of evidence have been done, but up to now have had limited exposure in court. I would like to make meaningful contributions to the legal arena in this respect. more ...
I was always interested in academia from a very early age – I remember distinctly my primary school teacher telling my mother at a parents/teacher meeting that I would become a Professor! I had no idea what it was – but thought – fair enough, I’ll aim for that! As I got older, I became increasingly interested in technology so decided to pursue a graduate and post graduate in the area of Computing. With academia/lecturing always in my mind, I felt it important to gain industry experience in the field in order to bring some sense of credibility to my lectures. I had an incredible experience as a software developer and project lead – I travelled the world and got to work on some fantastic projects. more ...
Digital Forensics is the acquisition and analysis of any digital medium for the purpose of finding and reporting evidence to Government agencies, police, and/or private contractors. At Bloomsburg University we are taught first to have a low-level understanding of what we will be looking at (Binary/Hexadecimal, File System Analysis, and Windows Artifacts), and then we are taught how to use our skills to do real Forensics cases using the prevalent Digital Forensics tools (FTK, EnCase, X-Ways). What really drew me to Digital Forensics the most was the investigative mindset you have to have. When you are doing a case, it’s almost like a chess match between you and the “bad guy”. For me, that’s very exciting, every case is different, and has its own brand of excitement. more ...
I first heard of BulliesOut through being involved in the charity Children in Wales and contacted the CEO, Linda James, via LinkedIn. We met as I was interested in what the charity did and what involvement the charity had with schools and other professionals working with young people. I was impressed with the dedication of Linda and her desire to get the message out there to young people that no-one has to put up with bullying. The charity looks at all aspects of bullying, working with the bully as well as the victim and also the bystanders who have a crucial role to play. BulliesOut operates in other countries as well as the UK but it was encouraging to learn that it is a Wales based charity and one that is well respected. I was asked to become a Trustee, and although I was not sure what being a Trustee involved, I was happy to join the team. I promote the charity as much as I can with other professionals and young people and although my time is limited due to working full-time and my University studies, I do what I can. more ...
John, please tell us about your current role.
I am contracted to be "senior forensics instructor" and assist in developing and delivering cyber investigation training courses for DoD organizations, Defense Criminal Investigative Organizations (DCIO), military counterintelligence agencies, and law enforcement organizations.
This gives me the opportunity to review and sometimes experiment with bleeding edge digital forensics, and transfer the acquired knowledge to others. more ...