±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 3
Overall: 28346
Visitors: 133

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Webinar: Policing the digital crimes of today

Friday, April 24, 2015 (11:59:17)
Date/Time: Tuesday 5th May, 4pm BST/11am EDT

Speakers: Paul Slater, Director of Forensic Solutions EMEA at Nuix and Troy Bettencourt, Sales Engineer NA at Nuix

Investigators who are working with legacy digital forensic tools and faced with shrinking budgets often find it hard to see how they can keep up. Join this webinar to find out how you can work smarter, not harder, during a forensic investigation. Learn how to simplify, streamline and automate your workflows, analytics and review processes to help you deal with growing volumes of digital evidence and shrinking budgets.

We'll show you how you can process more files and formats, integrate your workflows, and work collaboratively with technical investigators and subject matter experts to quickly get to the essence of the evidence.

Register now at http://info.nuix.com/policing-digital-crimes-of-today-FF.html
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (556 reads)

Forensic Focus Forum Round-Up

Friday, April 24, 2015 (08:51:54)
Welcome to this round-up of recent posts to the Forensic Focus forums.

How would you acquire data from a password protected MS Surface Pro?

Forum members discuss malware risk mitigation on forensic workstations.

How can a split E01 image of a Windows 7 Enterprise SP1 physical disk protected by BitLocker be mounted? Forum members come up with a solution.

Minime2k9 asks how to find evidence of remote desktop login outside of the Windows Security log.

Should you keep a chain of custody for forensic investigations in corporate environments? Add your thoughts on the forum.

Forum members discuss a timestamp discrepancy on an acquired Linux machine.

How do you recover deleted Snapchat images on an iPhone 4S? Chime in on the forum.

Forum member liguoroa gives feedback on BlessHex editor.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (755 reads)

Interview with Bruno Kerouanton, CISO of the Republic and Canton of Jura

Thursday, April 23, 2015 (10:28:53)
Bruno, you're CISO of the Republic and Canton of Jura in Switzerland. Could you tell us a bit about your job and what a typical day involves?

Sure. As Chief Security Officer for cybersecurity I'm involved in ensuring security of the state. That means we have mostly 400 locations for different applications, for example schools, healthcare industry, roads, taxes, police and so on. So the perimeter I have to secure is quite broad. The problem we have is that I have to check all the risks involving this perimeter and also understand the needs of the business, because every business has different needs. So we have to match guidelines also from the Swiss contribution, and ISO 27001 standards, to define policies and roles. So that's my main job and that takes a lot of time because we have to be compliant.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (985 reads)

Head replacement tools for "landing zone" HDDs

Wednesday, April 22, 2015 (16:27:57)
Very important part of HDD functioning is a principle of heads parking while device is turned off. During the decades of HDD development, numerous improvements in this area were seen. These changes positively affected data security, capacity, product lifetime and decreased device dimensions.

When hard drive is turned off, its sensitive heads must be parked at a "safe place". This safe area, must be designed in such way, that read/write heads can't be damaged and that valuable data is not threatened in any way.

Taking Down Fraud Sites is Whac-a-Mole

Monday, April 20, 2015 (16:37:48)
I’ve been doing quite a bit of public speaking lately — usually about cybercrime and underground activity — and there’s one question that nearly always comes from the audience: “Why are these fraud Web sites allowed to operate, and not simply taken down?” This post is intended to serve as the go-to spot for answering that question.

Q: Why not take down the hundreds of sites now selling stolen credit cards and identity data?

For starters, it’s not always so easy to take these sites offline. Many of them rely on domain name registrars that routinely ignore abuse requests. The same goes for the organizations hosting a number of these unsavory markets.

Read More (KrebsOnSecurity)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1504 reads)

Expert-Level (ISC)2 CCFP Digital Forensics Training Available from May-July

Friday, April 17, 2015 (14:55:45)
From May 11-July 1, 2015, (ISC)2 is delivering Live OnLine Training courses to provide expert-level instruction for those interested in attaining CCFP certification (Certified Cyber Forensics Professional).

The courses are delivered through the (ISC)2 Learning Center, a centralized platform that allows learners to access CCFP training materials, educational resources and manage their (ISC)2 online training in one environment.
  • Posted by: (ISC)2
  • Topic: News
  • Score: 0 / 5
  • (2912 reads)

Interview with Matt Davies, Digital Forensics Analyst, Sytech

Friday, April 17, 2015 (11:57:48)
Matt, you're a digital forensics analyst at Sytech. Tell us a bit about your role and what it involves.

My role at Sytech predominantly involves the extraction and analysis of embedded devices, such as mobile phones, tablets, satellite navigation systems, games consoles, unknown devices etc. The examinations I am involved in vary considerably and range from indecent images of children (IIOC) to providing assistance in murder investigations. Working for a private organisation, such as Sytech, allows me to experience both prosecution and defence based cases.

What first made you interested in digital forensics as a field?

It was the varied nature of the work accompanied by the opportunity to make a difference that attracted me to the field of Digital Forensics.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2601 reads)

Interview with Joe Williams, PhD Student, Canterbury Christ Church University

Wednesday, April 15, 2015 (13:10:32)
Joe, you presented an internet research tool at DFRWS. Could you briefly outline your presentation for our readers?

The presentation offered an early glimpse into a tool that will allow law enforcement officials to conduct online research. Essentially what that means is every action an official does while researching on the Internet is kept in an audit trail, for example in the cases of files being downloaded, hashed and logged. The presentation also touched upon the fact that, as far as we are aware, there are no overall guidelines within the UK on how Internet evidence should be gathered. Presently, ACPO guidelines only look at dead and live-box forensics, so there’s a real challenge in creating a tool where there is little official guidance.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (3050 reads)

Review: Mobile Phone Examiner Plus (MPE+) - Part 2

Thursday, April 09, 2015 (15:45:02)
Reviewed by Si Biles, Thinking Security

One of the things that I love about being in IT is that it is an ever changing field. I find myself coming across new things daily. This even occasionally applies to my own “infrastructure”, such as it is. Once upon a time, in a land far, far away (well, Scotland) I started my IT career as a Linux SysAdmin – bouncing around corporate IT departments and getting into security. I strayed for a long time from this true path. I covered my guilt by generally trying to use a Mac, because at least it had a BSD based operating system, but I have once again seen the light, and have returned to my “root”s (hopefully at least one or two UNIX people got that joke)...

Read More
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (3394 reads)

Electronic Voiceprints: The Crime Solving Power of Biometric Forensics

Thursday, April 09, 2015 (12:50:54)
By Jared Stern

Fingerprinting has been used for years to determine the individuality of a person. But, newer technology allows investigators to capture a person’s voice, a so-called “voiceprint.” Sometimes, a person’s voice is the only clue that police and forensic teams have to go on.

What Is It?

Voiceprinting is a new kind of forensic evidence that uses a person’s voice to determine certain key facts about a situation or investigation. Voice identification involves the analysis and comparison of a person’s voice, using advanced computer systems and software which can analyze how words flow together, pauses, breath, and the unique patterns generated by each individual’s mouth and larynx.

First, the quality of the recording is established using special instrumentation. In a classic sound spectrograph, the person’s voice is recorded on a magnetic disk and then sent through an amplifier.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (2463 reads)