±Forensic Focus Partners
New Today: 8
New Yesterday: 2
±Forensic Focus Partner Links
· SQLite Database Forensics – ‘Sleep Cycle’ Case Study
· Data Recovery As A Medium For Email Forensics
· Carving out the Difference between Computer Forensics and E-Discovery
· Forensic Analysis of SQLite Databases: Free Lists, Write Ahead Log, Unallocated Space and Carving
· How Secure Is Your Password? A Friendly Advice from a Company That Breaks Passwords
· Using SQL as a date/time conversion tool
· Forensics and Bitcoin
· Investigation and Intelligence Framework (IIF) – an evidence extraction model for investigation
· Extracting data from dump of mobile devices running Android operating system
ReviewsBack to top Back to main Skip to menu
Sadly, at the time I put the finishing touches to the first part of this review at the start of 2015, Paris has been rocked by terrorist attacks resulting in the deaths of 17 not including the three perpetrators themselves. Subsequent investigations have revealed that at least 500 calls had been exchanged between the two groups of individuals involved – someone, somewhere in France, is most likely examining their mobile phones for even more intelligence right now.
That mobile devices are going to be used in any criminal activity is almost a given now – although post Snowden, at least the more intelligent crook might give some pause to consider the NSA or GCHQ before making their call. No surprise really when there are more phones in the UK than there are people – according to OFCOM(1) that’s 83.1 million subscriptions for a population estimated at 64.5 million(2). 93% of adults have at least 1 mobile phone and 61% of those are so called “Smart Phones” (although if mine is anything to go by, “smart” is a bit of an exaggeration) – a Samsung S5 has a quad-core 2.5Ghz processor, 2GB of RAM and a 1920x1080 pixel display – you would be lucky to get somewhere close to this on the desktop 10 years ago. In 2005 an Apple PowerMac G5 would set you back £2,199 (inc VAT) – inflation adjusted that’s nearly £3k and it doesn’t include a display! more ...
I am a digital forensics examiner who early in my career studied computer science and wrote code as a software developer and later in my career studied law and became a licensed attorney. I have acquired certifications in both mobile device forensics and computer forensics and own a private digital forensics firm in Minnesota. We love mobile! Half our case load is recovering dozens of flavors of deleted messages from every variety of phone known to humanity. But we also devise evidence strategy for complex civil litigation and draft preservation letters and requests for production and advise on e-discovery issues, which now increasingly turn on mobile evidence. more ...
During the first week of December 2014, Guidance Software ran a computer forensics training course at its Slough offices in the UK, with the aim of helping forensic practitioners to understand and use EnCase as part of their investigations.
The course was developed by Guidance Software with a view to introducing new digital forensics practitioners to the field. The students are usually new IT security professionals, law enforcement agents and forensic investigators, and many have minimal training in computing.
Computer Forensics I is available both in person at one of Guidance Software's training centres, or online via their OnDemand solution, which provides live remote classes for students around the world. more ...
On the 14th-17th of October 2014, Magnet Forensics ran its first remote training course on the essential knowledge required to properly use Internet Evidence Finder, Magnet's flagship software solution.
The course was set up with the aim of aiding digital forensics investigators who are completely new to IEF, or investigators who are not used to working with digital forensics solutions but require their use on certain cases.
Rob Maddox, Magnet's Director of Global Training, put the course together and described how it was developed: more ...
Oxygen Forensic Suite 2014 is specialist software aimed squarely at mobile phone forensics. It claims to have the “widest range of supported devices” with over 8,400 models listed and is geared towards smart-phones with a particular emphasis on the analysis of data recovered from them.
It is straightforward to use once you get your head around the way it works, and with some thought you can make it fit into your examination system quite easily. You don’t have to be particularly savvy to use it, but you do to get the most out of it and be able to use it effectively.
There are several license types, such as “Internet” (software key), USB dongle (individual machine) and an enterprise version whereby a single USB dongle is installed on a server and allows several machines to use the software at the same time. more ...