±Forensic Focus Partners
New Today: 1
New Yesterday: 3
±Forensic Focus Partner Links
· DFRWS Europe 2015 Annual Conference – Recap
· DFRWS EU 2015 – Dublin 23rd – 26th March
· SQLite Database Forensics – ‘Sleep Cycle’ Case Study
· Data Recovery As A Medium For Email Forensics
· Carving out the Difference between Computer Forensics and E-Discovery
· Forensic Analysis of SQLite Databases: Free Lists, Write Ahead Log, Unallocated Space and Carving
· How Secure Is Your Password? A Friendly Advice from a Company That Breaks Passwords
· Using SQL as a date/time conversion tool
· Forensics and Bitcoin
ReviewsBack to top Back to main Skip to menu
One of the things that I love about being in IT is that it is an ever changing field. I find myself coming across new things daily. This even occasionally applies to my own “infrastructure”, such as it is. Once upon a time, in a land far, far away (well, Scotland) I started my IT career as a Linux SysAdmin – bouncing around corporate IT departments and getting into security. I strayed for a long time from this true path. I covered my guilt by generally trying to use a Mac, because at least it had a BSD based operating system, but I have once again seen the light, and have returned to my “root”s (hopefully at least one or two UNIX people got that joke). Actually, the truth of the matter is that my MacBook Pro – the one that the first part of this review was written on – has become horribly unreliable and has had to be replaced. It is being put out to pasture at home, being a 17” model, as a NetFlicks streamer. However, this has left a big gap for me – one that I wasn't sure how to fill... more ...
Sadly, at the time I put the finishing touches to the first part of this review at the start of 2015, Paris has been rocked by terrorist attacks resulting in the deaths of 17 not including the three perpetrators themselves. Subsequent investigations have revealed that at least 500 calls had been exchanged between the two groups of individuals involved – someone, somewhere in France, is most likely examining their mobile phones for even more intelligence right now.
That mobile devices are going to be used in any criminal activity is almost a given now – although post Snowden, at least the more intelligent crook might give some pause to consider the NSA or GCHQ before making their call. No surprise really when there are more phones in the UK than there are people – according to OFCOM(1) that’s 83.1 million subscriptions for a population estimated at 64.5 million(2). 93% of adults have at least 1 mobile phone and 61% of those are so called “Smart Phones” (although if mine is anything to go by, “smart” is a bit of an exaggeration) – a Samsung S5 has a quad-core 2.5Ghz processor, 2GB of RAM and a 1920x1080 pixel display – you would be lucky to get somewhere close to this on the desktop 10 years ago. In 2005 an Apple PowerMac G5 would set you back £2,199 (inc VAT) – inflation adjusted that’s nearly £3k and it doesn’t include a display! more ...
I am a digital forensics examiner who early in my career studied computer science and wrote code as a software developer and later in my career studied law and became a licensed attorney. I have acquired certifications in both mobile device forensics and computer forensics and own a private digital forensics firm in Minnesota. We love mobile! Half our case load is recovering dozens of flavors of deleted messages from every variety of phone known to humanity. But we also devise evidence strategy for complex civil litigation and draft preservation letters and requests for production and advise on e-discovery issues, which now increasingly turn on mobile evidence. more ...
During the first week of December 2014, Guidance Software ran a computer forensics training course at its Slough offices in the UK, with the aim of helping forensic practitioners to understand and use EnCase as part of their investigations.
The course was developed by Guidance Software with a view to introducing new digital forensics practitioners to the field. The students are usually new IT security professionals, law enforcement agents and forensic investigators, and many have minimal training in computing.
Computer Forensics I is available both in person at one of Guidance Software's training centres, or online via their OnDemand solution, which provides live remote classes for students around the world. more ...
On the 14th-17th of October 2014, Magnet Forensics ran its first remote training course on the essential knowledge required to properly use Internet Evidence Finder, Magnet's flagship software solution.
The course was set up with the aim of aiding digital forensics investigators who are completely new to IEF, or investigators who are not used to working with digital forensics solutions but require their use on certain cases.
Rob Maddox, Magnet's Director of Global Training, put the course together and described how it was developed: more ...