±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36317
New Yesterday: 0 Visitors: 192

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Digital Forensics, Computer Forensics, eDiscovery

Belkasoft Improves GrayKey Support In v.9.9

Friday, December 13, 2019 (14:37:15)
Belkasoft is releases the new v.9.9 of its leading computer, mobile, cloud and remote forensics tool, Belkasoft Evidence Center 2020.

In the new release, the product offers improved correctness and speed of analysis of GrayKey images (and zip-based data sources in general). Besides, carving performance has been significantly increased while the space required to store carved data has been significantly decreased.

Read more on what is new at https://belkasoft.com/new. Request a free trial at https://belkasoft.com/new. Get a quote: https://belkasoft.com/quote.

Oxygen Forensic Detective 12.1: Let AI Take A Look

Friday, December 13, 2019 (14:36:28)
Image categorization, now available in Oxygen Forensic® software, is an innovated way to bring in artificial intelligence (AI) that is capable of recognizing photos and videos containing identified information from one of twelve categories. The current categories currently supported are: pornography, extremism, graphic violence, drugs, alcohol, weapons, gambling, child abuse and images and videos deemed to be risqué. This powerful addition is also able to detect documents, currency, IDs and credit cards.

Debunking Fake Images: Fact-Check The Information In Front Of You

Friday, December 13, 2019 (14:30:07)

PALISCOPE WEBINAR Monday, December 16th, 3 PM CEST Speaker: Warren Bulmer – Police officer and online investigations specialist Registration: Click here

Magnet Forensics And Child Rescue Coalition Partner On Magnet OUTRIDER

Thursday, December 12, 2019 (17:27:40)
Technology partnership brings cutting edge technology to CSAM-related investigations — helping law enforcement as they rescue victims and bring criminals to justice.

Magnet Forensics, a global leader in the development of digital investigation software and Child Rescue Coalition (CRC), a nonprofit organization dedicated to combating the sexual exploitation of children, today announced that they have partnered to bring Magnet OUTRIDER to CSAM investigators who can benefit from quick triaging on-scene.

Recently released by Magnet Forensics, Magnet OUTRIDER is a preview tool used to quickly scan smartphones and computers to determine if illicit material is present — often identifying it in five minutes or less. From there, a risk profile of the target user can be quickly developed. OUTRIDER reduces demand on digital forensic units by limiting the number of seized devices and prioritizing those that require urgent full forensic analysis — decreasing the timeframe between arrest and charge.

Walkthrough: VFC From MD5

Thursday, December 12, 2019 (15:37:56)
VFC was first launched to the forensic community in 2007. It makes it easy to create a virtual machine (VM) replica of a target system, enabling an investigator to recreate and interact with the “digital crime scene”.

Using accepted forensic practices, VFC interrogates the target drive to gather relevant system information, so that it can very quickly build the VMware framework to create a forensically sound replica of the target system (the exhibit) as a Virtual Machine (VM). This process is automated by the VFC software to avoid BSOD and driver errors, saving the user hours of manual diagnosis and repair.

VFC allows virtualisation of Windows, Linux, Solaris & other OS platforms.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (416 reads)

Solving The Mystery Behind Imaging A Mac Computer

Thursday, December 12, 2019 (15:05:28)

Join BlackBag experts for an upcoming webinar on imaging a Mac computer installed with APFS and/or a T2 secured Mac computer.

Case Study: Using Susteen's Data Pilot 10 In Law Enforcement Investigations

Wednesday, December 11, 2019 (15:38:58)
Detectives from Lima PD discuss their experiences with the Data Pilot 10.

"Having been a detective for fourteen years, I immediately thought of interacting with witnesses and victims, and their apprehension to turn over their phones for days on end, and the expediency of being able to extract just the limited amount of data we need, that's been pertinent to a case."

"Data Pilot has been able to speed up our process. I have had a victim that would have been in an interview room: a lot of times I would know beforehand if we were going to need that information off of their phone, so I was asking for consent. They'd be more willing to give that phone to us knowing that it's not going to take us long to extract that information. And then usually I'll go and conduct the interview, and then at the conclusion, or shortly after, it would be completed and we could give that phone to them."
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (853 reads)

Magnet AXIOM 3.8 Brings AirDrop Artifacts, Checkra1n Acquisition Updates & More

Wednesday, December 11, 2019 (14:14:50)
Magnet AXIOM 3.8 is now available with new mobile artifact and acquisition enhancements — including AirDrop and full logical acquisition of iOS devices jailbroken using checkra1n, new Slack updates and much more!

If you haven’t tried AXIOM yet, request a free 30-day trial here.

Considerations When Investigating Data From Password Managers

Tuesday, December 10, 2019 (13:21:38)
by Dr Tristan Jenkinson

In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We now discuss some of the potential issues that can arise in such investigations and some areas where early consideration may help ease or avoid these issues.

In the UK, if you access a computer without the authority to do so, this would likely constitute a breach of the Computer Misuse Act. This means that if credentials such as an email address and password are identified, while it would be possible to use those credentials to collect the relevant data, it still may not be possible to do so legally without additional steps seeking the relevant authorisation.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (659 reads)

Interview With Eric Oldenburg, Law Enforcement Liaison, Griffeye

Tuesday, December 10, 2019 (13:07:34)
Eric, when we interviewed you last year, you'd just come on board with Griffeye as Technical Liaison to law enforcement. What has the past year in this role taught you, and based on these lessons, where are you taking your role in the coming year?

If this last year has taught me anything, it is that everyone who works CSAM related investigations are the same, all over the world. These are all dedicated, passionate people who want to help, who are eager to help save children and willing to do so at the potential expense of their own mental health. Everywhere in the world, there are huge backlogs and cases that sit for too long due to short staffing, low budgets and inferior tools. It has also taught me that there are large numbers of investigators in this field that are still using tools that just aren’t designed for this type of work. I feel so happy to show them Griffeye Analyze DI, because I know it will do for them what it did for me, keep them in this fight longer and protect their mental health.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (588 reads)