±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 35131
New Yesterday: 2 Visitors: 199

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 2

Child Abuse Images Hidden In Crypto-Currency Blockchain

Thursday, February 07, 2019 (11:48:07)
Images of child sexual abuse have been found embedded in the system powering a high-profile crypto-currency.

Somebody added the illegal images to the core ledger of Bitcoin Satoshi Vision (BSV) by using a payment processor.

This ledger, known as the blockchain, is a running record of crypto-currency transactions, shared among users of the platform.

Experts have warned that abuse of blockchain tech is a growing problem.

Read More (BBC)
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1131 reads)

Webinar: Online Investigation Of A Real-World Trafficking Case

Tuesday, February 05, 2019 (15:54:09)

By: Paliscope (peer company to Griffeye)
Date: 2019-02-12
Time: 15.00 CET (9 am EST)
Speaker: Christian Berg, CEO & Founder of Paliscope
Info: Law Enforcement Only

Susteen Brings New Mobile Forensics Field Technology To Europe & Asia

Tuesday, February 05, 2019 (12:59:45)
European agencies can now have quick access to Susteen’s DATAPILOT 10 Field Triage Device. This new affordable device allows agencies to instantly access evidence data from cell phones in the field. This data can be viewed on scene or sent back to the lab for analyzing through a variety of tools already at your disposal. Susteen’s software is created in the United States of America and Schippers IT will allow for European customers to have quick access to stock of the device.

The DATAPILOT 10 is already in use throughout the United States and has recently been introduced throughout Europe. With this new device, agencies can greatly improve their digital forensic arsenal and increase their capability for acquiring evidence data immediately. The device’s cutting-edge ability to mirror anything that can be seen on the phone, gives the investigator the ability to acquire data from encrypted applications and more. Priced at only €1,500, the device is an affordable tool for a forward thinking agency that looks to make actionable decisions in the field in real-time.

Interview With Matt McFadden, Director of Training, BlackBag Technologies

Tuesday, February 05, 2019 (12:06:57)
Matt, you've recently been appointed Director of Training at BlackBag Technologies. Tell us about your role and what it involves.

The role of Director of Training involves working with many of the teams here at BlackBag. Primarily, I have the pleasure to work on the excellent instruction team developing and delivering solid digital forensic training for MacOS, iOS, and Windows examinations. I have reviewed the current course offerings and am impressed by their depth and quality.

Our team also maintains three industry-recognized certifications - Certified BlackLight Examiners, Certified Mobilyze Operator, and the Mac and iOS Certified Forensic Examiner. This role actively engages various groups such as Software Development, Product Management, Marketing, Support, and Sales in many projects.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (937 reads)

Using Santa To Augment Forensic Investigations

Monday, February 04, 2019 (14:55:11)
Gary: Hi. The title of this talk is ‘He’s Making a List, and We’re Checking it Twice: Santa for Forensic Analysis’. I want to point out that it was very difficult coming up with this title. We had many runner-ups, including ‘I’m Telling You Why: Santa as a Forensics Tool’, ‘He Sees You When You’re Happy and Knows Just What You [Take]’, and ‘I Saw... Santa Claus’. None of those washed out, and ‘He’s Making a list, and We’re Checking it Twice’ is the title.

But you’re probably wondering who we are. I’m Gary. I’m on the Digital Forensics team at Google. I handle all security incidents, with a specialty on [00:53] last couple of years, and that’s kind of how I [fell into Santa]. And before that, I worked in the Detection team at Google, and before that, I did detection for the Federal Reserve’s National Incident Response team.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (792 reads)

Griffeye Webinar: Collaboration Workflows In Analyze DI Pro Using VICS OData

Monday, February 04, 2019 (10:47:07)

Date: Feb 13, 2019
Time: 3 pm CET (9 am EST)
Presenter: Eric Oldenburg, Law Enforcement Liaison, Griffeye

In this webinar, we will discuss how to use the VICS OData* Export function within Analyze DI Pro to seamlessly share case data between users. This functionality allows investigators to collaborate with forensic examiners, maximizing results and minimizing time spent in CSA investigations.

Sign up here

OpenText™ Solutions For All Your Digital Investigation Needs

Friday, February 01, 2019 (10:49:56)

OpenText™ acquired Guidance Software, the provider of EnCase™ cybersecurity, digital forensic investigation and e-Discovery software solutions, in 2017 and has since continued to evolve in the digital forensics market. OpenText’s digital forensic suite comprises of EnCase™ Forensic, EnCase™ Mobile Investigator and Tableau Forensic Hardware. Forensic investigators must have the right combination of forensic hardware and software to securely triage, acquire, investigate, and report the findings. EnCase™ Forensic and Tableau Forensic Hardware solutions are the market leaders in digital investigations and are the tools of choice for thousands of field agents, lab technicians, and investigators all over the world. In fact, OpenText is the only provider offering a complete set of software and hardware digital forensic solutions to help investigators during every phase of their work.

A Forensic Framework To Identify Local Vs Synced Artifacts

Friday, February 01, 2019 (10:31:58)
Jacques: Thank you. Alright. First of all, I’ll start off by thanking U-City, thanking [An], who’s my prof, who [00:13] be here today, but actually he’s teaching in Sri Lanka, so he wasn’t able to be here.

So, this presentation will be a lot less technical than some of the other ones, although it’s still very much related to forensics. The agenda will look at the motivation for why I undertook this research; what the objective was; did a quick survey of practitioners, I’ll talk about that when we get to it; we’ll go through the framework; we’ll look at the application of the framework; and then, conclusion and future work.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (924 reads)

WhatsApp Challenges: Finding Evidence With Oxygen Forensic Detective

Wednesday, January 30, 2019 (10:33:35)
With more than 1.5 billion users and 5.5 billion messages per day, WhatsApp is without a doubt the most popular messenger in the world. All messages sent using WhatsApp have end-to-end encryption, meaning they are unreadable if intercepted by anyone, including law enforcement and WhatsApp itself. More importantly, WhatsApp communications are never stored on the WhatsApp server. It is no surprise with this type of security built-in to the application it is often the choice communication platform of users with nefarious agendas. Keeping that fact in mind, it is imperative investigators are armed with methods and tools to recover this essential data.

Oxygen Forensics offers the most comprehensive WhatsApp data extraction and decryption tools in the market.

Forensic Examination Of Manipulated Email In Gmail

Tuesday, January 29, 2019 (15:40:28)
by Arman Gungor

Last week, I came across an interesting post on Forensic Focus. The poster, jahearne, was asking about how one can detect manipulation of an existing email in Gmail. In his hypothetical scenario, the bad actor was using Outlook to edit the message and change its contents after it was received. I wanted to reproduce this setup and examine the results to see what we find out.

I started by performing a baseline acquisition of the target email account over IMAP—which is the same protocol Outlook would use to connect to Gmail. This allowed me to capture the Internal Date Message Attribute as well as the Unique Identifier (UID) Message Attribute for each message before any manipulation took place. I used our Forensic Email Collector to do this, but you can also capture these values by directly interfacing with Gmail’s IMAP server.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (908 reads)