±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 1 Overall: 32353
New Yesterday: 3 Visitors: 110

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 3

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Interview With Chuck Easttom, Computer Scientist & Consultant

Wednesday, June 07, 2017 (08:39:12)
Chuck, tell us a bit about yourself. What does a day in your life look like?

Well I stay very busy. I am always working on a new book or paper. I travel all over the world consulting and conducting training on a variety of computer security related topics.

You've recently published a paper on how graph theory can be used to model forensic examinations. What is graph theory?

Graph theory is a part of discrete mathematics and it is used to study the relationship between objects. It has been widely used in network optimization.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (666 reads)

New White Paper - The Technology Of Child Luring: Can Machine Learning Help?

Wednesday, June 07, 2017 (06:53:49)
Magnet Forensics has a new white paper available that discusses why and how contextual content analysis works, based on a description of what child luring is (and isn’t) and what nuances to expect.

The white paper - The Technology of Child Luring: And How Machine Learning Helps Investigators to Spot it - also covers how machine learning, such as the model introduced with Magnet.AI (our industry-leading technology that analyzes conversations to recover potential child luring content for examiners to consider), overcomes the above challenges using data science.

Download the white paper now!

An Introduction To Theft Of Trade Secrets Investigations

Monday, June 05, 2017 (07:36:35)
by Laurence D. Lieb, Managing Director, HaystackID.

The subjects we will be covering include:

• Defining When One Should Reasonably Panic
• Reasonable Triage Steps to Take in Order to Identify if There is Only Smoke or an Actual Fire
• The Importance of Defining “Win” Upfront and the Avoidance of Mission Creep
• Definition and Identification of trade secrets
• Improper Misappropriation as Defined By 18 U.S.C. § 1839(5) (A) and (6)(B)
• Restrictive Covenants and Departing Employees
• Evidence Mapping and Preservation
• Reasonable Forensic Analysis Steps
• Special Considerations Regarding Smartphone Based Evidence
• Agreed Orders To Address Privacy Concerns
• Reasonable Attorney-Client Communication Security Measures
• Civil Subpoena for Carrier Call and Text Message Records

In the first section, we will define and lay out reasonable steps one can take in the event smoke has begun to appear which could indicate fire.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (872 reads)

Challenges Of ISO 17025 Accreditation – Survey Results

Friday, June 02, 2017 (10:26:49)
A group of forensic practitioners has recently conducted a survey into the ISO 17025 scheme – its effectiveness, and its relevance for digital forensics.

The survey was conducted using Google Forms and was aimed at forensic practitioners on the front line of investigation, rather than at managers or corporations. What follows below is a summary of the results.

The majority of the respondents were investigators in law enforcement, followed by those in the private sector. Some of the private sector respondents worked alongside law enforcement on some investigations, while others did not.

Most provided a range of different services, with the most popular being hard disk and storage media imaging; analysis of stored data; phone contents preservation and analysis; server analysis; and network investigations analysis.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (851 reads)

Truxton 2.0 to Premier at Techno Security and ICAC Atlanta 2017

Thursday, June 01, 2017 (08:55:50)
Probity Inc, a software services and systems engineering company, is pleased to announce the release of Truxton 2.0, a digital forensics platform designed to automate big data investigations.

“Truxton 2.0 is truly a revolution in digital forensics” said Probity CEO Marcus Ordonez. “By automating the loading, exploitation, and reporting of data images and logical files form any forensic tool, we’re offering an open framework that scales to handle big data, automatically extracts key entities by category, and allows multi-user collaboration.”

Initially introduced at Techno Security 2014, Truxton has become an important tool for law enforcement and other users who are looking for a way to analyze data from a wide variety of ever-changing forensic tools and sources using a single platform.
  • Posted by: Truxton
  • Topic: News
  • Score: 0 / 5
  • (1363 reads)

Enfuse 2017 – Recap

Thursday, June 01, 2017 (06:59:29)
The Enfuse Conference, organized by Guidance Software, took place between 21st and 24th May at Caesar Palace Conference Center in Las Vegas. More than 1,500 attendees were present, coming from different fields like digital forensics, e-discovery, incident response and cybersecurity. Most of the attendees were from the US and Canada but many people from Central and South America, Asia, Africa and Europe were also present.

Forensic Focus was present for the entire conference and documented it in real time on Twitter. This article is a wrap-up of the conference highlighting some of the most interesting talks.

Read More
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (697 reads)

SuperImager® Plus Field Forensic Unit With Thunderbolt port - Linux/Windows Dual

Tuesday, May 30, 2017 (07:04:08)
MediaClone, Inc. is proud to announce the release of SuperImager® Plus Field Forensic Unit with Thunderbolt port - A Compact, Powerful Forensic field unit, which enables a forensic investigator, in the field, to run multiple Forensic Imaging, and is capable of capturing data from many types of storage interfaces and protocols (SAS, SATA, FC, SCSI, 1394, NVMe, USB3.1, M.2), including the latest NVMe SSD, at extremely high speed of 46GB/min, utilizing the Thunderbolt 3.0 fast port (40Gigabit/s) and the PCIE 3.0 Expansion box.

In addition, the new product can be used to run a Triage data collection application and Cellphone data extraction from multiple devices, and run complete forensic analysis applications (EnCase, FTK, Nuix).

The new product is supplied with PCIE expansion box and a small display with HDMI port.

The new product can also be operated by using optional external battery.
(See a full demo in Techno Security and ICAC conferences)

SuperImager Plus Forensic Field Unit with Thunderbolt 3.0 port
  • Posted by: ekohavi
  • Topic: News
  • Score: 0 / 5
  • (1554 reads)

Verify If A Photo Was Really Taken By A Suspected Camera - Camera Ballistics 2.0

Thursday, May 25, 2017 (12:05:41)
In today's world there are basically these types of digital evidence: text, image, video, audio recording and value such as geolocation or time-stamp data. A photo plays an important role among these types of evidence, bringing not only what we can see in the picture, but also a time and place the possible owner of a phone was present at. The reality is we live in a time of mobile phones with massive photographing and sharing, so knowing who took a photo is crucial information. This new technology is able to reliably verify, if a photo truly came from a specific camera. This applies for phone cameras, standalone cameras and any device with camera sensor. When you've found crucial photographic evidence, now you can verify its origin with accuracy of 99.9% and higher. Enter Camera Ballistics.

Oxygen Forensics Launches Online Certification Course June 1

Thursday, May 25, 2017 (09:35:43)
Oxygen Forensics, a worldwide developer and provider of advanced forensic data examination tools for mobile devices and cloud services, today announced that beginning June 1, forensic experts will be able to take the Oxygen Forensic Expert Certification 3-day training course online.

Oxygen Forensics is launching its own online portal aimed at providing a higher level of service to customers and users called the Learning Management System (LMS). Oxygen’s LMS will host the training course as well as other online materials.

The Oxygen Forensic Expert Certification course introduces advanced methods of smart device collections and data analysis. Students will examine, collect and analyze data from iOS, Android, and Windows devices, and then work to obtain physical images, understand file system formats, storage methods and evidence locations. The course also provides training and instruction on cloud storage and extraction techniques, with participants receiving a start to finish education on the use of Oxygen Forensic® Detective.

Digital Forensics News May 2017

Wednesday, May 24, 2017 (12:00:00)
Dr Graeme Horsman from the University of Sunderland is running a survey on tool testing in digital forensics.

AccessData celebrate their 30th anniversary this month.

Guidance Software's Enfuse conference is currently under way in Las Vegas, USA.

BlackBag continue their Windows forensic series with a post on the Master File Table.

MobilEDIT just released Camera Ballistics 2.0.
  • Posted by: scar
  • Topic: News
  • Score: 0 / 5
  • (1304 reads)