Using The Maps Activity Matrix In Oxygen Forensic® Detective

Ryan: Hey everyone. Ryan here from your Oxygen Forensic training team, and in today’s video we’re going to discuss a new feature found in our Oxygen Forensic Maps. As we know, there’s multiple ways to access our Oxygen Forensic Maps

A Brief History Of Time … Stamps

by Chris Atha, High-Tech Crime Specialist at the National White Collar Crime Center (NW3C) In an earlier article, the concept of relative time as it relates to computing devices and the memorialization of time was discussed, as was how to recognize

How To Preview Evidence On A Mobile Device

As smartphones continue to play an ever-increasing role in our lives, law enforcement, and digital forensics professionals are faced with the challenge of efficiently extracting and processing information from these devices. This is where  Mobile Device Investigator (MDI)  comes into

How To Conduct Mobile Setup With Mobile Device Investigator

Investigators face the daunting task of analyzing vast amounts of digital data to uncover critical evidence. To streamline this process,  Mobile Device Investigator (MDI)  offers an indispensable feature known as “Search Profiles.” These profiles empower investigators to tailor their search

Prioritization At Binalyze

Here at Binalyze, as in any product team, one of our biggest challenges in product development is prioritization. The decisions about where to focus our energies and the general order of our work impact a large number of our teams.

How To Scan A Mobile Device With Mobile Device Investigator

In today’s digital age, mobile devices have become an integral part of our lives. They store a wealth of personal information, making them an attractive target for malicious actors. Whether you’re an investigator, a digital forensics expert, or simply concerned

Automated Compromise Assessment With DRONE

DRONE is AIR’s built-in automated compromise assessment technology which dramatically reduces the time required to identify IOCs in a DFIR investigation and begin containment and remediation. DRONE flies above your live systems and data acquisitions to deliver an unparalleled decision

How To Use Rapid Hash Matching In The Battle Against CSAM

Technology has fast become a double-edged sword: the same advancements that allow for a more connected and more enjoyable life also put child safety at terrible risk. Child sexual abuse materials (CSAM) can nowadays be found in virtually any online

How AI Is Helping Law Enforcement Combat Human Trafficking

Artificial intelligence is the simulation of human intelligence processes by computer systems. AI systems are given vast amounts of training data that will be analyzed for correlations and patterns. Once the AI system analyzes these patterns it can make predictions

Combating Cyberterrorism: How Crypto Forensics Can Help

As cyber threats and online criminal activities continue to become more sophisticated, it is essential to understand the complexities of the digital world and how the latest advancements in crypto forensics can help combat cyberterrorism. Cyberterrorism is unlawful attacks and