Increasingly, chains of evidence include software steps. It’s not just the RIAA suing people – and getting it wrong – based on automatic systems to detect and identify file sharers. It’s forensic programs used to collect and analyze data from computers and smart phones. It’s audit logs saved and stored by ISPs and websites. It’s location data from cell phones. It’s e-mails and IMs and comments posted to social networking sites. It’s tallies from digital voting machines. It’s images and meta-data from surveillance cameras. The list goes on and on. We in the security field know the risks associated with trusting digital data, but this evidence is routinely assumed by courts to be accurate…
Detego's Andy Lister on Interoperability Between Field & Lab
Cyacomb Examiner and Cyacomb Offender Manager Tools
Cyacomb's Jeffrey Bell, Brandon Gardner & Alan McConnell on the Facets of Digital Forensic Triage
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.