Christa: Digital video is everywhere, but the complexities and challenges of using it as evidence in legal proceedings continue to advance. This week, Simon Biles and I talk to Martino Jerian, Founder and CEO of Amped Software. This is … Read more
authentication
How To Do Context Analysis of Digital Images in Amped Authenticate
By Marco Fontani, Forensics Director at Amped Software
For several years, researchers and people in the field of image and video processing have been saying that “seeing is no longer believing”. Image and video manipulation techniques have become powerful and … Read more
Mobile Device Biometrics – What They Are and How They Work
This article originally appeared at https://www.grayshift.com/mobile-device-biometrics-what-they-are-and-how-they-work/
Using biometrics is the process of measuring and analyzing biological data to identify an individual. Mobile devices with biometric-enabled features are used for many purposes, one of which is authentication. This authentication method provides … Read more
The Future Of ENF Systems
by James Zjalic
The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of manipulators, liars and charlatans. Authentication is frequently … Read more
A Method For Verifying Integrity And Authenticating Digital Media
by Martin Harran, William Farrelly & Kevin Curran
Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on this has focused on steganographic ways of hiding … Read more
Investigating and Prosecuting Cyber Crime: Forensic Dependencies and Barriers to Justice
Abstract
The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime. In perusing these avenues of inquiry, the author seeks to identify systemic impediments which obstruct police investigations, … Read more
From iPhone to Access Point
Introduction
A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has also increased drastically to serve the Wi-Fi … Read more
Key Twitter and Facebook Metadata Fields Forensic Investigators Need to be Aware of
Authentication of social media evidence can present significant challenges when you collect by screen shots, printouts or raw html feeds from an archive tool. This is just one reason why social media data must be properly collected, preserved, searched and … Read more