Word Forensic Analysis And Compound File Binary Format

by Arman Gungor Microsoft Word forensic analysis is something digital forensic investigators do quite often for document authentication. Because of the great popularity of Microsoft Office, many important business documents such as contracts and memoranda are created using Word. When

Database of Software “Fingerprints” Expands to Include Computer Games

by Richard Press, NIST One of the largest software libraries in the world just grew larger. The National Software Reference Library (NSRL), which archives copies of the world’s most widely installed software titles, has expanded to include computer game software

ICDF2C 2018 – New Orleans September 10-12

From the 10th to the 12th of September 2018, Forensic Focus will be attending ICDF2C in New Orleans.Below is an overview of the subjects and speakers that will be featured at the conference. If there are any topics you’d particularly

Reducing The Mental Stress Of Investigators

by Eric Oldenburg, Griffeye  We recently met up with Eric Oldenburg, Griffeye’s new Law Enforcement Liasion in North America, and heard about his new role. Here, he explains how reducing mental stress for investigators is a driving force for him,

Using IMAP Internal Date for Forensic Email Authentication

by Arman Gungor Internal Date is an IMAP Message Attribute that indicates the internal date and time of a message on an IMAP server. This is a different timestamp than the Origination Date field found in the message header and

Apple iPhone Forensics: Significant Locations

by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting I recently attended a conference of civil litigators in Virginia. During the cocktail hour and after a very interactive CLE presentation on “Leveraging Data in Insurance Fraud Investigations”, I was talking

Digital Forensics Resources

by Scar de Courcier One of the most frequent questions I’m asked by digital forensics students is about resources: where can they go to continue learning, where can they find out more about the industry, what are the best blogs

Searching And Filtering Emails When Forensically Collecting Mailboxes

Hand-drawn contacts and emails sketch with depth of field focus
by Arman Gungor When mailboxes are forensically preserved for eDiscovery or digital forensic investigations, their contents are almost always searched and filtered. Filtering emails helps overcome time, scope and cost constraints and alleviates privacy concerns. There are two main ways

Changes To Forensic Laboratory Accreditation Requirements – ISO/IEC 17025

by Tim Alcock ISO/IEC 17025:2017 – General requirements for the competence of testing and calibration laboratories is the principal international standard for the accreditation of laboratories performing testing (including sampling) and/or calibration. Originating from ISO/IEC Guide 25, the standard has

2018 Nuix Insider Conference Recap

by Jessica Lyford Close to 300 customers, partners, and guests converged at the Royal Lancaster London for Nuix’s annual Insider Conference last week to share their experience using Nuix or to learn something new to address their data, cybersecurity, risk,

Jailbreaking iOS 11 And All Versions Of iOS 10

by Oleg Afonin, Mobile Product Specialist at ElcomSoft Jailbreaking iOS is becoming increasingly difficult, especially considering the amounts of money Apple and independent bug hunters are paying for discovered vulnerabilities that could lead to a working exploit. Late last year,

Forensic Analysis of Damaged SQLite Databases

by Oleg Skulkin & Igor Mikhaylov SQLite databases are very common sources of forensic artifacts nowadays. A lot of mobile applications store data in such databases: you can also find them on desktop computers and laptops as well as, for

Forensic Acquisition Of Solid State Drives With Open Source Tools

by Josué Ferreira Abstract From a judicial perspective, the integrity of volatile storage devices has always been a reason for great concern and therefore, it is important for a method to forensically acquire data from Solid State Drives (SSD) to