A Comprehensive Walkthrough Of Counter UAV Analysis

Unmanned aerial vehicles (UAVs), or drones, are as fraught as they are fascinating. For every hobbyist flying a drone around the neighborhood on a sunny weekend, there is a neighbor concerned with whether a system’s onboard camera is spying on … Read more

ICDF2C 2018 – Recap

This article is a recap of some of the main highlights from the ICDF2C conference 2018, which took place in New Orleans, LA, USA from the 10th-12th September.

The program began on Monday 10th September with the usual welcome registration. … Read more

Walkthrough: Oxygen Forensic Detective Latest Features

Within Oxygen, you’re able to not only connect one device, but several devices, and image them simultaneously. Oxygen’s extractor runs independently of Oxygen Detective, and that’s what allows you to run several different extractions at the same time, and there Read more

Word Forensic Analysis And Compound File Binary Format

by Arman Gungor

Microsoft Word forensic analysis is something digital forensic investigators do quite often for document authentication. Because of the great popularity of Microsoft Office, many important business documents such as contracts and memoranda are created using Word. When … Read more

Focused Digital Forensic Methodology

by Haider H. Khaleel

Abstract

Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital forensics has become an important aspect of not … Read more

Mobile Phone Forensic Challenges

Introduction

A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts.  More often it is not enough to be an experienced expert in computer forensics to understand all the peculiarities and … Read more

Firefox Cache Format and Extraction

Introduction

In the forensic lab where I work, we frequently investigate malware-infected workstations.  As our user population started shifting from Internet Explorer to Firefox, we observed that one of our favorite forensic tools, Kristinn Gudjonsson’s log2timeline, wasn’t able to provide … Read more

Collecting And Preserving Electronic Media

First published May 2005

by Joan E. Feldman, President
Computer Forensics Inc.
http://www.forensics.com

The discovery process in civil litigation has always been a critical and sometimes confusing area for attorneys. Most attorneys have wondered, at one time or another, whether … Read more

Computer Forensics – A Business Tool

First published March 2005

by Andy Fox
Director
Audax Digital Forensics
www.audaxuk.com

March 2005

Computer forensics has become an increasingly important part of IT security. A 2003 survey carried out on 201 companies by the National High Tech Crime Unit … Read more