Hosted by the Korean Institute of Information Security and Cryptology (KIISC), the Digital Forensics Challenge 2022 (DFC 2022) aims to expand our knowledge of digital forensics and to contribute to this field. Now in its fifth year, the challenge plays … Read more
forensic methodology
Lessons Learned In Digital Forensics Standardization: United Kingdom
Should digital forensics be standardized? Can it be standardized successfully? These questions have been hotly debated for a number of years, perhaps never more so than in recent years as digital forensics has become increasingly important in both criminal and … Read more
A Comprehensive Walkthrough Of Counter UAV Analysis
Unmanned aerial vehicles (UAVs), or drones, are as fraught as they are fascinating. For every hobbyist flying a drone around the neighborhood on a sunny weekend, there is a neighbor concerned with whether a system’s onboard camera is spying on … Read more
Recap: Techno Security And Digital Forensics Conference Myrtle Beach 2019
by Christa Miller, Forensic Focus
The oldest of the trio of Techno Security and Digital Forensics Conferences, the Myrtle Beach event marked its 21st year this June 2-5. More than 900 people representing the Americas, Europe, Asia, and Africa converged … Read more
ICDF2C 2018 – Recap
This article is a recap of some of the main highlights from the ICDF2C conference 2018, which took place in New Orleans, LA, USA from the 10th-12th September.
The program began on Monday 10th September with the usual welcome registration. … Read more
Walkthrough: Oxygen Forensic Detective Latest Features
Within Oxygen, you’re able to not only connect one device, but several devices, and image them simultaneously. Oxygen’s extractor runs independently of Oxygen Detective, and that’s what allows you to run several different extractions at the same time, and there … Read more
Word Forensic Analysis And Compound File Binary Format
by Arman Gungor
Microsoft Word forensic analysis is something digital forensic investigators do quite often for document authentication. Because of the great popularity of Microsoft Office, many important business documents such as contracts and memoranda are created using Word. When … Read more
Focused Digital Forensic Methodology
by Haider H. Khaleel
Abstract
Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital forensics has become an important aspect of not … Read more
Windows 8: Important Considerations for Computer Forensics and Electronic Discovery
Introduction
Documents identified by computer forensic investigations in civil litigation typically require review and analysis by attorneys to determine if the uncovered evidence could support causes of action such as breach of contract, breach of fiduciary duty, misappropriation of trade … Read more
Retrieving Digital Evidence: Methods, Techniques and Issues
by Yuri Gubanov [email protected]
Belkasoft Ltd. http://belkasoft.com
Abstract
This article describes the various types of digital forensic evidence available on users’ PC and laptop computers, and discusses methods of retrieving such evidence.
Download article in PDF format
Introduction
A recent … Read more
Mobile Phone Forensic Challenges
Introduction
A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts. More often it is not enough to be an experienced expert in computer forensics to understand all the peculiarities and … Read more
Firefox Cache Format and Extraction
Introduction
In the forensic lab where I work, we frequently investigate malware-infected workstations. As our user population started shifting from Internet Explorer to Firefox, we observed that one of our favorite forensic tools, Kristinn Gudjonsson’s log2timeline, wasn’t able to provide … Read more
Forensic Imaging of Hard Disk Drives- What we thought we knew
By Todd G. Shipley and Bryan Door
(A complete copy of this white paper and its figures and diagrams can be found at www.nfdrtc.net).
WHAT WE HAVE BEEN TAUGHT
Imaging of hard drives has been the main stay of … Read more
The Enhanced Digital Investigation Process Model
First published September 2005
Venansius Baryamureeba and Florence Tushabe
[email protected], [email protected]
Institute of Computer Science, Makerere University
P.O.Box 7062, Kampala Uganda
www.makerere.ac.ug/ics
May 27, 2004
Abstract
Computer crimes are on the rise and unfortunately less than two percent of the … Read more
Collecting And Preserving Electronic Media
First published May 2005
by Joan E. Feldman, President
Computer Forensics Inc.
http://www.forensics.com
The discovery process in civil litigation has always been a critical and sometimes confusing area for attorneys. Most attorneys have wondered, at one time or another, whether … Read more
Computer Forensics – A Business Tool
First published March 2005
by Andy Fox
Director
Audax Digital Forensics
www.audaxuk.com
March 2005
Computer forensics has become an increasingly important part of IT security. A 2003 survey carried out on 201 companies by the National High Tech Crime Unit … Read more