Recap: Techno Security And Digital Forensics Conference Myrtle Beach 2019
by Christa Miller, Forensic Focus The oldest of the trio of Techno Security and Digital Forensics Conferences, the Myrtle Beach event marked its 21st year this June 2-5. More than 900 people...
View ArticleHow To Use Cross-Case Search With Belkasoft Evidence Center
by Yuri Gubanov Diving deeper may be the key to the eventual success of a digital forensic investigation. This is true not only when it comes to a single given case, but also when it comes to...
View ArticleCase Study: Extracting And Analyzing Messenger Data With Oxygen Forensic...
by Nikola Novak It‘s a great pleasure to share my experience of working with Oxygen Forensic Detective, which was a crucial tool in solving one of my cases. A father of a minor girl contacted me,...
View ArticleFighting Crime With Data: Law Enforcement In The 21st Century
by Paul Hamrick, Nuix Executive Summary Law enforcement investigations have long been influenced by developments in technology; after all, new technologies create new ways for criminals to profit and...
View ArticleIndustry Roundup: Image Recognition And Categorization
by Christa Miller, Forensic Focus The need for image recognition and categorization has never been more in demand thanks to the spread of extremist propaganda, child sexual abuse material (CSAM), and...
View ArticleHow To Analyze Windows 10 Timeline With Belkasoft Evidence Center
Temporal analysis of events (Timeline) can be beneficial when you want to reconstruct events related to computer incidents, data breaches, or virus attacks taking place on a victim’s computer....
View ArticleTechno Security & Digital Forensics 2019 – San Antonio Sept 30 – Oct 2
From the 30th of September to the 2nd of October 2019, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in San Antonio, TX, USA. If there are any topics you’d...
View ArticleFinding And Interpreting Windows Firewall Rules
by Joakim Kävrestad Determining with whom and in what way a computer has communicated can be important and interesting in several types of examinations. Communications can be an important part of...
View ArticleUnreal Steganography: Using A VR Application As A Steganography Carrier
by Stuart Wilson This report focuses on the use of virtual reality as a potential steganography carrier file to avoid detection of forensic analysis applications commonly used within law enforcement....
View ArticleHow To Launch 18 Simultaneous Wiping Sessions And Reach 18TB/h Overall Speed...
Thanks to its ability to perform 18 simultaneous imaging sessions, TaskForce is the most capable evidence acquisition in the forensics market. Atola’s team of engineers have equipped the device with a...
View ArticleEmployee Turnover And Computer Forensic Analysis Best Practices
by Larry Lieb Organizations historically have struggled with addressing terminated employees’ important evidence sources such as company-issued laptops, oftentimes materially affecting the...
View ArticleHow To Perform Remote Acquisition Of Digital Devices With Belkasoft Evidence...
Remote acquisition of digital devices is a useful option for modern-day organizations, both commercial and government. The main reasons for this are as follows: As entities grow, their IT environments...
View ArticleCareer Paths In Digital Forensics: Practical Applications
by Christa Miller, Forensic Focus Whether you’re a college or university student trying to plot out your career, an experienced worker figuring out next steps, or a mentor seeking to help either one...
View ArticleHow To Acquire Mobile Data With MD-NEXT From HancomGMD
by Michelle Oh, HancomGMD With an ever-increasing range of features and dramatically increased storage capacity, digital devices have become essential to our daily life. Their ability to store vast...
View ArticleMaking Complex Issues Simple: A Unique Method To Extract Evidence From RAID...
by Alexander Leonenko Today we would like to talk about RAID arrays with lost configuration and how to extract evidential data from them. Let’s start with understanding what a RAID is in the first...
View ArticleHow To Use Connection Graphs By Belkasoft For Complex Cases With Multiple...
A proper connection graph is a must if you need to investigate a complex case with numerous individuals using different communication media. In law enforcement, it may be a drug-related case with...
View ArticleWalkthrough: VFC 5.0
What is Virtual Forensic Computing? Virtual computing transforms investigation of the digital crime scene. Having access to the ‘digital scene of crime’ can offer huge benefits to an investigator....
View ArticleHow To Acquire Video Data With MD-VIDEO From HancomGMD
Due to the rapidly growing need for securing safe environments around the world, digital surveillance systems have become ubiquitous. A significant number of new surveillance systems are installed each...
View ArticleSANS DFIR Summit 2019 – Recap
by Christa Miller, Forensic Focus Held in Austin, Texas each summer, the SANS Digital Forensics and Incident Response (DFIR) Summit is known for offering in-depth but accessible digital forensic...
View ArticleHow To Create Compelling Image Authentication Reports With Amped...
How many times have you said or heard: “I’ll believe it when I see it”? This expression reveals our eyes’ dramatic convincing power: when you see something, you tend to believe it’s true much more...
View Article