How To Acquire Data From A Mac Using MacQuisition
Depending on the digital forensic imaging tool you have available, creating a forensic image of a Mac computer can be either an anxiety-creating situation, or as easy as “1-2-3-START”. There are...
View ArticleFour Critical Success Factors In Mobile Forensics
by Mike Dickinson, Deputy Executive Officer at MSAB The purpose of this paper is to encourage mobile forensic practitioners to consider a wider number of critical factors surrounding their choice and...
View ArticleHow To Use Text Analytics With Rosoka Integration
Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to explore the text analytics capabilities built into ADF’s digital forensic software with the...
View ArticleHow To Integrate AD Enterprise And The CyberSponse Platform Using The...
Joe: What you’re looking at right now is the CyberSponse platform itself. As an incident responder, you’re going to spend most of your life either in the Alerts, or Violations, or Incidents page. In...
View ArticleCrime Scene Investigation of GPS Data in Unmanned Aerial Vehicles (UAVs)
by Chirath De Alwis The invention of the Unmanned Aerial Vehicle (UAV), also known as the drone, has the potential to address some crucial issues in society. Commercial aerial surveillance,...
View ArticleWhat Changes Do We Need To See In eDiscovery? Part I
by Harold Burt-Gerrans I’m approaching this multi-part article from a software development point of view, as I believe many of the following issues have been brought about by the evolution of...
View ArticleThe Mueller Report – An Amazing Lens Into A Modern Federal Investigation
by Stephen Stewart, CTO, Nuix Preface: This NOT about politics. This is all about the data discussed in Volume 1 of The Mueller Report. I will admit, I am a total geek. When the government released the...
View ArticleWalkthrough: Talon Ultimate From Logicube
Welcome to Logicube’s tutorial on the Talon Ultimate. Featuring Logicube’s advanced technology, the Talon Ultimate provides high-performance forensic imaging at a price point that fits...
View ArticleWhat Changes Do We Need To See In eDiscovery? Part II
by Harold Burt-Gerrans Let’s continue from where we left off last time, discussing standardization. If you missed it, Part 1 was all about establishing standards. Now a bit about following standards....
View ArticleThe Mueller Report Part 2 – What It Feels Like To Be Targeted By A Nation State
by Stephen Stewart, CTO, Nuix Preface: This still isn’t about politics. It’s all about the data discussed in Part 1 of this blog series. In Volume 1 Section III. Russian Hacking and Dumping Operations,...
View ArticleHow To Boot Scan A Mac With APFS And FileVault 2
Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to conduct a boot scan of a MacBook Air that has APFS and FileVault 2 enabled. At this point you...
View ArticleCrimes Against Children Conference 2019 Recap Part I: Technology
by Christa Miller, Forensic Focus Celebrating its 31st year, the Crimes Against Children Conference ran from 12-15 July 2019 in Dallas, Texas. The conference kicked off with opening remarks by Lynn M....
View ArticleWhat Changes Do We Need To See In eDiscovery? Part III
by Harold Burt-Gerrans Duplicative Documents At the end of Part 2, I put forth an argument that de-duplication should always be done globally to bring the data set down to just unique documents. And...
View ArticleThe Mueller Report Part 3 – Human-Generated Data At The Heart Of Investigations
by Stephen Stewart, CTO, Nuix Preface: This article is all about the data discussed in Part 1 of this blog series. No political statements are being made. The Mueller Report is a great window into the...
View ArticleCrimes Against Children Conference 2019 Recap Part II: Digital Evidence On...
By Christa Miller, Forensic Focus Our first article in this two-part series focused on the technology associated with crimes against children: mobile peer-to-peer software; cryptocurrency used to buy...
View ArticleUses Of Unmanned Aerial Vehicles (UAVs) In Crime Scene Investigations
by Chirath De Alwis and Chamalka De Silva Recent advancements in technology have helped many people to have a better quality of life. Unmanned Aerial Vehicles (UAVs), also known as ‘drones’, are one...
View ArticleWhat Changes Do We Need To See In eDiscovery? Part IV
by Harold Burt-Gerrans In Part 3, I introduced the concept of consolidating duplicates by tracking Metadata at a DocID level and coding and/or document actions at a Document Level. For ease, I’m...
View ArticleHow To Collect And Share Digital Evidence Files With Prosecutors
In this short How To video, digital forensic specialist Rich Frawley will show you how to collect and share digital evidence files with prosecutors and third parties using ADF Software. This video is...
View ArticleHow To Use Amped DVRConv To Quickly Convert And Make Playable Proprietary...
by Blake Sawyer, Amped Software When I worked for the police department, I was constantly pulled in a lot of different directions. To keep a good turnaround time for the nearly 200 requests we had each...
View ArticleWhat Changes Do We Need To See In eDiscovery? Part V
by Harold Burt-Gerrans Welcome to Part 5. As promised in Part 4, I’ll start by discussing recursive de-duplication. Recursive De-Duplication: Using Aliases Within De-Duplication I can’t count the...
View Article