A Survey On Data Carving In Digital Forensics
by Nadeem Alherbawi*, Zarina Shukur & Rossilawati Sulaiman; Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia Abstract Data carving is a very important topic in digital...
View ArticleHow Do Criminals Communicate Online?
Flashpoint, a business intelligence agency specialising in the deep and dark web, recently published a report on the economy of criminal networks online. The report looks not only at where criminals go...
View ArticleEnfuse 2017 – Las Vegas 22-25 May
From the 22nd to the 25th of May 2017, Forensic Focus will be attending Enfuse (formerly known as CEIC) in Las Vegas, Nevada, USA. If there are any topics you’d particularly like us to cover, or any...
View ArticleInternet Of Things Mobility Forensics
by K M Sabidur Rahman & Matt Bishop (University of California Davis) and Albert Holt (NSA) Abstract The Internet of Things (IoT) comes with great possibilities as well as major security and privacy...
View ArticleClassifying Illegal Activities On Tor Network Based On Web Textual Contents
by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity...
View ArticleEnfuse 2017 – Recap
by Mattia Epifani, Forensic Focus The Enfuse Conference, organized by Guidance Software, took place between 21st and 24th May at Caesar Palace Conference Center in Las Vegas. More than 1,500 attendees...
View ArticleChallenges Of ISO 17025 Accreditation – Survey Results
A group of forensic practitioners has recently conducted a survey into the ISO 17025 scheme – its effectiveness, and its relevance for digital forensics. The survey was conducted using Google Forms and...
View ArticleAn Introduction To Theft Of Trade Secrets Investigations
by Laurence D. Lieb, Managing Director, HaystackID. The subjects we will be covering include: Defining When One Should Reasonably Panic Reasonable Triage Steps to Take in Order to Identify if There is...
View ArticleA Method For Verifying Integrity And Authenticating Digital Media
by Martin Harran, William Farrelly & Kevin Curran Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on...
View ArticleRemote Forensics Of Windows 10 Mobile Devices
by Oleg Afonin, Elcomsoft Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a...
View ArticleRAM Forensic Analysis
by Eliézer Pereira 1 Goal The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify...
View ArticleAn Introduction To Challenges In Digital Forensics
by W.Chirath De Alwis Digital forensics is a technique in the identification of computer based crimes. But digital forensics faces a few major challenges when it comes to conducting investigations....
View ArticleThe Future Of ENF Systems
by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of...
View ArticleTechno Security 2017 – San Antonio September 18th-20th
From the 18th to the 20th of September, the Techno Security & Digital Forensics Conference will be taking place in San Antonio, Texas, USA. If there are any topics you’d particularly like to see...
View ArticleDigital Forensics as a Big Data Challenge
by Alessandro Guarino, StudioAG Abstract Digital Forensics, as a science and part of the forensic sciences, is facing new challenges that may well render established models and practices obsolete. The...
View ArticlePhysical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0
by Oleg Skulkin & Igor Shorokhov The release of Android Nougat has brought new challenges to mobile forensic examiners: the smartphones running this version most likely have encrypted partitions...
View ArticleWhen No Conclusion Can Be A Conclusion
by James Zjalic Before CCTV systems were conceived, eye-witness accounts were the only method of identifying a suspect based on their facial features. The pitfalls of this type of identification have...
View ArticleCellular GPS Evidence: Waze + Cellebrite + CellHawk
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of...
View ArticleNew Security Measures In iOS 11 And Their Forensic Implications
by Oleg Afonin, Elcomsoft Apple is about to launch its next-generation iOS in just a few days. Researching developer betas, we discovered that iOS 11 implements a number of new security measures. The...
View ArticleDigital Forensics: Iron Bars, Cement And Superglue
by James Zjalic When most people think of digital forensics they think of CSI Miami: hackers in hoodies and Mission Impossible type biometrics. But under the superficial exterior, there is a framework...
View Article