archives

Scar de Courcier

Scar de Courcier is Senior Editor at Forensic Focus.
Scar de Courcier has written 228 posts for Forensic Focus – Articles

How To Analyze Call Data Records In Oxygen Forensic Detective

Hi, this is Amanda Mangan with Oxygen Forensics. In this video, we’re going to go over Oxygen Forensics’ Call Data Expert. The first thing we’ll discuss is, what exactly is a CDR? A CDR is a call data record, and we’ll talk about the different carriers and the different information that may come with each … Continue reading

Forensic Focus Legal Update December 2019 – Part II: Search And Seizure

by Christa Miller In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus offers a quarterly roundup of the latest legal developments around digital forensic evidence. Comprising major legislation and case law from around the country, this guide is intended to help our … Continue reading

How To Parse AirDrop Artifacts In Magnet AXIOM

Hey everyone, Trey Amick from Magnet Forensics here. Today we’re going to be looking at a new set of artifacts specific to Mac investigations, which will be released as part of the AXIOM 3.8 release. Today we’re going to be looking at dedicated AirDrop artifacts that AXIOM can now parse out. AirDrop is a service … Continue reading

Forensic Focus Legal Update December 2019 – Part I

by Christa Miller  In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus is proud to offer a quarterly roundup of the latest legal developments around digital forensic evidence. Comprising major legislation and case law from around the country, this guide is intended to … Continue reading

Enfuse 2019 – Recap

by Mattia Epifani The Enfuse Conference, organized by OpenText, took place from the 11th-14th of November 2019 at the Venetian Conference Center in Las Vegas. More than 1,000 attendees from 40 countries were present, coming from different fields like digital forensics, e-discovery, incident response and cybersecurity. Most of the attendees were from the US and … Continue reading

How To Use Social Graph In Oxygen Forensic Detective

Hello, this is Keith Lockhart from the Oxygen Forensic training department, and this video is talking about the Social Graph inside Oxygen Forensic Detective. To fully understand the Social Graph and the things it can do for you, you kind of have to understand several other facets of your data and how that data is … Continue reading

Investigating Nonconsensual Intimate Image Sharing

by Christa Miller, Forensic Focus Nonconsensual intimate image sharing – also known as image-based sexual abuse, nonconsensual pornography, or its original slang, “revenge porn” – has been around since at least the 1980s, but didn’t become a widespread social problem until the internet – and mobile phones – became ubiquitous. So called because its perpetrators … Continue reading

How To Search For Visual Data With Griffeye Analyze DI

In this video, we’re going to discuss how to use the ‘Search’ function to help you quickly locate files of interest within your case. Analyze DI allows users to search for not only text-based information, but also visual clues as well. Adding visual clues into your workflows can really improve efficiency and help you get … Continue reading

How To Extract Credential Data Using KeyScout

Hello, this is Keith Lockhart from Oxygen Training, and this video is going to discuss the KeyScout application. The KeyScout application is one of the tools available in the tool suite concept of the Forensic Detective product. KeyScout is a standalone application that can be run locally or on the go, we’ll look at use … Continue reading

Walkthrough: VFC From MD5

VFC was first launched to the forensic community in 2007. It makes it easy to create a virtual machine (VM) replica of a target system, enabling an investigator to recreate and interact with the “digital crime scene”.  Using accepted forensic practices, VFC interrogates the target drive to gather relevant system information, so that it can … Continue reading

Considerations When Investigating Data From Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We now discuss some of the potential issues that can arise in such investigations and some … Continue reading

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches or keyword searches; perform tagging, bookmarking, viewing, labelling and exporting data. So if you are … Continue reading

How To Help Small Governments To Respond To Ransomware Attacks

by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular affected 23 Texas communities in July, and a new interactive map from StateScoop shows all … Continue reading

How To Easily And Accurately Play CCTV And Other Proprietary Video With Amped Replay

by Blake Sawyer, Amped Software For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most of their time managing the many players from each DVR manufacturer. In my old casework, … Continue reading

Digital Forensic Techniques To Investigate Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics perspective. How Password Managers Can Be Investigated Using Digital Forensics Evidence of Usage of Password Management Systems Finding evidence that a password … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,286 other followers