archives

Scar de Courcier

Scar de Courcier is Senior Editor at Forensic Focus.
Scar de Courcier has written 199 posts for Forensic Focus – Articles

How To Save Time With XAMN’s Dynamic Artifact Count Feature

At MSAB, we’re always looking to improve our software and make every product more user-friendly, intuitive, and valuable; and to help save you time. We’ve recently improved the way that XAMN displays and counts artifacts. Let’s take a look at the new functionality. We’ve opened this case in XAMN, and from the start we can … Continue reading

How To Integrate LACE Carver With Griffeye Analyze DI Pro

Let’s talk about the exciting new LACE Carver integration with Analyze DI Pro. Once you have the proper license, you can head over to your Downloads page on MyGriffeye.com and go to the LACE Carver download. Once the app package has been downloaded, we can go back to Griffeye and install it under Settings –> … Continue reading

How To Use AXIOM In Malware Investigations: Part II

Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little insight into how AXIOM can help with some of your day-to-day investigations. In this video we’re going to talk a little bit about malware investigations. There is a Part I to this segment, in which I focus on reviewing memory … Continue reading

How To Boot Scan A Microsoft Surface Pro

Hi, I’m Rich Frawley, and I’m the Digital Forensic Specialist with ADF Solutions. Today we’re going to conduct a boot scan of a Microsoft Surface Pro with BitLocker activated. At this point you have decided on a search profile, or search profiles, to use and prepared your collection key. When conducting a boot scan, Digital … Continue reading

What Changes Do We Need To See In eDiscovery? Part VI

by Harold Burt-Gerrans Welcome to Part 6, the last in this series. In case you’re joining late, the previous parts are available as follows: Standards Standards and De-Duplication Levels New Approach to Managing Duplicative Documents Family Level Coding Recursive De-Duplication and Time Zones With salutations to Monty Python: “And now for something completely different…” Languages Several … Continue reading

How To Use AXIOM In Malware Investigations: Part I

Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little bit of insight into how AXIOM can help with some of your day-to-day investigations. In part one of the segment we’re going to talk a little bit about malware investigations, in particular reviewing memory as part of AXIOM. Regardless of … Continue reading

How To Export Media Files From BlackLight Into Semantics21

So before we go to export our files from BlackLight to S21, what we will normally do is we will run the hashes against our case. In this case what we’ve done is we’ve already run these hashes against BlackLight, and as you can see, S21 has been run and it’s showing complete. These are … Continue reading

Cost-Effective Tools For Small Mobile Forensic Labs

by Alex Moeller As the costs associated with running a mobile devices forensic laboratory can be considered to be high, this article is aimed at providing alternative options for small organisations or individuals looking to reduce overheads.  Case Management Tools There are numerous case management systems available online which are free to download, and premium … Continue reading

Walkthrough: What’s New In XAMN v4.4

Hello and welcome to this video about what’s new in XAMN 4.4. I’m going to take you through ten new improvements, as you can see listed here in the latest release of the XAMN application. Let’s get straight on to the product so we keep this video as short as possible for you. This is the … Continue reading

What Changes Do We Need To See In eDiscovery? Part V

by Harold Burt-Gerrans Welcome to Part 5. As promised in Part 4, I’ll start by discussing recursive de-duplication. Recursive De-Duplication: Using Aliases Within De-Duplication I can’t count the number of times that clients have complained about x.400/x.500 addresses in emails. Unfortunately, if the collected data comes with those address structures and not fred@xyz.com, we’re stuck with … Continue reading

How To Use Amped DVRConv To Quickly Convert And Make Playable Proprietary CCTV Video

by Blake Sawyer, Amped Software When I worked for the police department, I was constantly pulled in a lot of different directions. To keep a good turnaround time for the nearly 200 requests we had each month, I was constantly looking for tools to automate or ease the load. Amped FIVE was a great resource … Continue reading

How To Collect And Share Digital Evidence Files With Prosecutors

In this short How To video, digital forensic specialist Rich Frawley will show you how to collect and share digital evidence files with prosecutors and third parties using ADF Software. This video is ideal for learning how to share evidence with prosecutors for review. If you are tasked with the collecting specific files or collecting … Continue reading

What Changes Do We Need To See In eDiscovery? Part IV

by Harold Burt-Gerrans In Part 3, I introduced the concept of consolidating duplicates by tracking Metadata at a DocID level and coding and/or document actions at a Document Level. For ease, I’m duplicating part of the example charts here as I will refer back to them to illustrate some of the following discussion. Sample Current Data … Continue reading

Uses Of Unmanned Aerial Vehicles (UAVs) In Crime Scene Investigations

by Chirath De Alwis and Chamalka De Silva Recent advancements in technology have helped many people to have a better quality of life. Unmanned Aerial Vehicles (UAVs), also known as ‘drones’, are one such technological advancement that can help society to simplify day-to-day activities. These drones are now widely used in many industries such as … Continue reading

Crimes Against Children Conference 2019 Recap Part II: Digital Evidence On Multidisciplinary Teams

By Christa Miller, Forensic Focus Our first article in this two-part series focused on the technology associated with crimes against children: mobile peer-to-peer software; cryptocurrency used to buy and sell child sexual abuse material (CSAM); the virtual worlds where abuse might take place; and how technology can help reduce investigators’ vicarious trauma. In Part II, … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,271 other followers