archives

computer forensics

This tag is associated with 98 posts

What Changes Do We Need To See In eDiscovery? Part III

by Harold Burt-Gerrans Duplicative Documents At the end of Part 2, I put forth an argument that de-duplication should always be done globally to bring the data set down to just unique documents. And now that you’re convinced (or should have been) that Global De-Duplication is the only way to go, I’m going to completely blow … Continue reading

Crimes Against Children Conference 2019 Recap Part I: Technology

by Christa Miller, Forensic Focus  Celebrating its 31st year, the Crimes Against Children Conference ran from 12-15 July 2019 in Dallas, Texas. The conference kicked off with opening remarks by Lynn M. Davis, President and Chief Executive Officer of the Dallas Children’s Advocacy Center (DCAC), who focused on the DCAC’s new “Save Jane” initiative. Updated … Continue reading

How To Boot Scan A Mac With APFS And FileVault 2

Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to conduct a boot scan of a MacBook Air that has APFS and FileVault 2 enabled. At this point you have decided on a search profile or profiles to use and and prepared your collection key. When conducting … Continue reading

The Mueller Report Part 2 – What It Feels Like To Be Targeted By A Nation State

by Stephen Stewart, CTO, Nuix Preface: This still isn’t about politics. It’s all about the data discussed in Part 1 of this blog series. In Volume 1 Section III. Russian Hacking and Dumping Operations, the Mueller Report provides frightening detail about what it means to be targeted by a Nation State. The prevailing sentiment is that … Continue reading

What Changes Do We Need To See In eDiscovery? Part II

by Harold Burt-Gerrans Let’s continue from where we left off last time, discussing standardization. If you missed it, Part 1 was all about establishing standards. Now a bit about following standards. This will sound funny to those who know what a rebel I tend to be! Watch out, I’m about to rant… Following Standards When there … Continue reading

Walkthrough: Talon Ultimate From Logicube

Welcome to Logicube’s tutorial on the Talon Ultimate. Featuring Logicube’s advanced technology, the Talon Ultimate provides high-performance forensic imaging at a price point that fits budget-constrained organisations without sacrificing state-of-the-art features and benefits. The Talon Ultimate achieves speeds of up to 40GB / minute. The solution images and verifies concurrently to reduce the overall processing … Continue reading

The Mueller Report – An Amazing Lens Into A Modern Federal Investigation

by Stephen Stewart, CTO, Nuix Preface: This NOT about politics. This is all about the data discussed in Volume 1 of The Mueller Report. I will admit, I am a total geek. When the government released the Mueller Report, I downloaded the PDF and, within a few minutes, ran it through Nuix. For anyone who … Continue reading

How To Integrate AD Enterprise And The CyberSponse Platform Using The AccessData API

AccessData is the first forensics company to offer a full-featured API that can integrate across the entire forensics and e-discovery portfolio, dramatically speeding up investigations and reducing the risk and expense of passing data between platforms. AccessData recently teamed up with CyberSponse, a leader in automated incident response playbooks, to demonstrate how the API would … Continue reading

How To Use Text Analytics With Rosoka Integration

Hi, I’m Rich Frawley and I’m the Digital Forensic Specialist with ADF Solutions. Today we are going to explore the text analytics capabilities built into ADF’s digital forensic software with the integration of Rosoka.  Rosoka brings the power of automated energy extraction and language identification with gisting directly into ADF through a tightly integrated user … Continue reading

Four Critical Success Factors In Mobile Forensics

by Mike Dickinson, Deputy Executive Officer at MSAB The purpose of this paper is to encourage mobile forensic practitioners to consider a wider number of critical factors surrounding their choice and use of mobile forensic tools. Specifically, the quality of decoding, training of users and ultimately the preservation of digital as evidence in court proceedings. … Continue reading

How To Acquire Data From A Mac Using MacQuisition

Written by: Justin Matsuhara, Solutions Engineer, BlackBag Technologies Stephanie Thompson, Solutions Engineer, BlackBag Technologies Depending on the digital forensic imaging tool you have available, creating a forensic image of a Mac computer can be either an anxiety-creating situation, or as easy as “1-2-3-START”.  There are several things you must identify ahead of attempting a full … Continue reading

How To Create Compelling Image Authentication Reports With Amped Authenticate’s New Projects Feature

How many times have you said or heard: “I’ll believe it when I see it”? This expression reveals our eyes’ dramatic convincing power: when you see something, you tend to believe it’s true much more easily than when you hear or read about it. In the digital age, for most people, this convincing power seamlessly … Continue reading

SANS DFIR Summit 2019 – Recap

by Christa Miller, Forensic Focus Held in Austin, Texas each summer, the SANS Digital Forensics and Incident Response (DFIR) Summit is known for offering in-depth but accessible digital forensic research — and for its laid-back, fun atmosphere. This year’s summit, which ran from Thursday, July 25 through Friday, July 26, delivered a balanced menu of tool-oriented … Continue reading

How To Acquire Video Data With MD-VIDEO From HancomGMD

Due to the rapidly growing need for securing safe environments around the world, digital surveillance systems have become ubiquitous. A significant number of new surveillance systems are installed each year, and the importance of acquiring actionable data from these systems is growing across the globe.  According to a recent statistic, the amount of surveillance video … Continue reading

Walkthrough: How VFC 5 Can Exploit Windows Live ID (Inc PIN)

What is Virtual Forensic Computing? Virtual computing transforms investigation of the digital crime scene. Having access to the ‘digital scene of crime’ can offer huge benefits to an investigator. Whether investigating fraud, murder, child abuse or something else, seeing the computer through the eyes of the suspect can be invaluable. Building a virtual machine (VM) … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,262 other followers