archives

Digital Forensics

This tag is associated with 194 posts

Forensic Focus Legal Update December 2019 – Part II: Search And Seizure

by Christa Miller In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus offers a quarterly roundup of the latest legal developments around digital forensic evidence. Comprising major legislation and case law from around the country, this guide is intended to help our … Continue reading

Forensic Focus Legal Update December 2019 – Part I

by Christa Miller  In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus is proud to offer a quarterly roundup of the latest legal developments around digital forensic evidence. Comprising major legislation and case law from around the country, this guide is intended to … Continue reading

Enfuse 2019 – Recap

by Mattia Epifani The Enfuse Conference, organized by OpenText, took place from the 11th-14th of November 2019 at the Venetian Conference Center in Las Vegas. More than 1,000 attendees from 40 countries were present, coming from different fields like digital forensics, e-discovery, incident response and cybersecurity. Most of the attendees were from the US and … Continue reading

How To Use Social Graph In Oxygen Forensic Detective

Hello, this is Keith Lockhart from the Oxygen Forensic training department, and this video is talking about the Social Graph inside Oxygen Forensic Detective. To fully understand the Social Graph and the things it can do for you, you kind of have to understand several other facets of your data and how that data is … Continue reading

Investigating Nonconsensual Intimate Image Sharing

by Christa Miller, Forensic Focus Nonconsensual intimate image sharing – also known as image-based sexual abuse, nonconsensual pornography, or its original slang, “revenge porn” – has been around since at least the 1980s, but didn’t become a widespread social problem until the internet – and mobile phones – became ubiquitous. So called because its perpetrators … Continue reading

How To Search For Visual Data With Griffeye Analyze DI

In this video, we’re going to discuss how to use the ‘Search’ function to help you quickly locate files of interest within your case. Analyze DI allows users to search for not only text-based information, but also visual clues as well. Adding visual clues into your workflows can really improve efficiency and help you get … Continue reading

How To Extract Credential Data Using KeyScout

Hello, this is Keith Lockhart from Oxygen Training, and this video is going to discuss the KeyScout application. The KeyScout application is one of the tools available in the tool suite concept of the Forensic Detective product. KeyScout is a standalone application that can be run locally or on the go, we’ll look at use … Continue reading

Considerations When Investigating Data From Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include from a digital forensics perspective. We now discuss some of the potential issues that can arise in such investigations and some … Continue reading

How To Use Quin-C’s Simple Review Widget

Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job is to run the index searches or keyword searches; perform tagging, bookmarking, viewing, labelling and exporting data. So if you are … Continue reading

How To Help Small Governments To Respond To Ransomware Attacks

by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the United States. One coordinated attack in particular affected 23 Texas communities in July, and a new interactive map from StateScoop shows all … Continue reading

How To Easily And Accurately Play CCTV And Other Proprietary Video With Amped Replay

by Blake Sawyer, Amped Software For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there are hundreds, and IT departments that spend most of their time managing the many players from each DVR manufacturer. In my old casework, … Continue reading

Digital Forensic Techniques To Investigate Password Managers

by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics perspective. How Password Managers Can Be Investigated Using Digital Forensics Evidence of Usage of Password Management Systems Finding evidence that a password … Continue reading

How To Digital Forensic Boot Scan A Mac With APFS

by Rich Frawley  In this short 3-minute video, ADF’s digital forensic specialist Rich Frawley shows how to boot a MacBook Air (APFS, non-encrypted) with Digital Evidence Investigator. The ADF digital forensic team is hard at work putting the finishing touches on the complete package: Enabling FileVault support at boot Allowing the input of credentials, much like … Continue reading

Digital Forensics For National Security Symposium – Alexandria, VA, December 10th-11th

On the 10th and 11th of December 2019, the inaugural Digital Forensics For National Security Symposium will take place in Alexandria, VA, USA. Below is an overview of the subjects and speakers that will be featured at the event. Tuesday December 10th Registration will be open from 8:00-8:45am, after which Retired Special Agent Jim Christy … Continue reading

The Potential Importance Of Information From Password Managers

by Dr Tristan Jenkinson There have recently been a number of articles discussing the use of common passwords and encouraging better password practices. Most guidance includes the recommendation not to use the same password for different accounts. This makes sense – it limits risk of further exposure in the event that one set of details … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,286 other followers