Digital Forensics For National Security Symposium – Alexandria, VA, December...
On the 10th and 11th of December 2019, the inaugural Digital Forensics For National Security Symposium will take place in Alexandria, VA, USA. Below is an overview of the subjects and speakers that...
View ArticleHow To Digital Forensic Boot Scan A Mac With APFS
by Rich Frawley In this short 3-minute video, ADF’s digital forensic specialist Rich Frawley shows how to boot a MacBook Air (APFS, non-encrypted) with Digital Evidence Investigator. The ADF digital...
View ArticleDigital Forensic Techniques To Investigate Password Managers
by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers can play. In part two, we look at aspects an investigation may include from a digital forensics...
View ArticleHow To Easily And Accurately Play CCTV And Other Proprietary Video With Amped...
by Blake Sawyer, Amped Software For Law Enforcement across the world, one of the biggest hindrances to actionable evidence comes from CCTV. There are sites devoted to providing codecs, of which there...
View ArticleHow To Help Small Governments To Respond To Ransomware Attacks
by Christa Miller Ransomware has captured a large share of mainstream media coverage in recent months, due in no small part to attacks that have crippled small local and county governments in the...
View ArticleHow To Use Quin-C’s Simple Review Widget
Hello and welcome everybody to this video about Quin-C. Today we will be talking about a widget called Simple Review. Simple Review is a widget which has been designed for examiners whose everyday job...
View ArticleConsiderations When Investigating Data From Password Managers
by Dr Tristan Jenkinson In part one we discussed the importance that data from password managers could play in an investigation. In part two we then looked at what aspects an investigation may include...
View ArticleHow To Extract Credential Data Using KeyScout
Hello, this is Keith Lockhart from Oxygen Training, and this video is going to discuss the KeyScout application. The KeyScout application is one of the tools available in the tool suite concept of the...
View ArticleHow To Search For Visual Data With Griffeye Analyze DI
In this video, we’re going to discuss how to use the ‘Search’ function to help you quickly locate files of interest within your case. Analyze DI allows users to search for not only text-based...
View ArticleInvestigating Nonconsensual Intimate Image Sharing
by Christa Miller, Forensic Focus Nonconsensual intimate image sharing – also known as image-based sexual abuse, nonconsensual pornography, or its original slang, “revenge porn” – has been around since...
View ArticleHow To Use Social Graph In Oxygen Forensic Detective
Hello, this is Keith Lockhart from the Oxygen Forensic training department, and this video is talking about the Social Graph inside Oxygen Forensic Detective. To fully understand the Social Graph and...
View ArticleEnfuse 2019 – Recap
by Mattia Epifani The Enfuse Conference, organized by OpenText, took place from the 11th-14th of November 2019 at the Venetian Conference Center in Las Vegas. More than 1,000 attendees from 40...
View ArticleForensic Focus Legal Update December 2019 – Part I
by Christa Miller In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus is proud to offer a...
View ArticleForensic Focus Legal Update December 2019 – Part II: Search And Seizure
by Christa Miller In cooperation with the National White Collar Crime Center (NW3C) and SEARCH, The National Consortium for Justice Information and Statistics, Forensic Focus offers a quarterly roundup...
View ArticleIndustry Roundup: Cloud Forensics
by Christa Miller Only a few short years ago, the idea of recovering forensic data from the cloud seemed like either troubling overreach, or unnecessarily redundant given the availability of evidence...
View Article