Internet Of Things Mobility Forensics
by K M Sabidur Rahman & Matt Bishop (University of California Davis) and Albert Holt (NSA) Abstract The Internet of Things (IoT) comes with great possibilities as well as major security and privacy...
View ArticleClassifying Illegal Activities On Tor Network Based On Web Textual Contents
by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity...
View ArticleEnfuse 2017 – Recap
by Mattia Epifani, Forensic Focus The Enfuse Conference, organized by Guidance Software, took place between 21st and 24th May at Caesar Palace Conference Center in Las Vegas. More than 1,500 attendees...
View ArticleChallenges Of ISO 17025 Accreditation – Survey Results
A group of forensic practitioners has recently conducted a survey into the ISO 17025 scheme – its effectiveness, and its relevance for digital forensics. The survey was conducted using Google Forms and...
View ArticleAn Introduction To Theft Of Trade Secrets Investigations
by Larry Lieb, Managing Director, HaystackID. The subjects we will be covering include: Defining When One Should Reasonably Panic Reasonable Triage Steps to Take in Order to Identify if There is Only...
View ArticleRemote Forensics Of Windows 10 Mobile Devices
by Oleg Afonin, Elcomsoft Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a...
View ArticleRAM Forensic Analysis
by Eliézer Pereira 1 Goal The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify...
View ArticleAn Introduction To Challenges In Digital Forensics
by W.Chirath De Alwis Digital forensics is a technique in the identification of computer based crimes. But digital forensics faces a few major challenges when it comes to conducting investigations....
View ArticleThe Future Of ENF Systems
by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of...
View ArticleTechno Security 2017 – San Antonio September 18th-20th
From the 18th to the 20th of September, the Techno Security & Digital Forensics Conference will be taking place in San Antonio, Texas, USA. If there are any topics you’d particularly like to see...
View ArticlePhysical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0
by Oleg Skulkin & Igor Shorokhov The release of Android Nougat has brought new challenges to mobile forensic examiners: the smartphones running this version most likely have encrypted partitions...
View ArticleWhen No Conclusion Can Be A Conclusion
by James Zjalic Before CCTV systems were conceived, eye-witness accounts were the only method of identifying a suspect based on their facial features. The pitfalls of this type of identification have...
View ArticleCellular GPS Evidence: Waze + Cellebrite + CellHawk
by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of...
View ArticleDigital Forensics: Iron Bars, Cement And Superglue
by James Zjalic When most people think of digital forensics they think of CSI Miami: hackers in hoodies and Mission Impossible type biometrics. But under the superficial exterior, there is a framework...
View ArticleImm2Virtual: A Windows GUI To Virtualize Directly From Disk Image File
by Nanni Bassetti Sometimes during a computer forensic investigation, we need to virtualize our image disk, because it could be useful for checking or finding something of interest. If we need to...
View ArticleFocused Digital Forensic Methodology
by Haider H. Khaleel Abstract Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital...
View ArticleLinux Memory Forensics: Dissecting the User Space Process Heap
by Frank Block and Andreas Dewald Abstract The analysis of memory during a forensic investigation is often an important step to reconstruct events. While prior work in this field has mostly...
View ArticleWindows Drive Acquisition
by Oleg Skulkin & Scar de Courcier Before you can begin analysing evidence from a source, it first of all needs to be imaged. This describes a forensic process in which an exact copy of a drive is...
View ArticleThe CSI Effect – Expectations Vs Limitations
by James Zjalic Much has been written about the CSI phenomenon within digital forensics circles, but is there a way we as experts can reduce this effect, maybe not globally but at least amongst our own...
View ArticleImaging Locked Motorola Devices Via Bootloader Exploit
Last-generation Android devices are gradually getting more secure, even approaching iOS-grade security in some usage scenarios. Equipped with fingerprint readers and compulsory encryption of the data...
View Article