How To Image From A Network Repository Using Logicube’s Forensic Falcon-NEO
Welcome to Logicube’s tutorial on the Falcon-NEO Forensic Imager. The Falcon-NEO allows you to image directly to or from a network repository using SMB or CIFS protocol, and to image from a network...
View ArticleFacebook’s Privacy Manifesto: What Does It Mean For Digital Forensic...
by Christa Miller, Forensic Focus Mark Zuckerberg’s new “privacy manifesto” for Facebook marks not just a pivot in terms of how the social network shapes modern-day communication. It also marks what...
View ArticleHow To Image To A Network Repository With Logicube’s Forensic Falcon-NEO
Welcome to Logicube’s tutorial on the Falcon-NEO forensic imager. The Falcon-NEO allows you to image directly to or from a network repository using SMB or CIFS protocol, or using iSCSI. Two 10GbE...
View ArticleLeveraging DKIM In Email Forensics
by Arman Gungor My last article was about using the Content-Length header field in email forensics. While the Content-Length header is very useful, it has a couple of major shortcomings: Most email...
View ArticleThe Opportunity In The Crisis: ICS Malware Digital Forensics And Incident...
by Christa Miller, Forensic Focus Malware aimed at industrial control systems (ICS) is nothing new. Nearly 10 years have passed since Stuxnet first targeted the supervisory control and data acquisition...
View ArticleFrom Crime To Court: Review Principles For UK Disclosure
by Hans Henseler UK Law Enforcement agencies are facing significant challenges related to digital evidence disclosure in criminal prosecution cases. Suspects who are charged with a crime must have...
View ArticleHow To Read A Moving Low-Quality License Plate Using Amped FIVE’s Perspective...
Thanks to TV series and movies, people nowadays believe that when it comes to digital images and videos, everything is possible. Some of you may remember the “never-ending enhance” sequence in Blade...
View ArticleMy Digital Forensics Career Pathway
by Patrick Doody Let me start by introducing myself. I’m Patrick, 39 years of age and from a working-class background. I’ve lived in London all my life, my parents moved to the UK from Southern Ireland...
View ArticleHow To Use Cross-Case Search With Belkasoft Evidence Center
by Yuri Gubanov Diving deeper may be the key to the eventual success of a digital forensic investigation. This is true not only when it comes to a single given case, but also when it comes to...
View ArticleCase Study: Extracting And Analyzing Messenger Data With Oxygen Forensic...
by Nikola Novak It‘s a great pleasure to share my experience of working with Oxygen Forensic Detective, which was a crucial tool in solving one of my cases. A father of a minor girl contacted me,...
View ArticleFighting Crime With Data: Law Enforcement In The 21st Century
by Paul Hamrick, Nuix Executive Summary Law enforcement investigations have long been influenced by developments in technology; after all, new technologies create new ways for criminals to profit and...
View ArticleIndustry Roundup: Image Recognition And Categorization
by Christa Miller, Forensic Focus The need for image recognition and categorization has never been more in demand thanks to the spread of extremist propaganda, child sexual abuse material (CSAM), and...
View ArticleHow To Analyze Windows 10 Timeline With Belkasoft Evidence Center
Temporal analysis of events (Timeline) can be beneficial when you want to reconstruct events related to computer incidents, data breaches, or virus attacks taking place on a victim’s computer....
View ArticleTechno Security & Digital Forensics 2019 – San Antonio Sept 30 – Oct 2
From the 30th of September to the 2nd of October 2019, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in San Antonio, TX, USA. If there are any topics you’d...
View ArticleFinding And Interpreting Windows Firewall Rules
by Joakim Kävrestad Determining with whom and in what way a computer has communicated can be important and interesting in several types of examinations. Communications can be an important part of...
View ArticleUnreal Steganography: Using A VR Application As A Steganography Carrier
by Stuart Wilson This report focuses on the use of virtual reality as a potential steganography carrier file to avoid detection of forensic analysis applications commonly used within law enforcement....
View ArticleHow To Launch 18 Simultaneous Wiping Sessions And Reach 18TB/h Overall Speed...
Thanks to its ability to perform 18 simultaneous imaging sessions, TaskForce is the most capable evidence acquisition in the forensics market. Atola’s team of engineers have equipped the device with a...
View ArticleEmployee Turnover And Computer Forensic Analysis Best Practices
by Larry Lieb Organizations historically have struggled with addressing terminated employees’ important evidence sources such as company-issued laptops, oftentimes materially affecting the...
View ArticleHow To Perform Remote Acquisition Of Digital Devices With Belkasoft Evidence...
Remote acquisition of digital devices is a useful option for modern-day organizations, both commercial and government. The main reasons for this are as follows: As entities grow, their IT environments...
View ArticleCareer Paths In Digital Forensics: Practical Applications
by Christa Miller, Forensic Focus Whether you’re a college or university student trying to plot out your career, an experienced worker figuring out next steps, or a mentor seeking to help either one...
View Article