Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic subscribers selected the products that they found to be most effective and trusted in their work. Congratulations to our winners!
Depending upon the nature of investigations,...
It has now reached the point that it is no longer practical for an examiner to forensically...
Often an examiner will analyze all the digital media only to determine that the probative data...
Civil Air Patrol officials say cell phone forensics have helped authorities narrow the search area for a missing small airplane which hasn't been seen since leaving the Headland airport in Henry County, Alabama.
SSDs have been in use since the 1950s. When compared to a conventional HDD, they are totally different in architecture and functionality. These differences offer many advantages such as no moving parts, having low random access times, and being shock and vibration resistant. However, their architecture and functionality creates some difficult issues to deal with pertaining to their forensic analysis.
The software and data for cloud applications are stored on servers owned by a third party and not local to the user. As such, they are not under the end user's control—a key requirement in traditional network forensics, where the examiner has either physical control over the network, or can take control by installing a piece of code on the computer to be examined.
When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis. The SSD’s use of flash memory for data storage rather than rotating magnetic discs is the cause of the forensic issues.
In order to effectively investigate crimes involving social media, it is imperative that law enforcement understand “how” social media is stored, “where” such information is stored and found, and “how” to obtain such information using forensically sound procedures. Social media requires a different mind-set to traditional investigative and current forensic methodologies.
This edition will look at forensic tool validation. Myriad tools exist for the examination of digital evidence. These tools automate many of the tedious forensic processes and allow you to perform investigations more efficiently, but it is important that you not take these tools for granted.
A researcher is using network science and a connected society to fight crime. Data produced by dynamical relationships is integrated into a statistical framework using algorithms that can model connectivity between individual “players,” laying out the multiple relationships into a network representation.
Big Data is the new norm in today’s world. It is extremely challenging to capture, store, analyze and visualize. Dealing with digital data coming from computers, servers and networks is challenging enough without introducing data from mobile devices. In today's landscape, if you are not already dealing with data from mobile devices, especially smart mobile devices, you are missing much of this "Big Data picture".
A new ForensicDB project sought to expand ForensicDB's capacity for user traffic and database queries, increase associate curators' participation, and further develop software automation to better manage the records submitted.
Tracks Inspector, an early case assessment tool which simplifies the investigation of digital forensic evidence, is now available to the UK public sector via the Government’s CloudStore, part of the G-Cloud framework.
One commonality between a typical hard drive and an SSD is that they both store data. However, the way in which they do so is totally different. To fully comprehend how SSDs function, it is necessary to understand SSD terminology. Doing so will also provide insight into the “pitfalls” of their forensic examination.
Firefox (version 16.0.2) typically includes twelve SQLite databases, each of which performs a different function such as to store bookmarks, cookies, places visited, searches, and so forth.
The majority of potential forensic information from Firefox does not reside in the Windows Registry, but rather in two directories located in the individual User account(s).
With a strong commitment to helping law enforcement, military, government, and corporate organizations recover data from a broad range of Internet-related communications, Magnet Forensics (formerly JADsoftware) has unveiled v5.8 of its INTERNET EVIDENCE FINDER
The most prevalent software applications in use today are probably Web browsers. Although browsers are complex software applications, they have common functionality regarding their main components.
Investigative methods when collecting evidence from social media vary substantially from traditional digital forensic techniques creating new legal and procedural challenges.
Security Identifiers (SIDs) are unique alphanumeric character strings of variable length that are assigned during the log-on-process to each user on a stand-alone system or to each user, group, and computer on a domain-controlled network.
Fourandsix Technologies, Inc. has introduced their first product, FourMatch, which instantly distinguishes unmodified digital camera files from those that may have been edited. Fourandsix Technologies was co-founded last year by Kevin Connor, a 15-year veteran of the Adobe Photoshop team, and Hany Farid, a pioneering scientist in image forensics. Dr.
Learn more at Booth 17 at The Evidence Conference October 1-2, 2012.
Registry Keys track each mounted volume and assigned drive letter used by the NTFS file system. Information concerning any external devices that had previously been attached to the system will be recorded in certain Registry Keys.
BlackBag Technologies, Inc., developer of forensics software, training, and eDiscovery solutions, announces the availability of BlackLight 2012 R2, a comprehensive iPhone, iPad, and Mac OS X forensic analysis tool.
Advanced PDF Password Recovery recovers or instantly removes passwords protecting or locking PDF documents created with all versions of Adobe Acrobat or any other PDF application. Features and Benefits
Artifacts are items of data or information left behind after a specific activity occurs on a system. Any USB device attached to a system will leave artifacts in several locations.
ElcomSoft Co. Ltd. has discovered yet another way to access information stored in Apple iOS devices by retrieving online backups from Apple iCloud storage. The company updated Elcomsoft Phone Password Breaker, a tool to retrieve user content from password-protected backups created by Apple iOS devices and BlackBerry smartphones, with the ability to retrieve iPhones’ user data from iCloud.
- Page 1