P2C v4.1 adds OCR support in indexing, file viewing, and searching. It also adds an RTF report, EXIF info to reports, and more. P2C is a comprehensive digital forensic examination tool with special focus on email, chat logs, internet history, registry data, and more. Not only is P2C affordable, you receive free video training with every license.
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out,...
Magnet Forensics has announced the beta availability of a new software product called Magnet...
Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio...
Wherever I get vmdk files, I take a deep breath and wonder what issues might pop up with them. I recently received some vmkd files and when I viewed one of these in FTK Imager (and some other mainstream forensic tools), it showed up as the dreaded "unrecognized file system."
In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.
Magnet Forensics has released Magnet IEF v6.6. This release adds a number of new and advanced analysis features to IEF that will aid examiners in locating and validating recovered data. These features include Hex Viewer, Text Viewer, Profile development capabilities, Partial Artifact filter, Histogram View, and Examiner/Investigator Modes.
Before purchasing any tool, users should thoroughly research those available and select the tool which provides the best functionality to meet their requirements.
Nuix 6.2 is a major release of the Nuix Engine, our eDiscovery and Investigator products, and our Director and Web Review & Analytics web applications. It includes a vast range of new features and capabilities that will benefit all Nuix customers and partners.
SiQuest has released Internet Examiner Toolkit (IXTK) Version 5. With this next generation of software, IXTK features FaceDNA, a sophisticated biometric facial recognition add-on (included at no additional cost) to their Internet Examiner Tookit.
The UFED Field solution components unify workflows between the field and lab, reducing backlogs by enabling networked collaboration and analysis across the entire investigative team. This new suite of software and hardware solutions enables personnel at every level to efficiently gather, process and act on the critical data that will help speed investigations.
The UFED Pro Series is designed for forensic examiners and investigators who require the most comprehensive, up-to-date mobile data extraction and decoding support available to handle the rapid influx of new devices and data sources. Flexible and scalable to meet all operational needs and lab environments, it features industry trusted tools and analysis capabilities.
A new tool funded by DARPA promises to detect flaws in software before release to the general public.
SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype, WhatsApp, iMessage and many other messengers.
In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.
After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, it was another agency that saw its possibility.
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.
In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathan Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard drives by pinpointing usable data — the data important to a case. In this part, we find out from Jonathan Grier how this technology works.
It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benefit everyone. Forensic tools are no exception. To this end, Forensic Magazine spoke with Martin Novak, Program Manager at NIJ, and Jonathan Grier, principle of Grier Forensics, about Grier's recent contract award.
Nuix will include powerful email threading capabilities at no additional cost in the upcoming 6.2 release of its eDiscovery software. This makes Nuix a viable long-term alternative for Equivio users who are concerned that Microsoft may discontinue the product after finalizing its acquisition of the company.
Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry's most popular mobile apps could put officers' lives in danger from would-be police killers who can find where their targets are parked.
Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic subscribers selected the products that they found to be most effective and trusted in their work. Congratulations to our winners!
It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser history, an SMS, or some other source. This leads to the obvious conclusion that examiners are going to need a new approach to streamline their workflow.
Often an examiner will analyze all the digital media only to determine that the probative data was limited to a browser’s history file, an e-mail, a document, the mobile devices’ logs, or an inappropriate graphic video or picture. Finding the critical probative data faster in a cost effective manner while reducing or eliminating case backlogs is going to require a more efficient methodology.
Civil Air Patrol officials say cell phone forensics have helped authorities narrow the search area for a missing small airplane which hasn't been seen since leaving the Headland airport in Henry County, Alabama.
SSDs have been in use since the 1950s. When compared to a conventional HDD, they are totally different in architecture and functionality. These differences offer many advantages such as no moving parts, having low random access times, and being shock and vibration resistant. However, their architecture and functionality creates some difficult issues to deal with pertaining to their forensic analysis.
The software and data for cloud applications are stored on servers owned by a third party and not local to the user. As such, they are not under the end user's control—a key requirement in traditional network forensics, where the examiner has either physical control over the network, or can take control by installing a piece of code on the computer to be examined.
When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis. The SSD’s use of flash memory for data storage rather than rotating magnetic discs is the cause of the forensic issues.
In order to effectively investigate crimes involving social media, it is imperative that law enforcement understand “how” social media is stored, “where” such information is stored and found, and “how” to obtain such information using forensically sound procedures. Social media requires a different mind-set to traditional investigative and current forensic methodologies.
- Page 1