The golden age of mobile forensics is over. There is no longer an easy way to get through the passcode in new iOS devices. Chip-off acquisition is dead due to full-disk encryption, while physical acquisition is dead since 64-bit devices and versions of iOS 8 that cannot be jailbroken. Blackberries were highly resistant to chip-off acquisition from the beginning, and Android is getting there quickly.
Paraben has released DS v7.1. This new version added many major new features. Like, Malware...
Even after digital forensics has evolved enough to investigate the complexity of today’s...
Often people who work with computers and information develop an affinity for certain programming...
Digital forensic practitioners have many tools to conduct forensic investigations. Tools image hard drives, gather data from smartphones and pull information from the internet cloud. But, as those tools evolve, some of them bring forensic investigation into other areas, such as incident response and even security.
P2C v4.1 adds OCR support in indexing, file viewing, and searching. It also adds an RTF report, EXIF info to reports, and more. P2C is a comprehensive digital forensic examination tool with special focus on email, chat logs, internet history, registry data, and more. Not only is P2C affordable, you receive free video training with every license.
The obvious path to acquire a Windows PC has always been “pull the plug, take the disk out, connect to an imaging device and collect evidence." Sound familiar? Well, in today’s connected world things do not work quite like that. In this article, we will have a look at measure the investigator has to take before taking the disk out, even before pulling the plug.
Magnet Forensics has announced the beta availability of a new software product called Magnet ACQUIRE. The software is a smartphone acquisition tool that will allow you to quickly and easily acquire an image of any iOS or Android smartphone or tablet.
Ensuring that digital content — whether it’s a short story by John Updike or a very rare audio recording of a vanished Native American language — lives on past its initial platform is one of the most pressing issues in preservation science. Harvard is one of a handful of cultural institutions in the first wave of adopting a technology and process to preserve its digital content.
Wherever I get vmdk files, I take a deep breath and wonder what issues might pop up with them. I recently received some vmkd files and when I viewed one of these in FTK Imager (and some other mainstream forensic tools), it showed up as the dreaded "unrecognized file system."
In this article, we will have a look at how Windows-based portable electronic devices are different from traditional laptops and desktops, review new security measures and energy saving modes presented by Windows tablets, and discuss hardware, methods and tools we can use to acquire the content of their RAM and persistent storage.
Magnet Forensics has released Magnet IEF v6.6. This release adds a number of new and advanced analysis features to IEF that will aid examiners in locating and validating recovered data. These features include Hex Viewer, Text Viewer, Profile development capabilities, Partial Artifact filter, Histogram View, and Examiner/Investigator Modes.
Before purchasing any tool, users should thoroughly research those available and select the tool which provides the best functionality to meet their requirements.
Nuix 6.2 is a major release of the Nuix Engine, our eDiscovery and Investigator products, and our Director and Web Review & Analytics web applications. It includes a vast range of new features and capabilities that will benefit all Nuix customers and partners.
SiQuest has released Internet Examiner Toolkit (IXTK) Version 5. With this next generation of software, IXTK features FaceDNA, a sophisticated biometric facial recognition add-on (included at no additional cost) to their Internet Examiner Tookit.
The UFED Field solution components unify workflows between the field and lab, reducing backlogs by enabling networked collaboration and analysis across the entire investigative team. This new suite of software and hardware solutions enables personnel at every level to efficiently gather, process and act on the critical data that will help speed investigations.
The UFED Pro Series is designed for forensic examiners and investigators who require the most comprehensive, up-to-date mobile data extraction and decoding support available to handle the rapid influx of new devices and data sources. Flexible and scalable to meet all operational needs and lab environments, it features industry trusted tools and analysis capabilities.
A new tool funded by DARPA promises to detect flaws in software before release to the general public.
SQLite is a popular database format that is used extensively. Both iOS and Android employ SQLite as a storage format of choice, with built-in and third-party applications relying on SQLite to keep their data. A wide range of desktop and mobile Web browsers (Chrome, Firefox) and instant messaging applications use SQLite, which includes newer versions of Skype, WhatsApp, iMessage and many other messengers.
In cooperation with children's rights organization Terre des Hommes, in upgrading Sweetie 1.0, the virtual minor girl that identified thousands of pedophiles on the internet, researchers are working on a new method (Sweetie 2.0) with which potential perpetrators of webcam sex with children on the internet can be more easily traced.
After listening to colleagues for years and exploring it further, Jonathan Grier saw how pressing the need was for technology like his. Although the NIJ was the organization that bridged the gap between idea and practical application for his technology, it was another agency that saw its possibility.
Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.
In the second part of our discussion about the benefits of government contracts to digital forensic investigation, Forensic Magazine talks to Jonathan Grier, principle of Grier Forensics. Grier's sifting technology speeds the investigation of computer hard drives by pinpointing usable data — the data important to a case. In this part, we find out from Jonathan Grier how this technology works.
It is often the case that the spur to innovation in America takes the form of a government solicitation. As an instrument of the people, the government gives power to the those that develop ideas and tools that benefit everyone. Forensic tools are no exception. To this end, Forensic Magazine spoke with Martin Novak, Program Manager at NIJ, and Jonathan Grier, principle of Grier Forensics, about Grier's recent contract award.
Nuix will include powerful email threading capabilities at no additional cost in the upcoming 6.2 release of its eDiscovery software. This makes Nuix a viable long-term alternative for Equivio users who are concerned that Microsoft may discontinue the product after finalizing its acquisition of the company.
Sheriffs are campaigning to pressure Google Inc. to turn off a feature on its Waze traffic software that warns drivers when police are nearby. They say one of the technology industry's most popular mobile apps could put officers' lives in danger from would-be police killers who can find where their targets are parked.
Forensic Magazine’s Readers’ Choice Awards for the Best Forensic Products of the Year celebrate excellence in product design and performance for tools, equipment, and materials used in all areas of forensic investigation and analysis. A panel of Forensic subscribers selected the products that they found to be most effective and trusted in their work. Congratulations to our winners!
It has now reached the point that it is no longer practical for an examiner to forensically analyze each and every piece of evidence. Depending upon the alleged crime, often the incriminating evidence can be found in an e-mail, a document, the browser history, an SMS, or some other source. This leads to the obvious conclusion that examiners are going to need a new approach to streamline their workflow.
Often an examiner will analyze all the digital media only to determine that the probative data was limited to a browser’s history file, an e-mail, a document, the mobile devices’ logs, or an inappropriate graphic video or picture. Finding the critical probative data faster in a cost effective manner while reducing or eliminating case backlogs is going to require a more efficient methodology.
- Page 1