Considering A Career in Audio-Video Forensics? Enhance Your Prospects With...
Have you ever discovered a software feature that, had you known of it sooner, could have helped you in a prior case? Have you been using the same software methods and workflow procedures for the least...
View ArticleCan You Get That License Plate?
We find ourselves analyzing new surveillance videos almost every day, and in most cases we can either solve the problem very quickly or understand (even quicker) that there is no information to recover...
View ArticleDevelopment of Digital Forensic Tools on Mobile Device, a Potential Area to...
Case Study: MobileTriage – JPEG Metadata Triage – Automated Extraction of Information using Mobile Forensic Tools Background Mobile devices are now becoming part of our daily lives. These devices can...
View ArticleExtracting data from dump of mobile devices running Android operating system
In this article, we are going to tell about opportunities of utilizing programs that are used on a day-to-day basis in computer forensics and examination for analysis of mobile devices running Android...
View ArticleForensics and Bitcoin
This article does not attempt to provide a beginners guide to Bitcoin, nor an in-depth thesis on Bitcoin forensics. Rather, it will be an overview of the potential opportunities available to digital...
View ArticleUsing SQL as a date/time conversion tool
A few weeks ago I spent a little time looking at Triggers and to get to know them better I wanted to make use of them and so I knocked up a small application where if an integer is pasted into a cell...
View ArticleSQLite Database Forensics – ‘Sleep Cycle’ Case Study
Recently one of our users, Dan Saunders, was kind enough to write up his experience using the Forensic Browser for SQLite on a database that was not supported by any other forensics tools – this is his...
View ArticleCountering Anti-Forensic Efforts – Part 1
by Oleg Afonin, Danil Nikolaev & Yuri Gubanov © Belkasoft Research 2015 Computer forensic techniques allow investigators to collect evidence from various digital devices. Tools and techniques exist...
View ArticleWindows 8 Touch Keyboard Forensics
Microsoft released Windows 8 in 2012. With this new version, Microsoft made a fundamental shift in Windows 8 as compare to older versions of Windows. It does not only target netbooks, laptops and...
View ArticleThe “I’ve Been Hacked” Defence
By: Yuri Gubanov, Oleg Afonin (C) Belkasoft Research, 2016 Abstract This article was inspired by an active discussion in one of the forensic listservs. Original post was asking on how to fight with an...
View ArticleWho Is Spying On Android Users, Why Do They Do It And What Are They Doing...
If you’ve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone...
View ArticleNuix Web Review & Analytics: Process, Search And Review Evidence In A Single...
by Scar de Courcier, Forensic Focus Background Nuix Web Review & Analytics (WR&A) was created to enable analysts and non-technical investigators to collaborate on investigations. The tool...
View ArticleThe Future Of ENF Systems
by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of...
View ArticleImm2Virtual: A Windows GUI To Virtualize Directly From Disk Image File
by Nanni Bassetti Sometimes during a computer forensic investigation, we need to virtualize our image disk, because it could be useful for checking or finding something of interest. If we need to...
View ArticleDatabase of Software “Fingerprints” Expands to Include Computer Games
by Richard Press, NIST One of the largest software libraries in the world just grew larger. The National Software Reference Library (NSRL), which archives copies of the world’s most widely installed...
View Article