This news feed is supplied with permission from the Forensic Focus website.To read more on any news snippet click on its headline.
A new webinar recorded by Lance Mueller of Magnet Forensics introducing Internet Evidence Finder (IEF) Advanced Edition v6.1 can now be viewed here.
Lance gives a hands-on demonstration of how to recover Internet evidence, including deleted data, from iOS & Android devices using IEF.
Please use this forum topic for discussion of the webinar and for asking Lance any questions, thank you.Posted: 17 June 2013
AccessData announces the release of Forensic Toolkit (FTK) 5.
With this major release, AccessData brings an even faster and more comprehensive FTK capable of exposing more data in less time. FTK 5 includes data visualization and explicit image detection (EID) out of the box. These two critical investigative capabilities give FTK users a great advantage, compared to tackling these tasks with other products. Data Visualization features automated graphical timeline construction and analysis of social relationships, and investigators can include visualization images in their case reports. Explicit Image Detection (EID) detects not only flesh tones but conducts a thorough analysis of shapes and orientation.Posted: 17 June 2013
Lance Mueller (Magnet Forensics) recently attended CEIC in Orlando, Florida and had the opportunity to meet David Cowen from G-C Partners, LLC. It was great to finally put a face to a name that he has known for some time through his blog and books. Lance has a huge interest in file system forensics, and has been following David’s Tri-Force blog posts and was anxious to hear his scheduled talk on the NTFS Logfile Forensics/Tri-Force during CEIC.
Lance had recently seen a tweet from David where he mentioned using Internet Evidence Finder during the initial stages of his investigative workflow and wanted to ask him a few questions about his overall workflow and where IEF fit within that workflow. He knows the workflow that he is comfortable following, but really appreciates hearing other examiner’s perspectives and reasons for using certain tools at certain times during the examination process.
Read More…Posted: 13 June 2013
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.
The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers…
Read (The Guardian)Posted: 07 June 2013
Nuix, a worldwide provider of information management technologies, and Cellebrite, a global provider of mobile data extraction, decoding and analysis solutions, announced they have formed a technology partnership to leverage their complementary strengths in mobile forensics, investigation and eDiscovery. The alliance will enable forensic investigators, law enforcement, military and intelligence analysts and eDiscovery practitioners to efficiently incorporate forensically sound mobile device data into investigations and legal discovery procedures.
“As mobile devices become increasingly relevant sources of evidence for law enforcement, investigations and eDiscovery, our customers will benefit from Cellebrite’s industry-leading capabilities to forensically extract data from cellphones, tablets, GPS and other portable devices,” said Dr. James Kent, Nuix’s Head of Investigations and CEO, EMEA.Posted: 05 June 2013
Over the past year we have been asked many times if we would consider adding support for recovery of Internet related artifacts on mobile devices. After a great deal of research and development, we are pleased to announce that IEF will soon have support for recovering artifacts from mobile images/file system dumps. We are confident that you will be as excited as us in what we are able to recover from mobile devices that have been factory reset or contain deleted data.
In the past few weeks we’ve busy been demonstrating our forthcoming mobile features for attendee’s of the CEIC, Technosecurity & Mobile Forensics World Conferences. If you didn’t get to attend one of those events, check out Jad’s blog post for quick preview of what’s coming in the next release of IEF.
Read More…Posted: 04 June 2013
Forensic Focus is seeking a part-time editorial assistant to help with various aspects of running the site (with a particular focus on planning and adding new content). The role is likely to involve tasks such as identifying/contacting potential interviewees, writing a regular roundup of forum posts, liaising with authors/bloggers and so on.
This is a position which might appeal to a mature student with a few hours to spare each week and there is a possibility it may develop into something more substantial at a later date. Technical knowledge of digital forensics as well as excellent English language skills are required but equally as important are good interpersonal skills as you will be representing the site to the wider digital forensics community.
If you are interested and would like to learn more, please contact Jamie Morris on email@example.com with ‘EDITORIAL ASSISTANT’ in the Subject line of your email and including some brief details of your background – thank you.Posted: 04 June 2013
DFLabs, a leading provider of IT GRC and Digital Data Breach Investigations technologies and services, today announced the release of v3.0 of DFLabs PTK Computer Forensic software.
PTK Forensics is an advanced computer forensic framework based on command line tools from the OS forensic market space to which many new software modules were added. Thanks to this approach, users can investigate a system much easier, without spending huge money for less affordable software.Posted: 04 June 2013