Subscribe to DFI News

The Lead

The Switch to Private Sector Digital Forensics

July 18, 2014 | Comments

There is clearly a difference in the type of investigations and examinations being performed versus what are encountered in the public sector. The private sector examiner can be expected to provide evidence to private attorneys, corporations, private investigators, and corporate security departments.

View Sample

DFI News

SSD drives employ a completely different way of storing information internally, which makes it much easier to destroy information and much more difficult to recover it.

SSD Evidence Issues

June 27, 2014 8:55 am | Comments

Solid-state drives represent a new storage technology. They operate much faster compared to traditional hard drives. SSD drives employ a completely different way of storing information internally, which makes it much easier to destroy information and much more difficult to recover it.


Mobile Data Drives a Big Data World

June 25, 2014 8:27 am | by Lee Reiber | AccessData Group | Comments

Today’s world is becoming more and more mobile every day. In fact, 91% of all people own a mobile device and 56% own some type of smart device. It is no surprise that today there are more mobile devices on the earth than there are people! Equally impressive is that the amount of data we consume is becoming increasingly focused on mobile devices.

Network investigations can be far more difficult than a typical computer examination

Network Investigations

June 19, 2014 12:16 pm | by Gary C. Kessler and Matt Fasulo | Comments

Network investigations can be far more difficult than a typical computer examination, even for an experienced digital forensics examiner, because there are many more events to assemble in order to understand the case and the tools do not do as much work for the examiner as traditional computer forensics tools.


Tool Validation

June 13, 2014 8:25 am | Comments

The premise that an effective digital forensic examiner must be able to validate all of the tools that he or she uses is universally accepted in the digital forensic community. I have seen some less-educated members of the community champion a particularly insidious, and I will argue, invalid method of tool validation, often referred to as the two-tool validation method.


Professional Ethics in the Digital Forensics Discipline: Part 2

June 11, 2014 8:33 am | by Sean Harrington | Comments

The digital forensics profession has endeavored to provide examiners with a framework within which the digital forensics examiner must not only recognize, classify, and manage ethical dilemmas, but also respect boundaries and honor obligations. This framework is the code of ethics. This article will continue the discussion from the last issue on the need for and contours of these codes.


Do You Know Where Your Data Is?

June 6, 2014 8:12 am | by Gary Torgersen | Comments

The Bring Your Own Device (BYOD) phenomenon is affecting forensic data acquisition because it creates crossover between data that is controlled by an individual versus by a company. People are using their personal devices for work-related tasks because it can seem easier than trying to use typical work resources. 


Skeletons in Your Client's "Digital Closet"

June 4, 2014 8:14 am | by Martin Siefert | Comments

Studies have shown that individuals are notoriously bad at remembering details about past events. Without replenishing or review of perceptions, neural traces in the brain degrade and information is lost. This article will examine how the use of digital forensics can aid the legal profession with fact finding to support or refute eye witness testimony involving details of events.  



June 3, 2014 10:35 am | by Rebecca Waters | Comments

By now most of you will have read about the Heartbleed bug, a major vulnerability in OpenSSL. Heartbleed results from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension. Heartbleed presents an interesting forensic challenge because there is unlikely to be any indication that a data breach occurred.


Book Excerpt: Social Media Investigation for Law Enforcement

June 3, 2014 9:02 am | by Joshua Brunty and Katherine Helenek | Comments

In order to effectively investigate crimes involving social media, it is imperative that law enforcement understand “how” social media is stored, “where” such information is stored and found, and “how” to obtain such information using forensically sound procedures. Social media requires a different mind-set to traditional investigative and current forensic methodologies. 


Unsupported Smartphone Extractions

June 3, 2014 8:53 am | Comments

What happens when a smartphone is locked and unsupported by forensic tools? Flasher box, JTAG, or chip-off extraction methods become necessary. All three enable physical extraction — a logical examination cannot be performed on an unsupported locked device. However, even this capability can be limited.


Boot Loaders Produce Forensic Soundness

May 30, 2014 8:34 am | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data.       


Evidence: Get It While You Can

May 23, 2014 8:46 am | Comments

For the digital crimes of today, specialists need to examine a much more complex environment. Investigators need to image digital media of a multitude of types: magnetic, solid-state, or optical, for example.            


No Forensics for Old Apps

May 16, 2014 10:45 am | Comments

Apps, not just available for iPhone or Android but also through device vendors like Samsung, Nokia, and LG — as well as from mobile carriers like T-Mobile and retailers like Amazon — are a digital forensics challenge.         


Solid State Drives: Part 7

May 14, 2014 9:14 am | by John J. Barbara | Digital Forensics Consulting, LLC | Comments

Probably the best approach for an examiner is to treat an SSD as any other piece of volatile evidence. Examiners would need to have a full understanding of SSD architecture and functionality and then rely on extensive documentation of their forensic methodology and procedures to (hopefully) successfully obtain and maintain the evidentiary value of any probative information gathered.


Don't Get Burned by Prepaid Phones

May 9, 2014 9:38 am | Comments

Prepaid phones have been a problem for some time, and continue to be a problem for law enforcement in particular.                                       



You may login with either your assigned username or your e-mail address.
The password field is case sensitive.