Advertisement
Articles
Subscribe to DFI News

The Lead

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be sea

Streamlining the Digital Forensic Workflow: Part 3

December 17, 2014 | by John J. Barbara | Digital Forensics Consulting, LLC | Comments

Depending upon the nature of investigations, timely forensic examinations normally can expedite the apprehension of suspects. The use of a triage tool can identify the most likely evidentiary data sources. Ideally, the relevant evidence should then be seamlessly exported and analyzed in-depth by another comprehensive forensic tool which can provide indexing and detailed analysis.

TOPICS:
View Sample

SUBSCRIBE TO FREE
DFI News
EMAIL NEWSLETTER

At first glance, it would seem that the most logical and obvious way to increase storage capacity would be to add more platters to a hard drive. However, this raises a number of inherent problems, such as having to increase the size beyond the current for

More Bits about Areal Density

December 12, 2014 11:55 am | Comments

At first glance, it would seem that the most logical and obvious way to increase storage capacity would be to add more platters to a hard drive. However, this raises a number of inherent problems, such as having to increase the size beyond the current form factors (3.5”, 2.5”, etc.), escalating the cost per hard drive, having to have more read/write heads per hard drive, and so forth.

TOPICS:
Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile te

5 Key Challenges for Keeping Up with Advancements in Mobile

December 10, 2014 10:24 am | by Lee Reiber | Comments

Not long ago, mobile device forensics was a relatively straightforward process. Contact lists, SMS messages, and call logs were obtained and examined for evidence using specialized forensic technology. But with the blistering rate of advances in mobile technology, the explosion of mobile data and devices, times have drastically changed. 

TOPICS:
 To increase hard drive storage capacity, manufacturers have been able to decrease the size of magnetic grains which comprise data bits. This allows for a greater number of bits of data to be recorded. However, the grains are so small that they can potent

Hard Drives 'Spin' into the Future

December 5, 2014 9:14 am | Comments

To increase hard drive storage capacity, manufacturers have been able to decrease the size of magnetic grains which comprise data bits. This allows for a greater number of bits of data to be recorded. However, the grains are so small that they can potentially interfere with each other. This diminishes their ability to maintain assigned magnetic orientations and data would become corrupted, leading to an unreliable and unusable hard drive.

TOPICS:
Advertisement

Ethical Decision Making

November 26, 2014 8:13 am | by Sean Harrington | Comments

Effective training in professional ethics doesn’t primarily consist of rote memorization of rules, but instead must prepare the examiner in the art of ethical issue spotting. Similarly, an effective code of ethics consists not only of certain static core principles, but also may consist of components that can be adapted over time to keep pace with the law and with professional norms.

TOPICS:

The Importance of Forensic Analysis Training

November 25, 2014 7:00 am | by Heather Mahalik | SANS Institute | Comments

The mobile device industry is evolving very quickly. To stay current on the latest devices and the proper techniques for acquiring and analyzing data, smartphone and mobile device forensic analysis training courses are becoming more and more necessary. 

TOPICS:
A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers a

Spark DNS Bounces DDoS Attack

November 21, 2014 4:58 pm | by Debbie Fletcher | Comments

A month after rebranding from Telecom to Spark, the leading New Zealand ISP had received collateral damage from the conflict between Russia and Ukraine. Fights there have never really been toe-to-toe, but, on Friday evening, September 5, Spark engineers announced that a layer-3 DDoS attack was causing an overload of its DNS servers.

TOPICS:
When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis.

Solid State/Hard Drive Differences

November 21, 2014 9:16 am | Comments

When compared to a typical hard drive, SSDs are totally different in design and functionality which leads to some difficult issues to deal with pertaining to their forensic analysis.                   

TOPICS:
Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if eac

Leading the Eyewitness: Digital Image Forensics in a Megapixel World

November 19, 2014 8:25 am | by William Weaver, Ph.D. | Comments

Current research in the area of digital image forensics is developing better ways to convert image files into frequencies, such as using wavelet transforms in addition to more traditional cosine transforms and more sensitive methods for determining if each area of an image belongs to the whole.

TOPICS:
Advertisement
As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.

Growth of Digital Forensic Workflow

November 14, 2014 12:05 pm | Comments

As digital devices continue to proliferate, digital storage capacities are approximately doubling every two years. The sheer amount of digital media being submitted for forensic analysis is overwhelming.             

TOPICS:
Do you ever feel overwhelmed as a manager? Being overburdened by the responsibility of having to figure out what others want and need of you is a familiar feeling shared among leaders. Fortunately, there is a “best practice” for obtaining just the kind of

What Every Employee Wants in a Leader

November 7, 2014 8:47 am | by DeEtta Jones | Comments

Do you ever feel overwhelmed as a manager? Being overburdened by the responsibility of having to figure out what others want and need of you is a familiar feeling shared among leaders. Fortunately, there is a “best practice” for obtaining just the kind of information needed to increase your leadership effectiveness — ask them what they want. 

TOPICS:
Future data storage needs for businesses, corporations, and governments are going to far exceed the ability of current technology to provide those storage devices. Obviously, without major technological advancements, the cost of future data storage could

Data Storage Issues: Part 4

November 5, 2014 8:20 am | by John J. Barbara | Digital Forensics Consulting, LLC | Comments

Future data storage needs for businesses, corporations, and governments are going to far exceed the ability of current technology to provide those storage devices. Obviously, without major technological advancements, the cost of future data storage could be unprecedented. There are however, a number of technologies under development which may eventually be able to store vast amounts of information, far exceeding today’s devices.

TOPICS:
Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace t

Accurate Data, Forensic Soundness

October 31, 2014 8:23 am | by Ronen Engler and Christa M. Miller | Cellebrite USA, Inc. | Comments

Boot loaders are currently considered the most forensically sound physical extraction method. While they do involve loading a piece of code onto the device, this happens before the forensic tool accesses any evidentiary data. That’s because they replace the device’s normal boot loader, or the first set of operations that kick off the phone’s startup process and hand off to the main controlling program, like the operating system.

TOPICS:

Book Excerpt: Checklist: Building a Penetration Testing Lab

October 29, 2014 8:48 am | by Bruce Middleton | CRC Press/Taylor & Francis Group LLC | Comments

This checklist can help you to build a penetration testing lab. To successfully set up your lab will require attention to detail, redundancy, and a littel bit of paranoia.                   

TOPICS:

Cloud Computing Presents a Unique Forensic Challenge

October 23, 2014 8:00 pm | Comments

Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence, its preservation, and its subsequent forensic analysis. Further forensic issues concern the potential effect the cloud services could have on the digital data itself and how the forensic examiner can explain all these indiscretions to the court.

TOPICS:

How to Collect Internet Evidence

October 22, 2014 8:00 pm | Comments

The courts have generally accepted evidence collected from the Internet as long as its authenticity can be established. Commonly accepted digital forensic methodologies can all be used to identify a three-pronged approach to Internet forensics.

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading