Telling the Story of Digital Evidence

In digital forensics, demonstrating attribution—using operating system artifacts to prove that the suspect had knowledge of the document or image files found on a device—is one of the key elements of building a case. The ability to tell an evidentiary story is even better. How did a file get here? Where did it go—to whom … Continued

The Benefits of the Artifacts-Oriented Approach Part 3

Our previous two blogs covered the reasons why we think file system forensics’ marginal returns are rapidly diminishing, and the changes in consumer electronics that continue to drive the need for a focus on artifacts and the apps they come from in digital forensics. In our final post, we’re discussing how the artifacts-oriented approach allows … Continued

File System Forensics: No Longer the Gold Standard? Part 1

Digital forensics has relied on the file system for as long as hard drives have existed. The structures associated with File Allocation Tables (FAT), the New Technology File System (NTFS), Extended File System (EXT), and other file systems—as well as the partitions within—could be mined for file metadata, carved for deleted files, and accessed to … Continued

Extracting Data from a Samsung Device Using Advanced MTP

Samsung devices are one of the most popular device types on the most popular mobile operating system, Android. In the case of a recent examination, a Samsung was giving me a lot of trouble. It was a Verizon Samsung Galaxy S7, SM-G930V. This phone was released running Android version 6, or Marshmallow, and upgradable to … Continued

Magnet AXIOM Advanced Computer Forensics (AX250) Now Open!

We’re proud to introduce a new course for people who are looking to expand the capabilities of their computer forensics investigations: Magnet AXIOM Advanced Computer Forensics (AX250). This is an expert-level four-day training course. It is designed for participants who are somewhat familiar with the principles of digital forensics and are seeking to expand their … Continued

Magnet AXIOM 1.2.4 Brings New Capabilities to Bypass Android Passwords

Update: An updated version of this release is now available as Magnet AXIOM 1.2.5. Magnet AXIOM 1.2.4 is now available for customers to download in the Customer Portal. With the latest release of AXIOM, we’re bringing new capabilities to bypass Android passwords, full Cloud token integration, McAfee Decryption, and more. Mobile Acquisition Improvements With AXIOM … Continued

Using AXIOM Cloud to Acquire and Process Yahoo Email

Magnet AXIOM supports many different services and platforms in its cloud product from Google, Microsoft, Facebook, Twitter, Dropbox, and many more. We also include a generic POP/IMAP connector to allow examiners to pull additional email services not explicitly included in the regular cloud providers. As long as the webmail provider supports either POP or IMAP, … Continued