Not all geolocation data is created equal

Geolocation data has become an indispensable tool in criminal investigations, offering unparalleled insights into the movements and whereabouts of mobile devices. This technological advancement provides law enforcement with the ability to reconstruct crime scenes, establish timelines, and verify alibis with a level of precision that was previously unattainable. The forensic examination of mobile digital devices … Continued

That one artifact: How Bluetooth artifacts cracked a case   

In this series, Chad Gish, CID/SISU Detective, Metropolitan Nashville Police Department will delve into some noteworthy cases in his 26-year career, focusing on investigations that were either completely solved or significantly aided by a critical piece of evidence—what he calls “that one artifact.” Digital evidence possesses the remarkable ability to accelerate investigations and frequently establishes … Continued

Software kernels: Unraveling digital forensics intricacies

In this article we will cover the basics of what a software kernel is, the application of software kernels in the context of digital forensic examinations, and we’ll shed some light on how kernels contribute to the acquisition and analysis of data during a forensic investigation.

Griffeye Joins Magnet Forensics

We’re excited to share the news that Magnet Forensics has acquired Griffeye!

Griffeye is recognized by law enforcement agencies worldwide for its powerful digital investigation suite, Griffeye Analyze, which has proven exceptionally helpful for investigators working on child exploitation cases.

How To Get the Most Out of Your Magnet GRAYKEY Extractions

GrayKey extractions are an amazing tool for digital investigators and examiners, since getting a full file system image is crucial. For years, most forensic examinations of iOS devices were limited to data only available in an iTunes backup and only if you had the user’s passcode—with Android acquisitions not being much easier.

SRUM: Forensic Analysis of Windows System Resource Utilization Monitor

SRUM, or System Resource Utilization Monitor, is a feature of modern Windows systems (Win8+), intended to track the application usage, network utilization and system energy state. SRUM, as with most operating system features, wasn’t designed for the forensicator, but that doesn’t mean we can’t use it to support our investigations.