Technology Services
A forum to discuss police Technology Services such as ANPR, Digital Forensics
25 topics in this forum
-
- 0 replies
- 15 views
https://www.msab.com/case-studies/case-study-two-uk-police-forces/ "Using the Kiosk now enables us to confront the abuser with the extracted evidence in the interview, and a charge could be pressed within the first 8 hours.”
-
-
- 0 replies
- 13 views
https://blog.oxygen-forensic.com/web-browser-forensics/ A list of what Oxygen Forensic Detective can extract from each browser. No mention of Tor browser, which by default is configured to try and avoid leaving traces.
-
Detego Global the Only Digital Forensics Provider Recognised at UK Security Innovation Awards
by Equin0x- 0 replies
- 19 views
https://www.forensicfocus.com/news/detego-global-is-the-only-digital-forensics-provider-recognised-at-uk-security-innovation-awards/ Pioneers in Unified Digital Investigations technology, Detego Global, were recognised with a UK Defence and Security Innovation award at the recently concluded Security and Policing summit.
-
- 0 replies
- 57 views
https://9to5mac.com/2022/04/29/cellebrite-iphone-cracking/ Cellebrite iPhone cracking kit allows the company’s clients to access virtually all of the private data stored on a phone – in some cases, even if the phone is locked. But the exact capabilities depend on both the model of the iPhone and the version of iOS it is running. We managed to get access to the user documentation for a recent version of the kit to see what it can do …
-
- 0 replies
- 31 views
https://www.forensicfocus.com/news/huawei-devices-decryption-and-extraction-in-oxygen-forensic-detective/ "For devices with security updates before July 2021 only online brute-force is possible, as one of the keys can be obtained only when the password is known. The password is tried on the connected smartphone at the stage of hardware key extraction by the data extraction module, and the testing speed is about 3 passwords per second. This significantly slows down the password brute-force process, since it would take almost 8 months to find a 6-digit password." You've got to wonder how much of the "security concerns" Western governments have about Huawei …
-
- 0 replies
- 38 views
https://www.wired.co.uk/article/europe-police-facial-recognition-prum Lawmakers advance proposals to let police forces across the EU link their photo databases—which include millions of pictures of people’s faces.
-
- 0 replies
- 137 views
https://theintercept.com/2022/02/08/cellebrite-phone-hacking-government-agencies/ Cellebrite’s extensive federal sales come as another Israeli phone-spying firm, NSO Group, falls under federal sanctions
-
-
- 1 reply
- 79 views
https://www.forensicfocus.com/webinars/how-viable-is-password-cracking-in-digital-forensic-investigations/ People should stop thinking about passwords and start thinking in terms of multi word passphrases. Diceware is an excellent method to generate long passphrases that are truly random and have no predictable patterns that would make them easier to crack.
-
-
- 0 replies
- 69 views
https://www.forensicfocus.com/case-studies/discover-how-graykey-provides-critical-evidence-in-sexual-assault-and-robbery-case/
-
- 3 replies
- 89 views
https://www.forensicfocus.com/webinars/chip-chop-smashing-the-mobile-phone-security-chip-for-fun-and-digital-forensics/ Interesting attack, but ultimately still hinges on being able to brute force the users passcode. If this fails (passcode too long?) then acquisition won't be possible. But how relevant is this in policing today? Most people I know don't switch off their phones ever, some don't even use an pin, most will use a 4-6 digit code which is easily brute forced. And for those with longer passcodes there's RIPA I guess. How often does this issue come up?
-
BlueForce Learning – Fight the Stereotype
by BlueForce Learning- 0 replies
- 109 views
Some stereotypes imply that only analysts work with data; however, in today’s world where data are literally everywhere, sworn police officers and detectives 👮 are also called to work with and understand complex datasets.This is why we have created a completely free webinar for law enforcement personnel 🎬 who are interested in learning more about data analytics and how it can be used for their work. Have a look at the recordings and materials from any or all of our six webinars that have taken place: 1. Simple Excel Techniques to Work With Large Datasets 2. Create a Telephone Frequency of Calls (Hot List) 3. Use Your Arrest Data to Create a Frequen…
-
BlueForce Learning – FREE Webinar – Use a Google Geofence Warrant to close your cases!
by BlueForce Learning- 4 replies
- 247 views
The January webinar of the Fighting Crime with Data Webinar Series will focus on how to USE A GOOGLE GEOFENCE WARRANT TO CLOSE YOUR CASES. It will take place on Thursday, the 20th of January at 12:00 PM (Eastern Time). In this month's webinar we will discuss how the location data collected by Google in the SensorVault database can help you identify suspects and close cases. Familiarize yourself with this powerful tool that law enforcement is using more and more frequently. You will be able to access all materials from the webinar after the session. In the meantime, if you would like to have a look at the materials presented during our past webinars, you can acce…
-
- 0 replies
- 122 views
https://www.forensicfocus.com/case-studies/how-detego-helped-airport-based-counterterrorism-units-speed-up-investigations-with-rapid-data-extraction-and-triage-tools/ The airport has Counter Terrorism Officers operating permanently as part of the wider Counter Terrorism Border Policing Group. In their role, these officers need to comprehensively examine and forensically secure data from digital devices which are in the possession of suspects. And with a limited window to gather critical evidence, officers needed a solution that can perform this task within minutes.
-
- 0 replies
- 84 views
https://www.forensicfocus.com/webinars/the-potential-of-digital-traces-in-providing-evidence-at-activity-level/
-
- 0 replies
- 107 views
https://www.vice.com/en/article/93b3ay/fbi-backdoor-anom-phones-gps-data Anom, an encrypted phone company marketed to criminals which the FBI secretly took over, surreptitiously recorded every message sent by the phones’ users. But the truly global undercover operation had another secret: the phones also collected users' precise GPS location and transferred that information to authorities, according to multiple documents reviewed by Motherboard. I've long felt that the "encrypted phone" market is just snake oil. The marketing is great and there's lots of promises but they are usually low on detail and transparency about how their systems work. If you can'…