Digital Forensics Magazine March 2013 Newsletter
The Latest News and Offerings from the DFM Team

Is this email not displaying properly?
View it in your browser.

Welcome to the March edition of the Digital Forensics Magazine Newsletter. Last months release of Digital Forensics Magazine Issue 14 was one of our most successful yet and we are looking to follow that in Issue 15.

In this Newsletter, we bring you the latest news, information on events this year and all the details of what's in Issue 14 of Digital Forensics Magazine.

Information Assurance Strategies Ltd

/In The News

Digital Forensics And Cyber Security Firm AccessData Gets $45M Investment From Sorenson Capital, Silicon Valley Bank

AccessData was among the first companies to focus on digital forensics, cyber security and litigation support when it was founded all the way back in 1987. The company never took any outside funding. That is, until today. Access data just announced that it has received a $45 million investment from Sorenson Capital Partners and Silicon Valley Bank. This funding, the company says, allows it to "reduce outside ownership and add Sorenson as a strategic, long-term partner."

The investment consists of a $20 million equity trade from Sorenson Capital and $25 million in structured debt from Silicon Valley Bank. In today's announcement, AccessData's CEO Tim Leehealey explains the company's decision for this move and argues that "by consolidating our ownership and adding a strategic partner like Sorenson Capital, while strengthening our relationship with Silicon Valley Bank, AccessData is better positioning itself to take advantage of its unique place in the market."

"By combining AccessData's strong market position with Sorenson Capital's proven track record of taking companies to the next level, we believe we can accelerate growth at AccessData and deliver extensive value to shareholders and customers alike," said Ron Mika, a co-founder and Managing Director of Sorenson Capital in a prepared statement today. "This is an exciting company and a compelling opportunity. We are anxious to see where the team can take it over the coming years."

EBCG CSS img

Cloud forensics: In a lawsuit, can your cloud provider get key evidence you need?

Any business that anticipates using cloud-based services should be asking the question: What can my cloud provider do for me in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyberattack or data breach?

It's going to be different for every provider, according to the industry insiders and legal experts who discussed this topic during a panel session at the recent RSA Conference. And complicating cloud-based forensics is that the high-tech industry is still scratching its collective head over basic requirements, some of which are being pounded out now in the Cloud Forensics Working Group at the National Institute of Standards and Technology (NIST).

"In cloud, we're still struggling with definitions," said Steven Teppler, partner at the Sarasota, Fla.-based law firm Kirk-Pinkerton PA in its information governance and electronic discovery practice. "This causes problems for attorneys. We may not get answers that are complete because we don't know what to ask."

Teppler, who spoke on the panel, said the focus for any lawyer is on obtaining cloud forensics evidence which will lay a foundation for admissibility under the law that a jury can weigh, based on the "provenance" of the information -- the who, what and where of the data. He also noted the process known as "legal discovery" to collect information in any dispute is always constrained by time and expense.

The reality is that "anyone can be sued," said Teppler, and if served with a complaint, it may be necessary to speak with your cloud provider to ensure that information can be preserved "in a consumable fashion" that can be used by the opposing party. This adds up to the need to make a "good-faith effort" that has IT people speaking with corporate lawyers to make forensics-based information available.

The world today is populated with "lots of little clouds," noted Christopher Day, chief security architect and senior vice president of secure information services at Verizon Terremark, speaking on the panel. These can be roughly construed as infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) vendors.

Read on at Network World.

Cyber Espionage, National Security... Murder? Computer Forensics May Offer the Best Chance to Find the Truth

In today's digital society, the protection of corporate ESI (Electronically Stored Information) has never been more tied to the survival or demise of businesses and corporations, no matter how large or small. And in today's global marketplace, that can sometimes mean walking a high-wire between the quest for profit and the interests of national security. The alleged suicide last year of Shane Todd, a bright, young engineer who decided to take on the "adventure" of working overseas in Singapore, has recently launched into the national spotlight, all due to digital evidence recovered by his own family after being overlooked by Singaporean investigators. Joe Caruso, founder and CEO/CTO of Global Digital Forensics (GDF), took some time to lend some insight into how computer forensics specialists help clients on many fronts, from protecting data via strengthened cyber security, to helping investigators on both the civil and criminal fronts.

"Let me start by saying the perseverance and determination shown by Shane's family in seeking the truth must really be commended, especially going through it all at a time where the pain and anguish of a lost son and brother is so fresh and intense. Having assisted investigators with cases in many different countries, both corporate and criminal, I know the course to the truth certainly does not always run in a straight line. There are cultural considerations, government bureaucracy, differences in legal proceedings, privacy protection and investigation procedures, and a whole host of other pitfalls to navigate. And they had to face the trifecta, international corporate interests, national security interests, and a criminal investigation in the hands of a tightly controlled-by-the state-for-the-state foreign country. But maybe someone upstairs was looking out for them, because they hit the jackpot when they took what they thought was a speaker from his apartment in Singapore that turned out to be an external drive to which he seems to have backed up a wealth of eye-opening information. All the rest of his electronics were seized by local investigators and the Todd family has never been able to get a look at the contents of any of it to this point. The authorities in Singapore also refused assistance offered by the FBI in investigating the case, so no help there either."

Digital Journal

/Forensics Euro Expo 2013

Forensics Europe Expo

Digital Forensics Magazine is proud to be partnering with the Forensics Europe Expo, hosted in London, this April.

FREE Visitor Registration is now live for Forensics Europe Expo, 24‐25 April 2013, Olympia, London. This is a must attend event for any police or law enforcement professional involved in the forensic analysis of evidence and criminal prosecution.

The closure of the Forensic Science Service in March 2012 has forced the forensic landscape to evolve into an "Open Market."

There is now, more than ever, a need to understand new legislation, and the impact and future challenges it will have on the availability, procurement and supply of forensic analysis & products and the future challenges facing the market.

A free to attend exhibition with 70+ exhibitors and a product demonstration led workshop programme will run alongside dedicated 2-day Forensic Innovation and Digital Forensics conference streams. All Digital Forensic Magazine readers will receive a 20% discount off the conference by using code DISC20 at the registration checkout.

Digital Forensics Magazine - Subscribe Now!

/Issue 14 of Digital Forensics Magazine Out Now!

DFM Issue 14

Issue 14 was released at the beginning of this month and has generated a lot of buzz, especially about our feature article. The article comes from well known Forensic and Security pratitioner, Mark Osborne, and discusses GPU and CUDA.



The Criminal Connection

Yuval Ben-Moshe discusses how the use of mobile forensics can help combat the threat of organised crime. By exploring the way in which technology is advancing, we can predict how criminals will operate.


CUDA & GPU For Security and Forensics

Mark Osborned explores the opportunities that CUDA holds for revolutionizing information security. He explains how the use of GPU and CUDA could lead to a world of hardware assist security.


Fuzzing Risks for Rich HTML Applications

In this article Brian Cusak and Muteb Alqahtani describe how modern commerical web applications are vulnerable to attack via threat vectors that involve the use of fuzzing, especially where rich HTML is used, that operate much life a desktop operating system.

Blackberry File Deletion and Thumbnail Image Caches

BlackBerry devices are not typically welcome arrivals within a forensic lab; their robust security often making examination diffi cult. In this article Kevin Mansell looks at some interesting aspects of the FAT implementation used in BlackBerry devices, and how thumbnail caches can provide a valuable source of evidence.

Tarantula Uncovered

In the May/June 2012 issue of Digital Forensics, we discussed the inherent challenges posed by Chinese mobile device chipsets to forensic professionals. We also introduced Tarantula, an advanced mobile forensics system, including hardware and software, which is specifi cally designed to analyse devices with these chips. In this article, Kevin North takes a closer look at Tarantula and explain the analysis process. We will also present some features of Tarantula's latest release.

Fraud Prevention in Unified Communications

Michael Taylor observes how UC vulnerability loopholes need management strategies to minimise fraud and explains how Emerging Comprehensive Unified Communication Risk Management (CUCRM) solutions reduce UC fraud while maintaining realistic ownership costs.

Remote Data Collection

In this article using a particular case study Tom Turner looks at how a Remote Governance and Collections platform (RGC) was developed as a proof of concept and can be used to manage and forensically collect data, saving investigators (and their clients) both money and time.

Mobile Malware

An Ethical Hackers view on the dangers of mobile malware and how to stop it.


Plus all our usual features "Apple Autopsy", "360", "IRQ" and "Robservations" "Legal news and alerts".

Subscribe now to ensure you don't miss all these great articles.

Digital Forensics Magazine and the DFM Logo are trademarks of TR Media Ltd.
TR Media Ltd, The Old Dairy, Brewer Street Dairy Business Park, Bletchingley, Surrey, RH1 4QP, UK