<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-36666403</atom:id><lastBuildDate>Tue, 29 Jul 2025 07:03:22 +0000</lastBuildDate><category>Columnists</category><category>mobile forensics</category><category>Sam Raincock</category><category>chris hargreaves</category><category>live forensics</category><category>simon biles</category><category>David Benford</category><category>EnCase</category><category>F-Response</category><category>Nick Furneaux</category><category>computer forensics training</category><category>computer security</category><category>craig ball</category><category>interviews</category><category>survey</category><category>Computer Forensic Investigation</category><category>David Sullivan</category><category>Digital Safety Conference</category><category>Greg Smith</category><category>Guidance Software</category><category>Infosecurity</category><category>Jon Rowe</category><category>Pinpoint Labs</category><category>Si Biles</category><category>computer forensics podcasts</category><category>education</category><category>employment</category><category>encryption</category><category>forensic hardware</category><category>forensic software</category><category>forensics</category><category>interview</category><category>network forensics</category><category>review</category><category>sean mclinden</category><category>sharing knowledge</category><category>standards</category><category>4N6 Investigation</category><category>ACPO Good Practice Guide</category><category>Adroit Photo Forensics</category><category>Advanced Forensic Sessions</category><category>Agile Risk Management</category><category>Appointments-UK</category><category>Ben Levitan</category><category>Bright Forensics</category><category>CSITech</category><category>Challenges</category><category>Chris Pamplin</category><category>Cloud Computing</category><category>Criminal Justice and Immigration Bill</category><category>Cystinosis</category><category>DOMEX</category><category>Diffie</category><category>Digital Evidence Collection Kit</category><category>EnScripts</category><category>Experience</category><category>FTK</category><category>Forensic 4cast</category><category>George Chlapoutakis</category><category>Google forensics</category><category>Google history</category><category>Graham Brown-Martin</category><category>Hard disk data storage</category><category>Helix 3 Enterprise</category><category>Hoffmann</category><category>Images</category><category>Kaminsky</category><category>Lance Mueller</category><category>Lee Whitfield</category><category>Matthew Shannon</category><category>McMurdie</category><category>Nessus</category><category>PIN</category><category>Programming</category><category>Projects</category><category>Research</category><category>Robert Botchek</category><category>Russell May</category><category>SIM</category><category>Scott Burkeman</category><category>Scott Moulton</category><category>Search Warrants</category><category>Simson Garfinkel</category><category>Stephen Mason</category><category>Students</category><category>Tableau</category><category>Tony Sammes</category><category>UK Register of Expert Witnesses</category><category>V200 SIM Dialer</category><category>Windows Search forensics</category><category>X-Ways</category><category>Zimmermann</category><category>bitlocker</category><category>blogs</category><category>business continuity</category><category>careers</category><category>cell phone forensics</category><category>cell site analysis</category><category>certification</category><category>clifford stoll</category><category>cold boot</category><category>cold boot attack</category><category>compliance</category><category>computer forensics</category><category>computer forensics costs prices</category><category>computer forensics education</category><category>computer forensics events</category><category>computer forensics jobs</category><category>computer forensics licensing</category><category>computer forensics recruitment</category><category>copyright</category><category>cuckoo&#39;s egg</category><category>cv</category><category>cyberstalking</category><category>dan gaskell</category><category>data protection</category><category>data recovery</category><category>data recovery training</category><category>digital evidence</category><category>disaster recovery</category><category>document analysis</category><category>dominik weber</category><category>e-fense Live Response</category><category>electronic signatures</category><category>expert witness</category><category>expet witness</category><category>feeds</category><category>file carving</category><category>forensic focus stats</category><category>forensic reports</category><category>forums</category><category>future</category><category>games consoles</category><category>geotags</category><category>global computer forensics</category><category>graduate</category><category>graduates</category><category>harassment</category><category>hard disk reliability</category><category>holographic memory</category><category>hotplug</category><category>image</category><category>iso</category><category>jobs</category><category>key recovery</category><category>memory acquisition</category><category>metadata</category><category>mobile telephone connection records</category><category>ntfs</category><category>online</category><category>passwords</category><category>peer review</category><category>privacy</category><category>procedures</category><category>push button</category><category>recruiters</category><category>recruitment</category><category>reporting</category><category>scalability</category><category>security metrics</category><category>single sign on</category><category>stalking</category><category>sterilization</category><category>storage</category><category>tactical</category><category>tagview</category><category>technology</category><category>telecoms</category><category>terms of engagement</category><category>training</category><category>truecrypt</category><category>twitter</category><category>validating</category><category>vulnerability scanners</category><category>wiebetech</category><category>wiping</category><category>write blocker review</category><category>write blockers</category><category>write blocking</category><title>Forensic Focus Blog</title><description>Official blog of &lt;a href=&quot;http://www.forensicfocus.com&quot;&gt;ForensicFocus.com&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>223</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-4960354608863700947</guid><pubDate>Tue, 25 Feb 2014 20:06:00 +0000</pubDate><atom:updated>2014-02-25T12:06:41.162-08:00</atom:updated><title>Webinar: Accelerating Investigations Using Advanced eDiscovery Techniques</title><description>&lt;a class=&quot;postlink&quot; href=&quot;http://info.nuix.com/InvestigationsMar62014_Registration.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://info.nuix.com/InvestigationsMar62014_Registration.html&quot;&gt;Join this free webinar from Nuix&lt;/a&gt;
 to find out how to deal with large volumes of electronic evidence while
 balancing business demands including reduced budgets and resources, 
spiralling case backlogs and ever decreasing timescales.&lt;br /&gt;
&lt;br /&gt;
Date: Thursday March 6, 2014&lt;br /&gt;
Time: 4:00pm-5:00pm GMT/11:00am-12:00pm ET&lt;br /&gt;
Duration: 45min + Q&amp;amp;A&lt;br /&gt;
Presenters: Paul Slater, Director of Forensic Solutions EMEA and Ady 
Cassidy, Director of Investigation Solution Consultancy - Global&lt;br /&gt;
&lt;br /&gt;
Today, investigators face a constant battle to find the truth in ever 
larger, more varied and increasingly complex stores of electronic 
evidence. As the growing volume of data has stretched traditional 
forensic tools to capacity, it has become more difficult to examine 
everything in deep forensic detail. To improve the efficiency of 
investigations we need to more effectively zoom in on critical data from
 the outset, and then focus the time-consuming deep forensic analysis on
 this data only. This webinar will share workflows and techniques from 
the legal world of electronic discovery (eDiscovery), which typically 
has even larger volumes of digital evidence than found in forensic 
investigations.&lt;br /&gt;
&lt;br /&gt;
Register now at &lt;a class=&quot;postlink&quot; href=&quot;http://info.nuix.com/InvestigationsMar62014_Registration.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://info.nuix.com/InvestigationsMar62014_Registration.html&quot;&gt;http://info.nuix.com/InvestigationsMar62014_Registration.html&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2014/02/webinar-accelerating-investigations.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-4078387000564802483</guid><pubDate>Mon, 10 Feb 2014 13:54:00 +0000</pubDate><atom:updated>2014-02-10T05:54:59.437-08:00</atom:updated><title>Interview with Andrew Rector, Digital Forensics Student, Bloomsburg University</title><description>&lt;div class=&quot;pn_uflds&quot;&gt;
         &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1392027535.4655.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Andrew Rector&quot; border=&quot;0&quot; class=&quot;pn_image&quot; itemprop=&quot;image&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1392027535.4655.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;pn_thumb&quot;&gt;
      &lt;span class=&quot;img-shadow&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Andrew, 
you’re currently studying Digital Forensics at Bloomsburg University. 
Could you tell us more about the course and what drew you to it?  &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
Digital Forensics is the acquisition and analysis of any digital medium 
for the purpose of finding and reporting evidence to Government 
agencies, police, and/or private contractors. At Bloomsburg University 
we are taught first to have a low-level understanding of what we will be
 looking at (Binary/Hexadecimal, File System Analysis, and Windows 
Artifacts), and then we are taught how to use our skills to do real 
Forensics cases using the prevalent Digital Forensics tools (FTK, 
EnCase, X-Ways). What really drew me to Digital Forensics the most was 
the investigative mindset you have to have. When you are doing a case, 
it’s almost like a chess match between you and the “bad guy”. For me, 
that’s very exciting, every case is different, and has its own brand of 
excitement.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;You’re also Lab 
Manager at the Pennsylvania Center for Digital Forensics, doing research
 on GPS devices and mobile telephones. How did you become interested in 
this area and what can you tell us about your research?&lt;/span&gt;  &lt;br /&gt;
&lt;br /&gt;
Cell phones and GPS devices were one of my first major areas of 
research. They interest me a lot because of the challenge they present, 
cell phones especially. Forensically analyzing a phone is completely 
different than analyzing a HDD (Hard Disk Drive). For one, the sheer 
volume of types of phones make it a challenge, not to mention the 
different operating systems on each one. Each phone is a new challenge. 
One of my most exciting research projects with the PACDF was the 
analysis of a Garmin Nuvi GPS. By analyzing the Garmin forensically, I 
was able to completely retrace a person’s whereabouts, down to the exact
 time, date, and location. It’s really very amazing the data that can be
 found on those types of devices...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=70/interviews/2014/andrew-rector-digital-forensics-student-bloomsburg-university/&quot;&gt;Read More &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2014/02/interview-with-andrew-rector-digital.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-3108147351836346947</guid><pubDate>Fri, 07 Feb 2014 12:09:00 +0000</pubDate><atom:updated>2014-02-07T04:10:23.078-08:00</atom:updated><title>Forensic Software in Child Protection Cases</title><description>According to recently released statistics from ICAC, an agency whose 
aim is to make the internet safer for children, only 2% of reported 
child protection cases are investigated in the United States each year. 
Often the media seize every opportunity to disparage forensics 
organisations, child protection charities and law enforcement agencies 
for not coming up with more effective solutions to these cases, but the 
reality is that the investigation of illicit image distribution is a 
wide-ranging and complex area, fraught with difficulties.&lt;br /&gt;
&lt;br /&gt;
Digital forensics professionals will undoubtedly come across such 
cases as part of their general workload. Sometimes a case will begin 
with an investigator specifically looking for suspicious images, whilst 
at other times the illicit nature of the images will be discovered in 
the course of an unrelated process. Regardless of the initial push, 
however, it is undoubtedly one of the most taxing and time-consuming 
parts of the job.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Internet Watch Foundation – on the frontline&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The Internet Watch Foundation in the UK understands the issues around
 child protection investigation better than most. The IWF fields reports
 from the public about illicit imagery around the internet, and has been
 dealing with potentially criminal internet content since 1997. The 
organisation receives around forty thousand submissions per year, and 
manages to deal with around ten thousand of these...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://articles.forensicfocus.com/2013/10/28/forensic-software-in-child-protection-cases/&quot;&gt;Read More &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2014/02/forensic-software-in-child-protection.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-3171183960749831286</guid><pubDate>Fri, 29 Nov 2013 14:55:00 +0000</pubDate><atom:updated>2013-11-29T06:55:03.110-08:00</atom:updated><title>Webinar: Geolocation Artifacts and Timeline Analysis in Digital Forensics</title><description>Using Geolocation Artifacts and Timeline Analysis to Solve the Case: A Digital Forensics Case Study&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://info.magnetforensics.com/Digital-Forensics-Case-Study-Webinar/&quot;&gt;http://info.magnetforensics.com/Digital-Forensics-Case-Study-Webinar/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Date: Wednesday December 11, 2013&lt;br /&gt;Time: 11:00am GMT (6:00am EST)&lt;br /&gt;Duration: 60 mins&lt;br /&gt;&lt;br /&gt;In this webinar, Jad Saliba of Magnet Forensics will take you through a fictional case study involving child luring that led to murder. You will discover how digital forensics, geolocation artifacts and timeline analysis in particular can be critical in solving cases like these and where you can look to find the artifacts. The data analyzed will include a PC image and a mobile device image, showing how both sources of evidence can provide valuable insight into what happened, where to start a search for a missing person, and the corroborating evidence to support criminal charges.&lt;br /&gt;&lt;br /&gt;&lt;a class=&quot;postlink&quot; href=&quot;http://info.magnetforensics.com/Digital-Forensics-Case-Study-Webinar/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://info.magnetforensics.com/Digital-Forensics-Case-Study-Webinar/&quot;&gt;REGISTER TODAY HERE&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Please share this invitation with any friends or colleagues who might also be interested, thank you.</description><link>http://forensicfocus.blogspot.com/2013/11/webinar-geolocation-artifacts-and.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-1632716056566334256</guid><pubDate>Fri, 18 Oct 2013 13:51:00 +0000</pubDate><atom:updated>2013-10-18T06:51:51.653-07:00</atom:updated><title>ForGe – Computer Forensic Test Image Generator</title><description>&lt;span style=&quot;font-style: italic;&quot;&gt;by Hannu Visti&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Creating test material for computer forensic teaching or tool testing 
purposes has been a known problem. I encountered the issue in my studies
 of Computer Forensics at the University of Westminster. We were 
assigned a task to compare computer forensic tools and report results. 
Having already analysed test images by Brian Carrier 
(http://dftt.sourceforge.net) over and over again, I found myself 
creating images manually, which appears to be the best and only way of 
doing this. One of my lecturers, Sean Tohill, confirmed this is indeed 
the case and a test image generator is long overdue.&lt;br /&gt;
&lt;br /&gt;
The need for such a tool is twofold. In educational setting, the problem
 of plagiarism can be mitigated by giving each student an individual 
image to analyse. In application quality testing, one of the tests 
should be to feed several similar but not identical images to the 
forensic tool, and compare results, which should be identical...&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://articles.forensicfocus.com/2013/10/18/forge-computer-forensic-test-image-generator/&quot;&gt;http://articles.forensicfocus.com/2013/10/18/forge-computer-forensic-test-image-generator/&lt;/a&gt;&lt;br /&gt;
</description><link>http://forensicfocus.blogspot.com/2013/10/forge-computer-forensic-test-image.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-4578923340563833750</guid><pubDate>Wed, 09 Oct 2013 15:51:00 +0000</pubDate><atom:updated>2013-10-09T08:51:43.502-07:00</atom:updated><title>Interview with Carole Phillips, Trustee, BulliesOut</title><description>&lt;div class=&quot;pn_uflds&quot;&gt;
         &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1381098125.3547.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Carole Phillips&quot; border=&quot;0&quot; class=&quot;pn_image&quot; itemprop=&quot;image&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1381098125.3547.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;pn_thumb&quot;&gt;
      &lt;span class=&quot;img-shadow&quot;&gt;&lt;/span&gt;&lt;span class=&quot;pn_caption&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Carole, you&#39;re currently a trustee for BulliesOut. How did you become involved with the charity?&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
I first heard of BulliesOut through being involved in the charity 
Children in Wales and contacted the CEO, Linda James, via LinkedIn. We 
met as I was interested in what the charity did and what involvement the
 charity had with schools and other professionals working with young 
people. I was impressed with the dedication of Linda and her desire to 
get the message out there to young people that no-one has to put up with
 bullying. The charity looks at all aspects of bullying, working with 
the bully as well as the victim and also the bystanders who have a 
crucial role to play. BulliesOut operates in other countries as well as 
the UK but it was encouraging to learn that it is a Wales based charity 
and one that is well respected. I was asked to become a Trustee, and 
although I was not sure what being a Trustee involved, I was happy to 
join the team. I promote the charity as much as I can with other 
professionals and young people and although my time is limited due to 
working full-time and my University studies, I  do what I can.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;There
 has been increased coverage of cyber bullying in the media recently. 
How large a problem is cyber bullying? Is it really growing as fast as 
the media seem to suggest?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
When the tragic deaths of young people such as Hannah Smith and Daniel 
Perry hit the headlines, the spotlight is rightly focused on social 
networking sites and how bad they are and what can be done to prevent 
further deaths. Because of the publicity, it appears that all of a 
sudden social media has become a problem, yet the truth is that concerns
 about young people inappropriately using social networking sites have 
never gone away. Schools can vouch for this in the increased number of 
incidents they deal with; almost always at the centre of bullying 
incidents is a social network site or messaging service such as Ask.fm. 
As was the case in the summer with Ask.fm, there was a public outcry to 
get the site closed down, but this is not the answer. Whilst publicity 
about messaging services pushes for stricter monitoring and moderation 
and to take more responsibility for the care of its primarily young 
users, educating young people about their behaviour online is vital in 
driving home the message about safer use...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=67/interviews/2013/carole-phillips-trustee-bulliesout/&quot;&gt;http://www.forensicfocus.com/c/aid=67/interviews/2013/carole-phillips-trustee-bulliesout/&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2013/10/interview-with-carole-phillips-trustee.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-2672042736406867782</guid><pubDate>Wed, 09 Oct 2013 15:49:00 +0000</pubDate><atom:updated>2013-10-09T08:49:38.421-07:00</atom:updated><title>Interview with John Huperetes, Senior Forensics Instructor</title><description>&lt;div class=&quot;pn_uflds&quot;&gt;
         &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1380204711.5451.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;pn_image&quot; itemprop=&quot;image&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1380204711.5451.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;pn_thumb&quot;&gt;
      &lt;span class=&quot;img-shadow&quot;&gt;&lt;/span&gt;&lt;span class=&quot;pn_caption&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;John 
Huperetes is a sub-contractor to the US Department of Defense and any 
views herein do not represent those of his contractor or of the DoD.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;John, please tell us about your current role.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I am contracted to be &quot;senior forensics instructor&quot; and assist in 
developing and delivering cyber investigation training courses for DoD 
organizations, Defense Criminal Investigative Organizations (DCIO), 
military counterintelligence agencies, and law enforcement 
organizations.&lt;br /&gt;
&lt;br /&gt;
This gives me the opportunity to review and sometimes experiment with 
bleeding edge digital forensics, and transfer the acquired knowledge to 
others.&lt;br /&gt;&lt;br /&gt;I started off tinkering with electronics at a very early 
age. I was much better at shredding electronics than putting them back 
together. I moved to programming, first for processors, memory and 
controllers, thereafter databases and finally networks.  A few 
consulting stints and I shifted to security permanently.&lt;br /&gt;
&lt;br /&gt;
Incident response in security naturally pushes into forensics. A few 
more permanent and consulting jobs, and about a decade ago I took a job 
with a large financial firm working on forensics.&lt;br /&gt;
 &lt;br /&gt;
I got a call from a contractor for my current job, and that is how I ended up here. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;What is the most challenging thing about your job? What do you find the most enjoyable?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
The most challenging part of my job is always having an open mind toward
 new techniques and ideas.  It is not just a time consuming but also an 
exhausting process. It is not unusual in our field to learn something, 
just to later discover that there are caveats galore! I enjoy the 
camaraderie of the experts, instructors and students, and the new 
discoveries I get to make...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=66/interviews/2013/john-huperetes-senior-forensics-instructor/&quot;&gt;http://www.forensicfocus.com/c/aid=66/interviews/2013/john-huperetes-senior-forensics-instructor/&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2013/10/interview-with-john-huperetes-senior.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-5513517168920183762</guid><pubDate>Wed, 09 Oct 2013 15:48:00 +0000</pubDate><atom:updated>2013-10-09T08:48:25.753-07:00</atom:updated><title>Interview with Benjamin Fung, Associate Professor, McGill University</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1379878168.136.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Dr Benjamin Fung&quot; border=&quot;0&quot; class=&quot;pn_image&quot; itemprop=&quot;image&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1379878168.136.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;pn_uflds&quot;&gt;
         &lt;div class=&quot;pn_thumb&quot;&gt;
      &lt;span class=&quot;img-shadow&quot;&gt;&lt;/span&gt;&lt;span class=&quot;pn_caption&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Benjamin, 
you&#39;re an Associate Professor of Information Studies at McGill 
University - can you tell us more about the role and how you entered 
academia?&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
Certainly. As you say, I am currently an Associate Professor of 
Information Studies at McGill University and previously was an Associate
 Professor of Information Systems Engineering at Concordia University. I
 am particularly interested in developing new, scalable data mining 
methods for privacy protection and crime investigation.&lt;br /&gt;
&lt;br /&gt;
In 2003, after working in the software industry for four years, I 
noticed there was a need for scalable data mining methods. As a result, I
 resigned from my job at SAP Business Objects and studied a Ph.D. in 
computing science, specializing in data mining, at Simon Fraser 
University. Recently, there is a hot research topic called &quot;big data&quot;, 
but data miners have been working on &quot;big data&quot; for more than 20 years 
already.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Your research focuses on
 designing intelligent systems for the purpose of crime investigation. 
How did you become interested in these topics?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
After joining the Computer Security team at Concordia in 2007, I had a 
lot of opportunities to interact with different law enforcement units in
 Canada. In the meetings, I found that there is a big gap between the 
state-of-the-art data mining methods in the literature and the current 
software tools used by law enforcement officers. A lot of important 
evidence can be collected from the suspects&#39; digital devices, from 
laptops to smart phones. The challenge is how to efficiently retrieve 
the relevant information from such a large volume of (unstructured) 
textual data...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=64/interviews/2013/benjamin-fung-associate-professor-mcgill-university/&quot;&gt;http://www.forensicfocus.com/c/aid=64/interviews/2013/benjamin-fung-associate-professor-mcgill-university/&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2013/10/interview-with-benjamin-fung-associate.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-7449122137096885568</guid><pubDate>Wed, 09 Oct 2013 15:46:00 +0000</pubDate><atom:updated>2013-10-09T08:46:59.951-07:00</atom:updated><title>Forensic Focus Forum Round-Up</title><description>How much does having a disability affect working in forensics? Chime in &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10945/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10945/&quot;&gt;on the forum&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Are &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10948/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10948/&quot;&gt;Facebook private messages&lt;/a&gt; retrievable? &lt;br /&gt;
&lt;br /&gt;
Forum members discuss the best way to &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10871/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10871/&quot;&gt;clean flash drives&lt;/a&gt;. &lt;br /&gt;
&lt;br /&gt;
To triage or not to triage? &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10931/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10931/&quot;&gt;That is the question&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Convicted murderer Bradley Cooper has been &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10965/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10965/&quot;&gt;granted a retrial&lt;/a&gt; following accusations of a judge holding back testimony concerning Google maps.&lt;br /&gt;
&lt;br /&gt;
Forum members discuss &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10971/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10971/&quot;&gt;verification of ATA to USB bridges&lt;/a&gt; on hard drives of more than 2TB.    
    </description><link>http://forensicfocus.blogspot.com/2013/10/forensic-focus-forum-round-up.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-5850541267002425459</guid><pubDate>Wed, 09 Oct 2013 15:45:00 +0000</pubDate><atom:updated>2013-10-09T08:45:52.748-07:00</atom:updated><title>Interview with Jacopo (forum member &#39;jaclaz&#39;)</title><description>&lt;div class=&quot;pn_uflds&quot;&gt;
         &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1378980911.3952.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;pn_image&quot; itemprop=&quot;image&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1378980911.3952.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;pn_thumb&quot;&gt;
      &lt;span class=&quot;img-shadow&quot;&gt;&lt;/span&gt;&lt;span class=&quot;pn_caption&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Jacopo, &lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;you’re an active member of the Forensic Focus forums. How did you become interested in digital forensics?&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
My interests are oriented towards OS booting, filesystems and data 
recovery. These fields are of course closely linked to digital 
forensics. &lt;br /&gt;
&lt;br /&gt;
I was one of those kids that disassembled things to see what was inside 
them and understand how they worked (and I even managed to reassemble a 
few items properly!) Computers have been a hobby since the time I built 
(some of the readers may be old enough to remember the good ol&#39;times) my
 first computer, a Sinclair ZX-80, and more generally I have been always
 interested in any kind of technology. If the term had been already 
invented at the time I could have easily been defined as a &quot;geek&quot;.&lt;br /&gt;
&lt;br /&gt;
Then, in my professional life, I had a few occasions to find what I call
 &quot;the IT wall&quot;. At least here in Italy in the years when computers 
entered the corporate world there was an abundance of a particular kind 
of IT guy, that took advantage of the fact that no one else was familiar
 with the way computers worked and either provided answers like &quot;it is 
not possible&quot; or &quot;you can&#39;t do that&quot;, or &quot;well, we will need to hire a 
professional programmer and it will take 6 months to have that&quot;. Due to 
some peculiarities of my character, &quot;it is impossible&quot; or &quot;you can&#39;t do 
that&quot; are like magic words to induce me to prove that it is actually 
possible and that I can do it (or at least find the actual reason why 
something is impossible). On a couple of occasions it happened that 
everything that was needed to create a Work Progress Report was somehow 
stuck in a corrupt hard disk or in a program database that went astray. 
Due to Murphy&#39;s Law these events normally happened on Saturdays or 
during the holiday periods, and something needed to be done, and 
quickly, and most probably with the help of some luck and ingenuity, I 
was able to recover the hard disk contents or rebuild the broken 
database, etc. This made me take an interest in the field, and since 
then I studied a bit more in this niche...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=65/interviews/2013/jacopo-forum-member-jaclaz/&quot;&gt;http://www.forensicfocus.com/c/aid=65/interviews/2013/jacopo-forum-member-jaclaz/&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2013/10/interview-with-jacopo-forum-member.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-2628553655948352670</guid><pubDate>Thu, 21 Feb 2013 17:31:00 +0000</pubDate><atom:updated>2013-02-21T09:31:01.919-08:00</atom:updated><title>Interview with Robert Bond, Product Marketing Manager, Guidance Software</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1361466589.2398.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1361466589.2398.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Robert, please tell us a little about yourself and your role at Guidance Software&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I’m the new Product Marketing Manager of Forensic Solutions which includes &lt;a class=&quot;postlink&quot; href=&quot;http://www.guidancesoftware.com/encase-forensic.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.guidancesoftware.com/encase-forensic.htm&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;EnCase Forensic&lt;/span&gt;&lt;/a&gt;, &lt;a class=&quot;postlink&quot; href=&quot;http://www.guidancesoftware.com/encase-portable.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.guidancesoftware.com/encase-portable.htm&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Encase Portable&lt;/span&gt;&lt;/a&gt; and &lt;a class=&quot;postlink&quot; href=&quot;http://www.tableau.com/index.php?pageid=products&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.tableau.com/index.php?pageid=products&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tableau products&lt;/span&gt;&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
I have been in marketing for over 15 years with technology brands like 
Hewlett Packard, Kodak, and most recently in e-Discovery with Ricoh 
Legal.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Version 7 of EnCase introduced 
significant changes, the reaction to some of which was mixed within the 
forensic community. What kind of feedback did you receive from users?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
For our customers who have been using EnCase, the new look of Version 7 
was a bit of a transition and took some adjustment. For new users 
however, the interface is similar to the look and feel of other popular 
programs so we’ve seen the learning curve for users new to the software 
become shorter.&lt;br /&gt;&lt;br /&gt;From a customer experience perspective, Guidance 
marketing and technical support has provided webinars and other tools to
 assist users in making a smooth transition. We believe their investment
 in getting comfortable with the new interface will increase their 
efficiency.&lt;br /&gt;
&lt;br /&gt;
Further, as we have upgraded the software culminating with Version 7.05;
 we are learning that the increased speed of processing data and several
 of the new features including prioritized processing are dramatically 
helping our customers increase their productivity...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=55/interviews/2013/robert-bond-product-marketing-manager-guidance-software/&quot;&gt;Read more&lt;/a&gt; </description><link>http://forensicfocus.blogspot.com/2013/02/interview-with-robert-bond-product.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-2672086549690919843</guid><pubDate>Wed, 30 Jan 2013 16:41:00 +0000</pubDate><atom:updated>2013-01-30T08:41:38.913-08:00</atom:updated><title>Internet Evidence Finder (IEF) review</title><description>&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1359471421.9711.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1359471421.9711.jpg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Reviewed by BitHead (discussion thread &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10196/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=10196/&quot;&gt;here&lt;/a&gt;).&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
When this review started at the beginning of August 2012, Internet 
Evidence Finder (IEF) was a project of Jad Saliba of JADSoftware.  At 
that time the version was 5.41.&lt;br /&gt;
&lt;br /&gt;
The interface was simple, and IEF was an easy to use tool that found a 
lot of artifacts and displayed them in an easy to follow report.&lt;br /&gt;
&lt;br /&gt;
In the middle of August I was contacted by Adam Belsher of JADSoftware 
and told there was going to be a few major changes coming to 
JADSoftware.  A week later Saliba announced “JADsoftware has a new 
identity, including a new company name – Magnet Forensics.”&lt;br /&gt;&lt;br /&gt;In 
his first blog post on the Magnet Forensics site, Saliba wrote, “A lot 
has changed since I launched JADsoftware and first developed Internet 
Evidence Finder (or IEF) while working as a police officer and forensic 
examiner. After a couple of years juggling both jobs, I realized IEF had
 enormous potential to help you perform better investigations, so I 
decided to dedicate myself to developing the software full-time. The 
growth the company has experienced since then has exceeded my highest 
expectations.”&lt;br /&gt;
&lt;br /&gt;
And there were a lot more changes than just the name...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=54/reviews/2013/internet-evidence-finder-ief/&quot;&gt;Read more &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2013/01/internet-evidence-finder-ief-review.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-2570216565712516945</guid><pubDate>Fri, 30 Nov 2012 14:19:00 +0000</pubDate><atom:updated>2012-11-30T06:19:06.477-08:00</atom:updated><title>Interview with Eddie Sheehy, CEO, Nuix</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1354245679.7981.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1354245679.7981.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Eddie, can you tell us something about your background and your current role as CEO of &lt;a class=&quot;postlink&quot; href=&quot;http://www.nuix.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.nuix.com/&quot;&gt;Nuix&lt;/a&gt;?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I joined &lt;a class=&quot;postlink&quot; href=&quot;http://www.nuix.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.nuix.com/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Nuix&lt;/span&gt;&lt;/a&gt;
 as CEO in 2006 after working for quite a few high-growth finance and 
technology businesses. What I loved about Nuix was the precise detail 
the software could expose about the information it indexed. Having that 
degree of detail at scale could make a huge difference to the way an 
investigation played out.&lt;br /&gt;
&lt;br /&gt;
After about a year with Nuix, it became clear to me we couldn’t take on 
Access Data and Guidance directly –they owned the forensic investigation
 market. So we expanded into eDiscovery, and later information 
governance, as a way of growing the business. In 2011, having reached a 
more tenable scale, we decided to go back into investigations. That has 
been one of the most satisfying aspects of my time at Nuix.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;What products and solutions does Nuix offer?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Nuix offers &lt;a class=&quot;postlink&quot; href=&quot;http://www.nuix.com/Products&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.nuix.com/Products&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;products&lt;/span&gt;&lt;/a&gt; and &lt;a class=&quot;postlink&quot; href=&quot;http://www.nuix.com/Solutions&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.nuix.com/Solutions&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;solutions&lt;/span&gt;&lt;/a&gt;
 for forensic investigation, eDiscovery and information governance. 
There’s a fair amount of overlap between those categories, for instance 
our Enterprise Collection Center technology for gathering evidence in 
the field is used by investigators and for eDiscovery and our processing
 engine underpins all three verticals.&lt;br /&gt;
&lt;br /&gt;
Indeed, at the heart of these products is our patent pending 
unstructured data indexing engine. The Nuix engine has unique load 
balancing, fault tolerance and intelligent processing technologies that 
enable it to process huge volumes of unstructured data at high speed and
 with forensic certainty...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=53/interviews/2012/eddie-sheehy-ceo-nuix/&quot;&gt;Read more &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/11/interview-with-eddie-sheehy-ceo-nuix.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-3781622214377434139</guid><pubDate>Wed, 14 Nov 2012 15:28:00 +0000</pubDate><atom:updated>2012-11-14T07:28:14.988-08:00</atom:updated><title>Interview with Jonathan Krause, Managing Director, First Response</title><description>&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/1352892722.4486.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/1352892722.4486.jpg&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Jonathan, we last interviewed you back in 2008, what have you been doing since then?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
In early 2008 I started Forensic Control after four years as a computer 
forensic employee. It began as a vehicle for my contract work but soon 
developed into a business in its own right, becoming relatively well 
known – albeit within the fairly small world of computer forensics! I 
moved further and further away from my roots in public sector work, and 
found myself really enjoying the faster pace and challenges in the 
corporate world; there was no going back for me. During this time I was 
fortunate enough to work on some very interesting cases including the 
Deepwater Horizon oil spill and the estate of Elvis Presley.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;You recently became the Managing Director of &lt;a class=&quot;postlink&quot; href=&quot;http://first-response.co.uk/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://first-response.co.uk&quot;&gt;First Response&lt;/a&gt;. Tell us more about the company and your involvement.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
First Response was set up in January 2012, and at present is being run 
alongside Forensic Control. There are three joint owners of the company;
 myself, John Douglas and Bill Lindley. John (the Operations Director), 
Bill (the Chairman) and I bring together over 30 years’ experience of 
working in the industry. We decided to bring the forensic operations of 
our separate companies under one roof which was a natural progression 
for each of our companies. We think we complement each other very well! 
There’s some more background on First Response in the recent Forensic 
Focus &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/News/article/sid=1956/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/News/article/sid=1956/&quot;&gt;news item&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
I’ve known Bill and John professionally and socially for years; as well 
as offering what we believe is a first-class service, we enjoy our work 
and enjoy working with each other – for me, this is of fundamental 
importance.&lt;br /&gt;
&lt;br /&gt;
In terms of my involvement, I’m a typical managing director/CEO though 
with a very much hands-on role. You’re as likely to find me imaging an 
unusual server configuration, analysing the content and reporting back 
to the client as much as dealing with the behind scenes management.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Can you give us some recent examples of cases First Response has worked on?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Sure. I think First Response’s main strength is in having both a great 
technical depth and an ability to communicate complex matters in a way 
that an average lawyer or director can easily understand and then act 
on. This helps our clients tremendously as it did in the two examples of
 cases I&#39;ll outline...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=52/interviews/2012/jonathan-krause-managing-director-first-response/&quot;&gt;Read more &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/11/interview-with-jonathan-krause-managing.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-9104117494182032622</guid><pubDate>Thu, 01 Nov 2012 16:12:00 +0000</pubDate><atom:updated>2012-11-01T09:12:14.112-07:00</atom:updated><title>Webinar (online now): Pitfalls of Interpreting Forensic Artifacts in the Windows Registry</title><description>The webinar &quot;Pitfalls of Interpreting Forensic Artifacts in the Windows Registry&quot; is now online &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/c/aid=51/webinars/2012/some-pitfalls-of-interpreting-forensic-artifacts-in-the-windows-registry/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/c/aid=51/webinars/2012/some-pitfalls-of-interpreting-forensic-artifacts-in-the-windows-registry/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
If you encounter any difficulties viewing the above page, the webinar is also available on YouTube &lt;a class=&quot;postlink&quot; href=&quot;http://youtu.be/MC9AlUPvgRU&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://youtu.be/MC9AlUPvgRU&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
In this webinar, Jacky Fox, student at UCD School of Computer Science 
and Informatics, presents the results of her dissertation on Windows 
Registry reporting. Jacky will be available in &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=9881/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=9881/&quot;&gt;this forum thread&lt;/a&gt; for about an hour to answer any questions.                </description><link>http://forensicfocus.blogspot.com/2012/11/webinar-online-now-pitfalls-of.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-2657324951539095877</guid><pubDate>Tue, 30 Oct 2012 15:22:00 +0000</pubDate><atom:updated>2012-10-30T08:22:44.517-07:00</atom:updated><title>Guidance Software Releases EnCase® Forensic v7.05</title><description>Guidance Software Inc. has announced the release of &lt;a class=&quot;postlink&quot; href=&quot;http://www.guidancesoftware.com/encase-forensic.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.guidancesoftware.com/encase-forensic.htm&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;EnCase® Forensic version 7.05&lt;/span&gt;&lt;/a&gt;.
 This latest version of the industry-standard forensics software 
features key enhancements that enable investigators to work with data 
sets earlier and faster in order to both begin and close cases faster 
than ever before. Speed enhancements in the EnCase Forensic v7.05 
evidence processor have reduced significantly the processing time for 
both small and large data sets. Digital investigators can now rapidly 
process evidence files of virtually unlimited size, dramatically 
reducing case backlogs. With EnCase Forensic v7.05, investigators can 
uncover evidence up to nine times faster than previous versions using 
the greatly enhanced evidence processor...    &lt;br /&gt;&lt;br /&gt;EnCase Forensic 
v7.05 also improves investigative efficiency by automating common 
investigation tasks and significantly reducing manual efforts. 
Prioritized processing lets users process an early subset of evidence 
and make it available more quickly for analysis by investigators. They 
can also choose to continue or to stop processing remaining evidence. 
Enhancements to the analytic capabilities of the product’s built-in Case
 Analyzer offer forensic examiners deeper insight into computer systems 
through higher-level reports on metadata and the ability to compare 
potentially related artifacts side-by-side. Examiners can establish 
hyperlinks to original documents and images within reports. In addition,
 the results of a keyword search can be viewed and analyzed while that 
search is ongoing...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/News/article/sid=1952/&quot;&gt;Read more &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/10/guidance-software-releases-encase.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-6204751859568065653</guid><pubDate>Mon, 29 Oct 2012 15:29:00 +0000</pubDate><atom:updated>2012-10-29T08:29:45.626-07:00</atom:updated><title>Webinar: Pitfalls of Interpreting Forensic Artifacts in the Windows Registry</title><description>In this webinar, Jacky Fox, student at UCD School of Computer Science 
and Informatics, presents the results of her dissertation on Windows 
Registry reporting - focusing on automating correlation and 
interpretation. After the webinar Jacky will be available in the 
Forensic Focus webinars forum to answer any questions.&lt;br /&gt;
&lt;br /&gt;
Date: Thursday, November 1st 2012&lt;br /&gt;
Time: 12PM (midday) EDT US / 4PM GMT UK / 5PM CET Europe&lt;br /&gt;
Duration: 20 mins&lt;br /&gt;
&lt;br /&gt;
There is no need to register for this webinar, simply visit &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/webinars&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/webinars&quot;&gt;http://www.forensicfocus.com/webinars&lt;/a&gt; at the above time (the webinar has been pre-recorded and will be archived for viewing later if you are unable to attend)    
    </description><link>http://forensicfocus.blogspot.com/2012/10/webinar-pitfalls-of-interpreting.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-7515474306935364411</guid><pubDate>Tue, 09 Oct 2012 08:42:00 +0000</pubDate><atom:updated>2012-10-09T01:42:18.789-07:00</atom:updated><title>Interview with Lindy Sheppard, F3 (First Forensic Forum) Secretary</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/thumb_1349698318.2955.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/thumb_1349698318.2955.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Lindy, tell us something about the cases you have been involved in.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I have been involved in quite a variety of cases, from counter terrorism
 to the importation of drugs, fraud, missing children and sadly, far too
 often, the abuse of children. Working alongside Tony Sammes has meant 
that I have been involved in many high profile and often ground breaking
 cases. It has always been good to see the outcome of a trial in the 
news and feel a sense of satisfaction at a job well done. Although not 
working on the technical side of the industry I have been the link 
between Tony and the case officer and/or OIC in far more cases than I 
can number - I do know that I have handled well in excess of 600 
exhibits...&lt;br /&gt;
&lt;br /&gt;
&lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/c/aid=50/interviews/2012/lindy-sheppard-f3-first-forensic-forum-secretary/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/c/aid=50/interviews/2012/lindy-sheppard-f3-first-forensic-forum-secretary/&quot;&gt;Read more&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/10/interview-with-lindy-sheppard-f3-first.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-6925887519351573335</guid><pubDate>Thu, 13 Sep 2012 15:24:00 +0000</pubDate><atom:updated>2012-09-13T08:24:19.607-07:00</atom:updated><title>Interview with Philip Anderson, Senior Lecturer at Northumbria University</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.forensicfocus.com/uploads/pro_news/thumb_1347543907.5897.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.forensicfocus.com/uploads/pro_news/thumb_1347543907.5897.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-weight: bold;&quot;&gt;Philip, can you tell us something about your background and why you decided to teach digital forensics?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
I graduated from Northumbria University with a BSc (Hons) in Business 
Information Technology in 1997 and gained an MSc in Distance Education 
with Athabasca University, Canada by distance learning in 2008.&lt;br /&gt;
&lt;br /&gt;
After I graduated I started working at Northumbria University in a 
number of different IT Support/Developer roles for different departments
 within Northumbria University before becoming a Lecturer in 2001. I 
started teaching programming and also web design and development 
modules. It was in 2004 and 2005 alongside colleagues that we developed 
the undergraduate Computer Forensic degree. Once validated and in its 
first year I naturally changed to teach computer forensic modules (and 
more) as the degree progressed.&lt;br /&gt;&lt;br /&gt;I have over seven years’ 
extensive teaching experience involving Guidance Software (i.e. EnCase) 
in taught computer forensic modules. I have also successfully worked in 
the field, on a number of different forensic examinations of digital 
media for external clients, involving examination, analysis and 
production of extensive reports.&lt;br /&gt;
&lt;br /&gt;
I was appointed a European Network and Information Security Agency 
(ENISA) expert in 2010 for two years for identifying emerging and future
 ICT risks in the area of Information Security Risk Assessment and 
Management. I also served as a Special Constable with Durham 
Constabulary for over 14 years.&lt;br /&gt;
&lt;br /&gt;
For me, the reason I chose and enjoy teaching digital forensics is my 
computing background and the application of that knowledge in 
conjunction with strong investigative skills...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/c/aid=47/interviews/2012/philip-anderson-northumbria-university/&quot;&gt;Read more&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/09/interview-with-philip-anderson-senior.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-356282390581284643</guid><pubDate>Wed, 29 Aug 2012 15:58:00 +0000</pubDate><atom:updated>2012-08-29T08:58:09.902-07:00</atom:updated><title>Windows 8 Forensics webinar - alternative URL</title><description>Sincere apologies to anyone having difficulty connecting to the 
Meetingburner service to view the Windows 8 Forensics presentation - 
please try the following URL on YouTube instead:&lt;br /&gt;
&lt;br /&gt;
&lt;a class=&quot;postlink&quot; href=&quot;http://youtu.be/uhCooEz9FQs&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://youtu.be/uhCooEz9FQs&quot;&gt;http://youtu.be/uhCooEz9FQs&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Josh is available in the webinars forum to answer any questions. Please go &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=9604/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/Forums/viewtopic/t=9604/&quot;&gt;here&lt;/a&gt; if you would like to join in the discussion.&lt;br /&gt;
&lt;br /&gt;
Additionally, a PDF with slides from the presentation can be downloaded &lt;a class=&quot;postlink&quot; href=&quot;http://www.forensicfocus.com/downloads/windows-8-forensics-josh-brunty.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.forensicfocus.com/downloads/windows-8-forensics-josh-brunty.pdf&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
I will get these gremlins out of the system soon, I promise!&lt;br /&gt;
&lt;br /&gt;
Jamie    
    </description><link>http://forensicfocus.blogspot.com/2012/08/windows-8-forensics-webinar-alternative.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-4738226296958635827</guid><pubDate>Tue, 28 Aug 2012 13:22:00 +0000</pubDate><atom:updated>2012-08-28T06:22:07.434-07:00</atom:updated><title>JADsoftware - The Company Behind IEF - Re-Launches As Magnet Forensics Inc.</title><description>JADsoftware, the company behind the industry-leading digital forensics 
product Internet Evidence Finder (IEF), announced on Monday that they 
have re-launched the company under a new name - &lt;a class=&quot;postlink&quot; href=&quot;http://www.magnetforensics.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.magnetforensics.com&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Magnet Forensics Inc.&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
“A lot has changed since I launched JADsoftware and first developed IEF 
while working as a police officer and forensic examiner,” said Jad 
Saliba, Founder and Chief Technology officer of Magnet Forensics.&lt;br /&gt;
&lt;br /&gt;
“After a couple years juggling both jobs, I realized that IEF had 
tremendous potential to help forensics professionals perform better 
investigations, so I decided to dedicate myself to developing the 
software full-time,” Saliba explained.  “We now have a team of talented 
individuals who are working around the clock to take IEF to the next 
level.  The time felt right to transition to a name that better reflects
 what we do, which is help our customers get to key Internet evidence as
 quickly and easily as possible, among a proliferation of online data.”&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.forensicfocus.com/News/article/sid=1927/&quot;&gt;Read more &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/08/jadsoftware-company-behind-ief-re.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-7381450282383599448</guid><pubDate>Mon, 27 Aug 2012 16:15:00 +0000</pubDate><atom:updated>2012-08-27T09:15:35.362-07:00</atom:updated><title>Computer Analysts and Experts – Making the Most of GPS Evidence</title><description>&lt;i&gt;by Professor David Last&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
The many companies that sell software for computer forensics have 
developed products for analysing satellite navigators. Police high tech 
crime units and independent laboratories now use this software on an 
industrial scale. Computer technicians conduct the analyses. This is 
home territory for them, since the biggest component of a vehicle 
satellite navigator is a computer, often running the Linux operating 
system, and with access via a USB connection or an SD card. The analysis
 software extracts addresses which it plots using tools such as Google 
Maps. Specialists extract similar data from satnavs built into vehicles.&lt;br /&gt;
&lt;br /&gt;

But many investigating officers find the results disappointing: “it’s
 just a list of addresses!” Unlike CCTV, ANPR and witness evidence, 
there are rarely times or dates to fit into a chronology. And anyway, 
the addresses are simply destinations for planning routes. The defence 
will point out that no-one can say who entered them, or at what time on 
what date, or whether a route was planned to them, or whether the satnav
 ever went there, let alone in a specific vehicle driven by a their 
client!&lt;br /&gt;
&lt;br /&gt;

Another problem is that the investigating officer may simply not be 
able to understand the data provided. What are all these addresses? Were
 they recorded by the device itself or input by a user? Was that 
inputting an intentional action? The sense of frustration is enhanced by
 the quality of reports generated by much commercial software. The best 
packages provide at least some explanation of the data they contain, the
 worst none at all. The technicians who conduct the analyses often have 
neither the time nor the training to help. This leaves the officer with 
the prospect of presenting and defending poorly understood data in 
court. Some just give up!&lt;br /&gt;
&lt;br /&gt;

But the addresses may at least have intelligence value...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://articles.forensicfocus.com/2012/08/27/computer-analysts-and-experts-making-the-most-of-gps-evidence/&quot;&gt;Read more&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/08/computer-analysts-and-experts-making.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-3592533132043695249</guid><pubDate>Fri, 24 Aug 2012 11:29:00 +0000</pubDate><atom:updated>2012-08-24T04:29:39.772-07:00</atom:updated><title>Generating computer forensic supertimelines under Linux: A comprehensive guide for Windows-based disk images</title><description>When the authors first published this paper, their intentions were to
 develop a comprehensive guide to digital forensic timelines in order to
 consolidate the many fragmented sources of information concerning this 
topic.&amp;nbsp; What they discovered, however, was that quality references were 
often challenging to find among various books, papers, periodicals, 
filesystem specifications and source code.&lt;br /&gt;
&lt;br /&gt;

While conducting their research, they found that practical tool-based
 solutions existed for generating digital forensic timelines, though 
they each had specific limitations.&amp;nbsp; Thus, efforts were undertaken by 
the authors to provide an alternative timeline generation framework.&amp;nbsp; 
Although some in the community had already proposed the use and 
generation of supertimelines, all too often important data sources were 
being left out.&amp;nbsp; In order to rectify this, it became necessary to couple
 additional tools in order to provide maximum evidentiary extraction...&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://articles.forensicfocus.com/2012/08/22/generating-computer-forensic-supertimelines-under-linux-a-comprehensive-guide-for-windows-based-disk-images/&quot;&gt;Read more &lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/08/generating-computer-forensic.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-6201181260016383662</guid><pubDate>Wed, 22 Aug 2012 14:35:00 +0000</pubDate><atom:updated>2012-08-22T07:35:13.403-07:00</atom:updated><title>Webinar: Windows 8 Forensics - A First Look</title><description>Take a first look at Windows 8 forensics in a webinar presented by Josh 
Brunty, Assistant Professor of Digital Forensics at Marshall University.
 Learn about the changes in Windows 8 which forensic examiners should be
 aware of before this new OS is released to the public in October. After
 the webinar Josh will be available in the Forensic Focus forums to 
answer any questions.&lt;br /&gt;
&lt;br /&gt;
Date: Wednesday, August 29 2012&lt;br /&gt;
Time: 11AM EDT US / 4PM BST UK / 15:00 GMT&lt;br /&gt;
Duration: 35 mins&lt;br /&gt;
&lt;br /&gt;
Register today at &lt;a class=&quot;postlink&quot; href=&quot;http://forensicfocus.enterthemeeting.com/m/JXI8IWVX&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://forensicfocus.enterthemeeting.com/m/JXI8IWVX&quot;&gt;http://forensicfocus.enterthemeeting.com/m/JXI8IWVX&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Please share this invitation with any friends or colleagues who might also be interested, thank you.</description><link>http://forensicfocus.blogspot.com/2012/08/webinar-windows-8-forensics-first-look.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-36666403.post-8998300233704222394</guid><pubDate>Fri, 17 Aug 2012 12:57:00 +0000</pubDate><atom:updated>2012-08-17T05:57:40.032-07:00</atom:updated><title>Apple phones are AES-tough, says forensics expert</title><description>Monday&#39;s &lt;span style=&quot;font-style: italic;&quot;&gt;&lt;a class=&quot;postlink&quot; href=&quot;http://www.technologyreview.com/news/428477/the-iphone-has-passed-a-key-security-threshold/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://www.technologyreview.com/news/428477/the-iphone-has-passed-a-key-security-threshold/&quot;&gt;Technology Review&lt;/a&gt;&lt;/span&gt;
 carries a glowing tribute to Apple iPhone security according to its 
author, Simson Garfinkel, a contributing editor who works in computer 
forensics and is highly regarded as a leader in digital forensics. He 
says Apple has passed a threshold “Today the Apple iPhone 4S and iPad 3 
are trustworthy mobile computing systems that can be used for mobile 
payments, e-commerce, and the delivery of high-quality paid 
programming,” thanks to Apple’s heavy investment in iPhone security. 
That is where “threshold” comes in. Apple has crossed it. Even law 
enforcement cannot perform forensic examinations of Apple devices seized
 from criminals, he said...&lt;br /&gt;
&lt;br /&gt;
&lt;a class=&quot;postlink&quot; href=&quot;http://phys.org/news/2012-08-apple-aes-tough-forensics-expert.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot; title=&quot;http://phys.org/news/2012-08-apple-aes-tough-forensics-expert.html&quot;&gt;Read more (Phys.org)&lt;/a&gt;</description><link>http://forensicfocus.blogspot.com/2012/08/apple-phones-are-aes-tough-says.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>