Visual Forensic Analysis

Interesting research in the field of Visual Computer Forensic Analysis has been presented at Black Hat 2009 by Greg Conti and Erik Dean from the United States Military Academy

Their research uses a visualisation tool to “view” files in a system being forensically analysed. In this manner, a file that is considered unknowned from its filename can be identified by the way it looks. A MS Word file will look different to say a JPEG file. To do this traditionally would require the analyst to use two viewers.

The researchers  say, “Visualization has the potential to dramatically change the field of computer forensics. Each time we created a new visualization tool there were always surprising insights. Visualizations create windows on data that hasn’t ever been readily visible, much to the dismay of people trying to hide information in the dark corners of a computer.”

Technorati Tags: , , , , , ,

Source: http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202428248638

Forensic Lab Accredited

Yet another forensic lab has received accreditation in the US. The Northwest Regional Computer Forensics Laboratory in Portland, Oregon, handles computer and electronic forensic analysis. FBI Officials were present when the lab was officially accredited by the region’s law enforcement agencies.

There are less than 40 labs around the world which have been accredited for this purpose by their local law enforcement agencies. It seems in Australia, we need such labs to allow our law enforcement agencies to delegate forensic analysis to trusted experts.

Technorati Tags: , , , ,

Source:  http://seattlepi.nwsource.com/local/6420ap_or_forensics_lab.html