Submit to the Magnet User Summit Call for Papers (CFP)
New to the Magnet User Summit in 2019: guest speakers! This year, our event format has expanded to a two-day conference and we are looking for a wide range of speakers from outside our organization to...
View ArticleFind More Victims, Catch More Suspects: How Creative Technology Partnerships...
Building the technology needed for efficient, successful child exploitation investigations is as much a team effort as the investigations themselves. Many of the technologies used to capture,...
View ArticleWebinar gravado: Usando a tecnologia para encontrar informações de forma...
As evidências digitais estão chegando a um ritmo esmagador. Com isso as investigações exigem mais tempo para obter os dados, a tecnologia pode desempenhar um papel crucial para que as evidências...
View ArticleDelta Packs Let You Download AXIOM Updates Quickly
Initially released with Magnet AXIOM 2.3, forensic shops that air-gap their equipment can utilize delta packs when updating their equipment. Delta packs allow for quick downloads of only the changed...
View ArticleShared Space for DFIR Contributions: An Interview with Alexis Brignoni
Forensic examiner, researcher, and blogger Alexis Brignoni has been hard at work. Over the past two years, he’s founded both the Initialization Vectors blog, and a GitHub where you can find...
View ArticleTo the Cloud! Get the Evidence You Need to Move Cases Forward
This webinar is co-hosted with NW3C. Some of the most important sources of evidence in a criminal investigation are also the hardest to get. An encrypted, password-protected mobile device can be...
View ArticleRecorded Webinar: Apple’s Tween Years: iOS’ Maturation from 10 through 11 and...
At times over the past three years, Apple’s mobile operating system changes seemed so mercurial that the parallels to tweens’ rapid maturation couldn’t be missed. iOS 10 changed the backup structure,...
View ArticleMeet Magnet Forensics’ Training Team: Christopher Cone
We conclude our “Meet the Forensic Trainer” series this year by introducing Chris Cone, new to Magnet Forensics’ Training Team as of October. Chris comes to us from an extensive background in Arkansas...
View ArticleRecorded Webinar: Find More Victims, Catch More Suspects: How Creative...
Please Note: This Webinar is for Law Enforcement Only. Building the technology needed for efficient, successful child exploitation investigations is as much a team effort as the investigations...
View ArticleG Suite Admin Support and Screen Time Artifacts Now Available in Magnet AXIOM...
Magnet AXIOM 2.8 is now available for download. Read more about what’s included in the latest release of AXIOM, including G Suite Admin Support, iOS Screen Time and other additional performance...
View ArticleA Look Back at 2018: Resources for Mobile Investigations
As 2018 draws to a close, we’ll be taking a look back at some of the resources we’ve offered this year to help forensic examiners in their investigations. This blog is a roundup of a year’s worth of...
View ArticleAnnouncing This Year’s Keynote Speaker at Magnet User Summit!
We’re pleased to announce that the keynote speaker at this year’s Magnet User Summit in Nashville will be Ovie Carroll, Director for the Cybercrime Lab at the Department of Justice, Computer Crime and...
View ArticleA Look Back at 2018: Resources for Corporate Investigations
Last week we looked back at some of the resources we’ve offered this year to help forensic examiners in their investigations — specifically about mobile forensics. This week, we’re highlighting some...
View ArticleGetting Evidence from iOS Screen Time Artifacts
Screen Time, a new feature added to the release of iOS 12, is designed to supervise activities that are going on within the device. Whether set up from a parental standpoint to limit how much time is...
View ArticleAnalysis of GrayKey Images with AXIOM: New KnowledgeC Database Artifact...
With the past few releases of Magnet AXIOM, we’ve added new artifacts found on iOS file system images seen primarily when investigators have access to tools such as GrayKey. With the release of AXIOM...
View ArticleA Look Back at 2018: Resources for ICAC Investigations
Continuing our look back on the resources we’ve offered in 2018, this week, we’re highlighting the webinars, white papers, videos, and blogs that are focused on Internet crimes against children (ICAC)...
View ArticleThree Newer Things that May Surprise You about iOS Forensics
By Jessica Hyde, Director, Forensics I recently delivered a webinar, “Apple’s Tween Years: iOS’ Maturation from 10 through 11 and into 12,” followed by an iOS and cloud forensics focused trip in New...
View ArticleMemory Analysis for Investigations of Fraud and Other Wrongdoing
Computer memory is more than just another digital data source in an investigation—it’s a potential trove of actionable intelligence. Faster than acquiring a hard drive and composed of no more than a...
View ArticleHide, Seek, and Find: Memory Analysis for Fast Incident Response
Few incident responders dispute the importance of memory analysis in incident response. Not only is memory acquisition faster than acquiring the hard drives of multiple (even hundreds of) computers;...
View ArticleMagnet AXIOM 2.9 Includes Enhanced Custom Artifact Support and New Android...
Magnet AXIOM 2.9 is now available for download! Read more about what’s included in the latest release of AXIOM, including enhanced custom artifact support, new logical acquisition options for Android,...
View Article