View allAll Photos Tagged digitalforensics
Sachin Dedhia one of the known cyberscurity investigator was invited as an Ethical hacker in Zee business channel for the Aadhar Data TRAI chariman Twitter story.
Connect with us: www.skynetsecure.com
Contact : Info@skynetsecure.com
After failng to download dcfldd (which is a little more user friendly) I just went back to the old favourite dd. Using Ubuntu's disk tool I identified the device and its partitions, and imaged each one, finally imaging the whole device to catch any data in unallocated space. At a size of 32Gb imaging of the largest partition was quite quick, and also didn't take up too much space...
The device is /dev/mmcblk0p1 (-4 for each partition)
p1
p2 134 Mb
p3 32Gb The main OS bearing partition, NTFS format
p4
A computer forensic analyst reviews information gathered from a computer seized during a DSS investigation.
...in the mock court room, after giving evidence as expert witnesses (part of their assessment). Some news on the mock court room...
"Thu, Feb 4, 2010: The first mock courtroom in the south east of England which will train lawyers, expert witnesses, social workers and probation officers of the future was opened yesterday at the University of Portsmouth by Resident Judge of Portsmouth and the Isle of Wight, Richard Price. The £1m development is an exact replica of a crown court, complete with dock, witness box, public gallery, jury room and interview rooms. State-of-the-art audiovisual facilities allow court proceedings to be filmed and simultaneously fed into adjacent teaching rooms or recorded for future feedback sessions. "
Asus eeepc (battery life 5 hours) running a forensics linux (usb stick) (Deft). Seagate 500Gb usb powered external hard drive. Tableau write blocker. (suspect bare hard drive).
In order to run xways and ftk on the Mac (Win7 partition) I need the two dongles. Loss of these keys would not be good! XWays has a warning that says that if this is a public computer there is no way they will replace the key if you forget it!
Data 'secretly' recorded by my Android phone OS, plotting the location of cell masts and wifi access points I've hit, a nice clear example. I did an industrial placement visit in west London, and this screen shot shows the series of points where my tablet connected as the train traveled north. For example you can see I traveled on a Southern Railways route via Crawley rather than the more expensive SouthWest trains route via Guildford. Date and time is recorded. Potentially useful as digital evidence I suppose, and useful for a digital forensic investigator to know about. The location cache typically records the last 50 cell masts and the last 200 wifi points. Rooted apks can be used to display the data, or clear it, and you can turn it off in Android Settings if it worries you.
A forensic expert examines a mobile device that was seized during a investigation. Digital forensic experts support DSS cases by analyzing computers, mobile devices, and other technology for evidence of criminal activity.
The Intel Computer Stick, has 32Gb of storage internally (NB: storage is a couple of Gb larger, 32Gb is the size of the active partition on which the OS is loaded), and 2Gb of memory. It also has a full size USB port, and a microUSB for power. Finally it has a microSD port, and of course an HDMI plug. Connectivity via wifi and bluetooth. Video output via its HDMI plug.
So how can we get a forensic image? Not easy to do directly as there is no easy way to extract the storage device (could do it with chip off I suppose). I opted for a boot into Ubuntu and an imaging to an external device using dd. Not perfect (and I did not even use a 'forensic' linux) but a process that does not require much equipment and does a reasonable job with little chance of the original evidence being changed.
These sticks come with a version of Windows10 (which is somewhat less annoying than Windows8), and can work well as media platforms. You can also upgrade them to Linux quite easily.
The new graphical user interface for autopsy only runs on Windows, but can be run using wine. In order to get it to work you need to install java jre 1.6 or higher in wine, and then download autopsy and tsk. Then just run autopsy.exe from the Ubuntu GUI, opening with Wine. (Seems like it is best to configure this app for Win7). You will need openGLX on your Ubuntu.
A computer forensic analyst checks his notes as he analyzes evidence to support a DSS investigation.
A computer forensic analyst reviews information gathered from a computer seized during a DSS investigation.
A forensic expert examines a mobile device that was seized during a investigation. Digital forensic experts support DSS cases by analyzing computers, mobile devices, and other technology for evidence of criminal activity.
This image is excerpted from a U.S. GAO report: www.gao.gov/products/GAO-14-354
INFORMATION SECURITY: Agencies Need to Improve Cyber Incident Response
A digital forensic expert hands sealed evidence to another expert to store in a secured location. Evidence collected as part of an investigation is processed in one location, then transferred to a secure location in another room to maintain the integrity of the evidence.
Here we see a USB hub attached to the single Intel Computer Stick USB port. This has the wireless mouse, a USB keyboard, a Seagate external HD (destination for images), and a bootable USB with this image the unofficial 'official' Ubuntu Linuxium live CD:
An interesting log of my overland and sea journey between Portsmouth and Belfast, and my cycle tour around the north east coast (folding airnimal), and yes it was cheaper than the cheapest air fare too (just to bury that old chestnut that its always cheaper by air). ...and it was certainly more fun. From a forensics point of view, and an e-privacy point of view, it could provide intelligence on a persons locations, but its far from perfect, and its based on the masts that the person's phone connects to, not their actual location (take a look at the Islay connection for a good example!).
Communicate Covertly and Hide Secret Messages in Plain Sight with Steganography
Read more here! itstac.tc/gQh1Cn
Hello, Welcome to Gabiarts Art Gallery this is a makeover painting of Yali which has been taken inspiration from real-life temples, carvings, pillars, and sculptures and drawn manually, Then digitized using Adobe Illustrator and then painted using Adobe Photoshop with custom brushes, the theme of the painting is to give temple sculpture effect using custom brushes. The theme of the painting is mythical style painting.
What is Yali? Where did it live?
Yali is one of the mythical creatures living around the world Yali can be found in most parts of the world with different names and terms, mainly Yali is found in southern parts of Asia such as India such as the Kailasanathar Temple, Tharamangalam, Salem district, Tamil Nadu. , Sri Lanka, and other parts of the world. These creatures are said to be lived in the 16th Century
Yali's and their types :
There are many types of Yali lived around areas the following Gaja - Vyala - Elephant Headed, Khara - Vyala - Donkey Headed, Vanar - Vyala - Monkey Head
Mahisha - Vyala = Buffalo Head, Kroda = Vyala - Bear headed, Gandki - Vyala = Rhino headed, Aja - Vyala = Goat headed, Vrika - Vyala = Wolf headed, Shardul - Vyala = Tiger Headed, Harin - Vyala = Deer Headed, Shvan - Vyala = Dog Headed, Griffin - Vyala = Vulture Headed (Also known as Griffin from the other countries), Nir - Vyala = Human Headed, Ashwa Vyala = Horse Heade, Sinh - Vyala = Lion Headed
But mostly the Elephant Headed and the Lion Headed is the most famous among those
--------------------------------------------------------------------------------------------------------------
More info about the painting [Makeover of Gaja Yali in adobe Photoshop, Illustrator]
With my Japanese Corporate Students - Inada Morihiro, Toyama Takeshi, Kikuchi Takeshi, Ohata Kentaro and Shigeeda Kan
Digital Forensics is the science of finding evidence from digital media like the computer, mobile phones, servers, or networks. It is the process of preservation, identification, extraction, and documentation of computer evidence that can be used by the court of law. Digital Forensic is a sub-domain of Cyber security, digital forensic experts focus on past events rather than the prevention of current or future happenings.
We are living in an age of automation and digital era, so the digital media plays a vital role in every aspect of the society in which we live. Hence there is a great demand for Digital forensic experts as it has generally with Cyber security experts. As per BLS estimate, there is an 18 percent job growth rate in information security analysts, a cyber security role that shares some duties with digital forensic analysts by 2024.
ABOUT THE PAINTING :
Hi there, Welcome to Gabiarts Art Gallery this is all about the makeover of ' Narilatha the Srilankan mask'. The ''Narilatha'' mask is a beautiful wooden mask from Sri Lanka (Ceylonese). Narilatha is not only a wooden mask but it is also a traditional painting (design/motif). This flower is related to Buddhism. This flower is mainly found in southern parts of Asian countries. It represents a woman shaped flower with organic patterns in them. Narilatha is a flower which is shaped like a women this flower is evolved as a wooden mask in Srilanka
THE MAKEOVER OF NARILATHA :
First the painting is sketched manually by taking reference from live masks, and using creativity to draw them. Then the sketch is digitilized using Adobe Illustrator and then it is painted using Adobe Photoshop with custom brushes which makes the painting look alive. This painting is painted and sketched with a very high detailed level which gives the painting a uniqueness to this painting.
MY GOAL ON MAKING THESE PAINTINGS :
My main goal in making these paintings is to transform my culture and my arts towards the next/future generation. My main motive in creating these paintings, there is only a few references and paintings related to my culture. My paintings were made using taking reference from live resources such as sculptures, mask and temples and also I have also used my style to make these paintings unique and stand out. My paintings are very detailed that it cannot be found anywhere.
Technocamps is a £6 million project led by Swansea University, that inspires young people aged 11-19 on a range of exciting computing-based topics such as robotics, game development, animation and digital forensics.
ABOUT THIS PAINTING :
Hi there, Welcome to Gabiarts Art Gallery in this is all about the makeover of GURULU RAKSHA MASK, The Gurulu (Garuda) is a mythical bird which was ridden by Vishnu, one of the Hindu gods. This mask is portrayed as a mythical bird destroying or killing a snake. The mask represents the bird that Vishnu used to take the fight on. The snake located about the mask is called Naga. This represents protection. Sri Lankan's use this mask in their homes to bring good luck and to keep them away from danger. This type of painting is culture style art
THE MAKEOVER OF GURULU RAKSHA MASK :
First, the painting is sketched manually by taking reference from real live masks and using my creativity to draw them manually, and then it is digitized using Adobe Illustrator and then it is painted using Adobe Photoshop with custom brushes, which makes the paintings look live. Also, many details were given to these paintings to give a unique feel to the painting.
MY GOAL ON MAKING THESE PAINTINGS :
My main goal in making these paintings are to transform my culture and art towards the next generation. Also, there were only very few references for this type of paintings which were taken from live masks and using my creativity to create these paintings, These paintings are very detailed ones which cannot be found anywhere.
WATCH THE MAKEOVER:
ABOUT THE PAINTING :
was a mighty king of Lanka, Lanka was a very prosperous place under his rule. He is a devote of Lord Shiva. Many books and sculptures show Ravana with 10 headed picture that does not tell that he has 10 heads according to the legends, the 10 heads of Ravanan represents the ten negative emotions of humans in their life. This painting portrayed Ravana as passive. To my knowledge, I had drawn the world's first passive Ravana which is also portrayed by my another painting
In today's generation Ravanan is recreated as the devil (satan) in their own culture itself this is because the new paintings of Ravana were drawn without his original marks (Sivam) the registers a different Ravana in people's minds but the temple sculptures and ancient books have his real identity
He is criticized in many cultural comics as a devil who does bad things to others and paintings were drawn which was criticizing him Facts are there that he did them but there are many good qualities in him like his skills, helpings but these things were hidden and his negative facts were highlighted by other some religious people. Without knowing the fact that Ravana is a good emperor many people celebrate his death as Dussehra Excluding these facts without changing my tradition and its identity we artists wanted to create true and correct paintings of my tradition and transform them for the next generations.
The Ancient Lion – Digital Painting
Hi there, Welcome to Gabiarts Art Gallery. Digital painting
the ancient lion, this painting is a remastered and digitalized version of the sculptures and paintings found in most Asian countries this painting is drawn manually by taking reference from this resource and then digitalize them using Adobe Illustrator and then painted with custom brushes using Adobe Photoshop. This theme of the painting is temple sculpture style
About the Painting;
This is a painting of an ancient lion which lived many centuries ago… This lion is also represented as the god’s vehicle where they used t ride on them. These paintings and sculptures of the ancient lion are mostly in the form of pillars sculptures and paintings which can be found in most Asian countries such as India, Bahram, Sri Lanka, Indonesia, Singapore, and Malaysia
My Goal In Making these paintings;
My main goal in making these paintings is to transform my culture and my arts towards the next/future generation. My main motive in creating these paintings, there are only a few references and paintings related to my culture. My paintings were made using taking reference from live resources such as sculptures, masks,s, and temples, and also I have also used my style to make these paintings unique and stand out. My paintings are very detailed that they cannot be found anywhere.
Get Connected with us
Watchmaking here :
Lord Krishna painting making: youtu.be/B-Vn2iJxiK4
VISIT MY WEBSITE : ( LOT MORE UP THERE )
: 2016 : Top 25 IT security companies ( Consultants Magazine)
2017 : 10 best security company ( Thesiliconreview Magazine)
The journey of Skynet Secure Solutions began with a desire to raise awareness about cyber security in India and nurture companies to avoid threats in cyber domain. After 6 years of diligent hard work and efforts of our Founder Mr. Sachin Dedhia and Co-Founder Mrs. Priya S. and our fellow Skynet Secure Trainees, we can proudly say that we have managed to enlighten various corporate organizations, civilians by conducting over 1000 seminars and workshops across India and overseas, with active participants exceeding over 1, 00,000 and countless more online .
Skynet Secure has been actively associated with Cyber Cell Division of Mumbai Police and other police departments across India for providing training and assisting in cyber crime cases, and on the corporate front associated with organizations like Bombay Chambers, Indo American Society, Princeton Academy and CA institute of India for corporate training and workshops.
Our current clientele includes the “Fortune 500” companies of India. We also have been performing cyber security audits for various government departments as well as for our overseas clients from U.S. , U.K. & Europe.
From Top 25 in 2016 to Top 10 IT security companies in 2017, in our article reviewed by @thesiliconreview is one for the books and remembered. Check it out below:
In 2016 : we were among the Top 25 IT security companies
www.consultantsreview.com/…/cyber-security-special-…/ page38
In 2017 : we are now among the 10 best security companies in India
thesiliconreview.com/…/skynet-secure-solutions-meet…/
From working in a small room with 6 people to now having team strength of exceeding over 50 people & having multiple branches all over India, with 2 offices coming up abroad pretty soon, we’ve come a long way.
Looking forward for your continued support and blessings.
Cyber Crime Investigations & Cyber Security services
Contact : Info@skynetsecure.com
+91 8655550168
Lord Mahavishnu - Digital Painting
Hi there, Welcome to Gabiarts Art Gallery. This is a painting about Lord Mahavishnu, He is one of the most important gods of the Hindu culture. This painting is a remastered version of temple paintings which is drawn manually and then digitalized using adobe illustrator and painted using adobe Photoshop with custom effect brushes
ABOUT THE PAINTING:
Lord Mahavishnu is well known as the absolute protector of the universe beyond human comprehension and all attributes, Mahavishnu is said to lie in the casual ocean Generally Lord Vishnu described as having blue skin. The color blue represents His infinite force. According to a Dyana mantra of Lord Vishnu we can know that His complexion is as cloud of blue sky.
MY GOAL ON MAKING THESE PAINTINGS:
My main goal in making these paintings is to transform my culture and my arts towards the next/future generation. My main motive in creating these paintings, there is only a few references and paintings related to my culture. My paintings were made using taking reference from live resources such as sculptures, mask and temples and also I have also used my style to make these paintings unique and stand out. My paintings are very detailed that it cannot be found anywhere.
Photographic techniques capture electromagnetic wavelengths beyond human vision, revealing features invisible to the naked eye. These signals are processed into interpretable forms using methods like color mapping.
Pink lacks a specific electromagnetic wavelength, while grey poses a limitation due to its representation of only intensity—a blend of light and dark without spectral specificity. Imaging techniques reliant on spectral variation produce identical results for greyscale images unless non-visible data is present. Deviations from this uniformity may indicate errors, misinterpretations, or unknown phenomena.
Contention persists over analytical debates, including dismissible claims like Van Allen belt dangers and contested evidence of lunar mirrors. The precision of laser reflections targeting a moving 3x3-foot marker on the Moon highlights technical skill but often fails to resolve skepticism. For instance, a 0.1° shift moves a laser spot 670 km across the Moon's surface.
Forensic analysis (2022, 2023) of Apollo 11–17 photographs assessed authenticity claims. Images of humans in space, Earth, and the Moon's distant views were validated, but Moon landing visuals showed variations, suggesting diverse techniques may have replicated certain elements.
PEMi (Photoelectromagnetic Image) software enhances forensic analysis by differentiating natural and artificial light sources, revealing hidden features. Each PEMi-ID links to original sources, ensuring traceability and comparison.
Further exploration is available:
Lehti, A. (2024). The Silence of Inquiry: Forensic Reflections Reveal a Crisis of Perception. figshare. doi.org/10.6084/m9.figshare.28078982
Credits
2022-2025 © Andrew Lehti
1961–2023 © NASA, ESA
Software: PEMi (GitHub: andylehti/PEMi.git)
Explore PEM-I: pemimage.streamlit.app
CC BY-SA 4.0 License: creativecommons.org/licenses/by-sa/4.0/
Research:
Lehti, Andrew (2024). Cognitive Psychology and the Education System. figshare. Collection. doi.org/10.6084/m9.figshare.c.7532079
CC BY-SA 4.0
This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit creativecommons.org/licenses/by-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.
Intro to Digital Forensics: Tools & Tactics
Ripshy & Jacob
Def Con 20
Rio All Suites Hotel & Casino
3700 West Flamingo Road
Las Vegas, NV
(702) 777-7777
[07.26.2012]
In its seven years, BloomCON has attracted more than 5,000 attendees for talks by cybersecurity experts, as well as stations focused on topics such as lock picking, hardware hacking, the Internet of Things, car hacking, drone hacking and flight control. In conjunction, the Bloomsburg Children's Museum has held Hak4Kidz on campus, featuring many related activities to include coding stations, LEGO programming, snap circuits, reverse engineering, and an escape room. 💻🇨🇩🔓⚙️📱💽🐾 #HuskyUnleashed #STEM #DigitalForensics #ComputerScience #BloomUpward #cybersecurity #hacking #community
An introduction to investigating IPv6 networks
An Introduction to investigating IPv6 networks
by: Bruce J. Nikkel
nikkel@digitalforensics.ch
July 19, 2007
Later today, I'll be doing a talk for the senior leadership team of the RCMP - that's the Royal Canadian Mounted Police - on the future impact of AI. I'll have a few hundred police and civilian officials in the room and will take a pretty broad but intense look into the future. I'll be covering both the opportunity for the use of AI for crimefighting and public safety responsibilities, but will also take a look at the fact that the acceleration of AI leads to an accelerated risk of unknown crimes yet to be committed based on technologies that don’t yet exist!
Another way to put a spin on this? It’s the risk of unknown crimes yet to be committed based on technologies that don’t yet exist! That’s the future of policing!
(And yes, I've had a little fun with AI in this post. Look carefully, and that's me in uniform!)
The story of AI in policing is a complex one, involving many new opportunities and new skills to battle comprehensive new criminal risks - and one that is wrapped up in a lot of controversy when it comes to privacy and constitutional rights. And there is no doubt that these issues are going to become even more complex as things speed up.
Let's start here. AI isn't necessarily new to the policing world - various police forces have already been using various forms of AI for quite some time. For example, just this August, Sentry AI’s “digital coworker” Sentry Companion was used to help arrest 12 suspects in a mail and package theft ring in Santa Clara. The software was used to analyze security camera footage, looking for defined "suspicious activity" - utilizing 'machine vision,' an aspect of AI that has been with us for quite some time and is already quite mature. There are countless other examples, including controversial programs in Canada, Britain, and elsewhere.
“Predictive policing” is also a very real trend - just as Spotify might recommend various songs on your musical preferences, or Amazon offers up products based on your shopping habits, predictive policing uses an algorithm to try to prevent crimes before they happen, based on algorithmic analysis of video or other sources. There is also the field of OSINT, or 'open source intelligence', where police forces use analysis of the Web or social media channels to find existing and new, emerging threats. All of this comes with some degree of controversy, of course, with a lot of debate, as both government legislators, ombudsmen, and public watchdog groups argue strongly against the privacy implications that come with this new era of intelligent technology, particularly video and image surveillance.
Even so, some “intelligence” doesn’t use actual AI. For quite some time, a few police forces have been using what are known as “super-recognizers” - police officers who have an exceptional ability to remember and identify faces. These individuals can go through massive amounts of security camera footage to identify suspects - and were used in 2011, for example. A series of riots in the UK. Even so, artificial intelligence and facial recognition software are seen by some as the future of crime-fighting around the world.
But what about the future? From a crime perspective, it’s pretty bleak. There is no doubt that there will be a significant number of AI-driven crimes, wherein criminals will create deepfakes for purposes of extortion, algorithms that can hack into computer systems to commit financial crimes, or algorithms that can analyze and manipulate financial data to influence or cripple financial markets. And there is absolutely no doubt that there will be an increase in AI-related cybercrime. As more and more aspects of our lives move online, we’ll see cyber fraud, hacking, data theft, AI-managed identity theft, and much more. One estimate suggests that by 2033, 80% of all crimes will be cybercrimes. The big problem here? Perpetrators are often hidden behind anonymity and evidence is largely digital, and AI will only accelerate that opportunity.
Then there is the crazy Matrix-like science fiction crime of the future that will involve various aspects of AI - the hijacking for terrorist purposes of autonomous vehicles or drones, the hacking of brain-to-computer interface technology, or digital currency theft (which is already occurring.) Remember my favorite phrase that starts "Companies that do not yet exist will build products not yet conceived.....?" The logical extension of that is that "nefarious elements will commit crimes not yet imagined using concepts not yet in existence with tools not yet in existence," or something like that.
What other issues might the RCMP be faced with? The list is vast. There are fast-emerging new digital identity crimes and synthetic personas - RCMP officers may need to unravel networks of AI-generated identities used for fraud, espionage, and misinformation campaigns. They may work with AI-driven analytics to identify patterns, trace digital fingerprints, and verify the authenticity of identities in cyberspace, which could become critical in fields from finance to national security. There is also a heightened risk of cyberattacks on critical infrastructure in Canada - everything from smart grids to autonomous transportation, which makes it a prime target for cybercriminals and state-sponsored attackers. The RCMP could play a critical role in securing vital national assets by detecting, investigating, and mitigating cyberattacks on healthcare, energy, and transportation networks, possibly using predictive AI to preemptively identify threats.
We also need to consider genetic data and crime - with genetic data increasingly stored online and used for medical, legal, and employment purposes, the RCMP could find itself managing complex crime cases involving the theft or misuse of this sensitive information. They may need to protect against bio-crimes that manipulate or weaponize genetic data, as well as address crimes where unauthorized access to genetic profiles leads to discrimination or exploitation.
What about AI-driven fraud and deepfake evidence? The RCMP will likely encounter AI-driven fraud where individuals are impersonated using deepfakes or audio manipulation, affecting cases from fraud to defamation. They’ll need tools that can authenticate real versus synthetic media, which will be critical in maintaining trust in digital evidence. The ability to verify the authenticity of video and audio recordings may become a core competency in future investigations. (This issue is of particular interest to me, as I was an expert witness back in 2003 in a Federal Court case as to the admissibility of the Internet as an evidentiary tool in a trial. Now imagine the impact of AI!)
In addition to these technological challenges, the RCMP will likely need to invest in training that combines traditional investigative skills with expertise in digital forensics, AI ethics, quantum computing, and cyber-psychology. Keeping the balance between maintaining public safety and respecting privacy and civil liberties will be paramount as the nature of policing evolves!
Here's the bottom line - as AI develops at a much faster speed with new technologies and ideas coming at us almost daily, criminals will likely find new and creative ways to use it to commit crimes - and that means that police forces must develop the skills, knowledge, and advanced capabilities to keep up. Police will need training on new investigative techniques and technologies involving AI - such the the use of advanced forensic software and tools that can collect and analyze digital evidence, and AI-powered video analytics tools that can detect anomalies and predict emerging threats. I've got a chart in my slide deck that walks through the nature of the opportunities.
Like any industry, career, and profession, the world of crime-fighting and public safety is in the midst of a massive change as a result of the acceleration of AI. It's not necessarily new to them - but the speed at which new issues, challenges, and opportunities are coming about is rather staggering.
----
#FutureCrime #AIinPolicing #CyberSecurity #DigitalForensics #EmergingThreats #PredictivePolicing #PublicSafety #TechDrivenCrime #CyberCrime #AIandEthics
Original post: jimcarroll.com/2024/11/daily-inspiration-policing-ai-its-...