Digital Forensics Now

Heather Charpentier & Alexis "Brigs" Brignoni

A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.

  1. 2 OCT

    Blogs, blogs & blogs!

    Send us a text A baby camel, a high-speed chase, and a heartfelt tribute set the stage for a season opener that is equal parts human and hard-nosed. We pause to honor Mark Baker, mentor, officer, and friend. This episode spotlights a free Belkasoft AI course along with the much-anticipated release of Rabbit Hole v3, designed to tackle complex data structures. From there, it is all about blogs, and there are plenty of them. Mattia explores extraction nuances, showing how AFU versus BFU states and encryption classes still determine what you can recover from iOS and Android. Hexordia provides important guidance on first responder missteps, emphasizing how early handling and precise thinking safeguard the integrity of a case. We also showcase open-source and budget-friendly tools such as Autopsy and IPED, which expand analysis capacity without breaking the bank.  A hands-on demo of Gallery Builder illustrates how to create courtroom-ready visuals, paired with a reminder that “vibe coding” with LLMs is no substitute for validated forensic standards. Finally, we close with the latest LEAPP and LAVA updates, which continue to push practical workflows forward for the field. Notes: BelkaGPT: Effective Artificial Intelligence in DFIR https://belkasoft.com/belkagpt-training Training First Responders in Digital Evidence Handling: How To Protect Your Department from Case-Destroying Mistakes https://www.hexordia.com/blog/training-first-responders-in-digital-evidence-handling The Packd Byte https://www.thepackdbyte.org/ Two New Blogs from Mattia  http://blog.digital-forensics.it/2025/09/exploring-data-extraction-from-android.html https://blog.digital-forensics.it/2025/09/exploring-data-extraction-from-ios.html SWGDE https://www.swgde.org/documents/published-complete-listing/16-f-002-considerations-for-required-minimization-of-digital-evidence-seizure/ Gallery Builder https://github.com/charpy4n6/GalleryBuilder

    1h 15m
  2. 29 AUG

    DFN: 2nd Anniversary

    Send us a text We celebrate our two-year podcast anniversary and discuss the importance of thorough case preparation for CSAM cases, courtroom experience, and extracting evidence from iOS devices. • SANS Difference Maker Awards open for nominations through September 15th across multiple categories • AI debate webinar with Magnet Forensics scheduled for September 17th • Binary Hick's blogs reveal insights on iOS search party and Samsung's Rubin and Digital Wellbeing databases • Discussion on properly preparing CSAM cases for trial with understanding of statutes and evidence requirements • Brett Shaver's article highlights importance of attending trials to understand courtroom proceedings • iOS File Provider Storage in BFU extractions can reveal user-created images with metadata • Updates to LEAPPS tool including CashApp parser improvements and Snapchat returns parser • New Lava viewer coming soon for the LEAPPS project Notes: SANS Difference Makers Awards- https://docs.google.com/forms/d/e/1FAIpQLSeLNMZm3r4c9WSKdNW8XaPh6KRXoS3C1WI51UtnEANe2osCpQ/viewform AI Unpacked #5: The great AI debate with Digital Forensics Now- https://www.magnetforensics.com/resources/ai-unpacked-5-the-great-ai-debate-with-digital-forensics-now/ The Binary Hick New Blogs- https://thebinaryhick.blog/2025/08/19/further-observations-more-on-ios-search-party/ https://thebinaryhick.blog/2025/08/06/not-strange-bedfellows-samsungs-rubin-digital-wellbeing/ Monolith Notes- https://www.monolithforensics.com/free-tools Brett Shavers- Courtroom Trials Are the Final Exam for Your Work. Why Haven’t You Attended One?- linkedin.com/in/brettshavers/recent-activity/all/

    1h 4m
  3. 1 AUG

    From Cryptic Apps to Clickable Maps: Making Sense of Digital Evidence

    Send us a text We're back! After a short break we are back to discuss the growing crossover between real-world events and digital evidence in court cases, highlighting how device data can make or break timelines in high-stakes investigations. This episode covers: Ian Whiffin’s latest forensic work, including iOS power log timestamps, Apple Health data reliability, iPhone battery temperature readings, and IR Doppler functionality – with examples of how these artifacts were used in a recent homicide trial to validate timelines and environmental conditions.Kevin Pagano’s App Store Package Search tool, which translates obscure bundle IDs into recognizable app information for easier analysis.Concerns over the growing reliance on AI in digital forensics, emphasizing the need for human expertise and proper validation in every step of the process.A demonstration of LUMYX, a mapping tool that converts extracted location data into customizable visual timelines for courtroom presentations.Updates on LAVA (LEAPPS Artifact Viewer App) and guidance on writing LAVA-compliant artifacts to improve reporting workflows. Notes: Ian's FOUR Newest Blogs https://www.doubleblak.com/blogPost.php?k=powerlog https://www.doubleblak.com/blogPost.php?k=healthaccuracy https://www.doubleblak.com/blogPost.php?k=temperature https://www.doubleblak.com/blogPost.php?k=doppler Ian Whiffin Testimony https://www.youtube.com/watch?v=kahgl-mIUFE Kevin Pagano Stark4n6 app store package search https://www.stark4n6.com/2025/07/introducing-asp-app-store-package-search.html https://github.com/stark4n6 Elcomsoft Article- AI driven Password Recovery Myth or Reality? https://blog.elcomsoft.com/2025/07/ai-driven-password-recovery-myth-or-reality/ Beyond the Badge AI's role in Modern Investigations https://www.magnetforensics.com/blog/beyond-the-badge-ais-role-in-modern-investigations/ LUMYX https://lumyx.com/ LEAPPs leapps.org How to make LAVA Compliant LEAPP Artifacts https://www.linkedin.com/video/live/urn:li:ugcPost:7356497708628520962/ UFADE  https://cp-df.com/en/blog/ufade_touch.html

    1h 16m
  4. 27 JUN

    Techno, Timeline, and Training Truths

    Send us a text We kick off this episode with highlights from the Techno Security Conference, our 80s-themed outfits, packed LEAPP labs, AI panel discussions, and great conversations with friends and colleagues across the field. We discuss Brett Shavers’ recent series on DFIR entry-level work, and share our thoughts on the need for better forensic training and clearer distinctions between forensics, cybersecurity, and incident response. We also talk about recent tool changes in the industry. Cellebrite’s acquisition of Corellium could make mobile app testing more accessible, and Magnet’s purchase of Dark Circuit Labs. We cover Harper Shaw’s Vehicle Network App, a valuable source of vehicle-related data. Alongside that, we highlight a recent blog on cached screenshots in Windows 11.  Be sure to check out the excellent “Parsing the Truth” podcast. Heather walks through her Easter road trip to test Android's Timeline feature (formerly Google Location History). The location data was impressively accurate, but also showed how easily some points can mislead without the right context. Catch us at IACIS Reno in January and check out the some of the resources we mentioned. Notes: Parsing the Truth: One Byte at a Time  https://parsingthetruth.com/ Cached Screenshots on Windows 11 https://thinkdfir.com/2025/06/13/cached-screenshots-on-windows-11/ The Vehicle Network App from Harper Shaw https://harpershaw.co.uk/the-vehicle-network-app-1 Beklkasoft CTF https://belkasoft.com/belkactf7/ Brett Shavers 6 part series https://www.linkedin.com/pulse/dfir-really-entry-level-brett-shavers-ewsvc/ https://www.dfir.training/new-to-dfir/dfir-career Artifact of the Week/Android Location History https://thebinaryhick.blog/2024/06/28/the-green-look-back-androids-on-device-location-history/

    1h 6m
  5. 16 MAY

    Every Breath You Take, Every Swipe You Make—Your iPhone’s Logging It

    Send us a text Apple devices are constantly recording user activity, yet few forensic examiners are making use of the vast amount of data these systems quietly generate. Apple's Unified Logs and Spotlight databases track nearly everything that happens on an iOS device, often without the user realizing it. Would you believe an iPhone can generate around 1.5 million log entries in just 15 minutes of regular use? These records include highly specific actions—such as the exact moment Face ID is used to unlock a device, when the phone is flipped face-up, or whether a user interacted with Siri or used the device manually. Despite their detail and reliability, these sources are often overlooked in mobile investigations. In this session, we’ll show how forensic practitioners can process and search these massive log sets using open-source tools. We’ll walk through examples of log entries that record actions like toggling airplane mode, launching specific apps like Facebook, or even detecting changes in device orientation. For investigators, this means direct, time-stamped evidence of how a device was used. One of the most valuable aspects of this data is its ability to help distinguish between user actions and automatic background processes. Was an app opened by the user, or was it a system event? These logs provide that level of clarity. We’ll demonstrate how to isolate specific events from millions of entries and construct accurate timelines that reflect exactly what happened—and when. As part of our ongoing work, we’re also focused on improving the accessibility and usability of these artifacts with incorporation into the LEAPPS. If you work with iOS devices, this is a session you won’t want to miss.  Notes: 2026 IACIS in Reno NV- https://www.iacis.com/training/reno-info/ Spotlight- https://github.com/ydkhatri/mac_apt Unified Logs- https://www.ios-unifiedlogs.com/ https://github.com/abrignoni/iLEAPP

    1h 15m
  6. 11 APR

    The "Bear" Essentials of Digital Forensics 🐻

    Send us a text The digital forensics world isn’t slowing down — and neither are we. In this episode, we celebrate Heather’s well-deserved recognition as Cellebrite’s Mentor of the Year 2025. Naturally, there were a few speech mishaps and, somehow, a bear raiding Heather’s bird feeder (yes, actual wildlife). But between the chaos, we get serious about the fast-changing landscape of digital evidence collection. We dig into Amazon’s decision to remove the "do not send voice recordings" setting from Echo devices — meaning all voice requests now head straight to the cloud for AI training. It’s part of a growing industry trend, raising huge privacy red flags. We also unpack a study showing AI search engines misattribute sources at rates over 60%, and discuss how leaning too hard on generative AI risks dulling the critical thinking that digital forensics demands. On the technical front, Christian Peter reveals that some forensic tools alter or delete unified logs during extraction — a serious concern for evidence integrity that can compromise investigations before they even begin. We also walk through a deep dive into Snapchat artifacts, showing how to connect media files to user actions and locations by following database breadcrumbs that automated tools tend to overlook. Through it all, one theme stays clear: while technology keeps racing ahead, the responsibility for getting it right stays firmly with the examiner. As one guest bluntly put it, "We might be the last generation of cognitive thinkers." Tune in for a sharp, insightful, and slightly unpredictable conversation at the intersection of bears, bytes, and the future of digital evidence. Notes: Mobile Forensics Are you nerd enough? https://www.msab.com/events-webinars/webinar-are-you-nerd-enough/ New Podcasts! https://osintcocktail.com/ https://www.youtube.com/@hexordia Amazon "Do Not Send Voice Recordings" Privacy Feature https://www.usatoday.com/story/tech/2025/03/17/amazon-echo-alexa-reporting-privacy/82503576007/https://www.thesun.co.uk/tech/33907850/amazon-alexa-echo-do-not-send-voice-recordings AI search engines cite incorrect news sources at an alarming 60% rate, study says https://arstechnica.com/ai/2025/03/ai-search-engines-give-incorrect-answers-at-an-alarming-60-rate-study-says/ The Slow Collapse of Critical Thinking in OSINT due to AI https://www.dutchosintguy.com/post/the-slow-collapse-of-critical-thinking-in-osint-due-to-ai NIST https://www.nist.gov/news-events/news/2025/01/updated-guidelines-managing-misuse-risk-dual-use-foundation-models Don't lose your logbook https://www.linkedin.com/pulse/dont-lose-your-logbook-christian-peter-ebcje Not All Encryption is created equal https://www.s-rminform.com/latest-thinking/cracking-the-vault-exposing-the-weaknesses-of-encrypted-apps

    1h 14m
  7. 7 MAR

    The Iceberg of Digital Evidence: What AI Can't See

    Send us a text The boundary between tool-dependent analysis and true forensic expertise grows increasingly blurred as AI enters the digital forensics landscape. Alexis Brignoni and Heather Charpentier reunite after a month-long hiatus to sound the alarm on a concerning trend: the integration of generative AI into forensic tools without adequate safeguards for verification and validation. Drawing from Stacey Eldridge's firsthand experience, they reveal how AI outputs can be dangerously inconsistent, potentially creating false positives (or missing critical evidence) while providing no reduction in examination time if proper verification procedures are followed. This presents investigators with a troubling choice: trust AI results and save time but risk severe legal and professional consequences, or verify everything and negate the promised efficiency benefits. The hosts warn that as AI becomes ubiquitous in forensic tools, it dramatically expands the attack surface for challenging evidence in court—especially when there's no traceability of AI prompts, responses, or error rates. Beyond the AI discussion, the episode delivers practical insights for investigators, including an in-depth look at the Android gallery trash functionality. When users delete photos, these files remain in a dedicated trash directory for 30 days with their original paths and deletion timestamps fully preserved in the local DB database—a forensic goldmine for cases where suspects attempt to eliminate evidence shortly before investigators arrive. Other highlights include recent updates to the Unfurl tool for URL analysis, Parse SMS for recovering edited and unsent iOS messages, and Josh Hickman's research on Apple CarPlay forensics. Whether you're investigating distracted driving cases, analyzing group calls on iOS, or simply trying to navigate the increasingly complex digital evidence landscape, this episode offers both cautionary wisdom and practical techniques to enhance your forensic capabilities. Join the conversation as we explore what it truly means to be a digital forensic expert in an age of increasing automation. Ready to strengthen your digital investigation skills? Subscribe now for more insights from the front lines of digital forensics. Notes: Magnet Virtual Summit Presentations https://www.magnetforensics.com/magnet-virtual-summit-2025-replays/ https://www.stark4n6.com/2025/03/magnet-virtual-summit-2025-ctf-android.html parse_smsdb https://www.linkedin.com/posts/alberthui_ios-16-allows-for-imessagesmsmmsrcs-message-activity-7279586088988413952-xHWl https://github.com/h4x0r/parse_sms.db/tree/main Are you a DF/IR Expert Witness or Just a Useful Pawn? https://www.linkedin.com/posts/dfir-training_a-pawn-moves-where-its-told-a-dfir-expert-activity-7292981112463572992-c3wd/ Unfurl https://dfir.blog/unfurl-parses-obfuscated-ip-addresses/ https://github.com/obsidianforensics/unfurl AI to Summarize Chat Logs and Audio from Seized Mobile Phones https://www.404media.co/cellebrite-is-using-ai-to-summarize-chat-logs-and-audio-from-seized-mobile-phones/ Ridin' With Apple CarPlay 2 https://thebinaryhick.blog/2025/02/19/ridin-with-apple-carplay-2/ Hello Who is on the Line? https://metadataperspective.com/2025/02/05/hello-who-is-on-the-line/

    1h 7m

About

A podcast by digital forensics examiners for digital forensics examiners. Hear about the latest news in digital forensics and learn from researcher interviews with field memes sprinkled in.

You Might Also Like