MSAB Joins CASE Initiative On Digital Forensics

MSAB, the global leader in mobile forensic solutions, today announced that the company has joined other industry leaders to work collaboratively on the Cyber-Investigation Analysis Standard Expression (CASE) initiative.  CASE is a community-developed specification language or standard designed to serve a broad range of cyber-investigation domains, including digital forensic science, incident response, counter-terrorism, criminal justice, forensic intelligence and situational awareness.

The CASE Initiative began in 2015 at the U.S. Department of Defense Cyber Crime Center (DC3).  The standard was released as open source in 2017 and its adoption grew following a meeting at Europol’s European Cybercrime Centre. The primary motivation for CASE is interoperability - to advance the exchange of cyber-investigation information between tools and organizations.

Digital forensic specialists routinely use software tools to extract, parse and analyze information on a hard drive or a mobile phone. Today, it is often difficult to aggregate the digital information in a standardized way. For every tool available, investigators have to match the extracted data with the tool specifications, making the process time-consuming and costly. CASE supports automated normalization, combination, correlation and validation of information, enabling investigators to spend less time parsing and aggregating data and more time analyzing.

“We welcome the chance to work with other organizations and technology providers to modernize the digital forensics processes that exist today,” said Joel Bollö, MSAB CEO.  “Criminal enterprises and other threat actors are becoming more sophisticated in using mobile devices, the Internet of Things, encryption and new apps. Collectively we will all be strengthened by helping the digital intelligence community work together more effectively and share information more easily.”

In addition to MSAB, other participants in the CASE Initiative include the U.S. National Institute of Standards Technology (NIST), the U.S. Department of Defense Cyber Crime Center (DC3), Europol’s European Cybercrime Center (EC3), governments and law enforcement agencies, industry peers, and academic institutions.

GlobalNewswire:

You Might Also Read:

Police Are Mishandling Digital Forensic Evidence:

Digital Forensics, Incident Response & Attribution:

 

« The Five Most In-Demand Cybersecurity Roles
Can Russian Hackers Be Stopped? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.