
Read the latest digital forensics news – SANS releases DFIR Summit playlist, UAC launches v3.2.0, Neal Ysart discusses the Coalition of Cyber Investigators, and more.
As we conclude the S21 Transcriber Spotlight Session, we want to highlight the final set of powerful features that make this fully offline, secure tool indispensable for modern investigations.
Every transcription stays linked to its original media, giving you full control to review what was said and when.
Know exactly who said what and when. Automatically separate speech by speaker, label clearly, and assign custom names to create easy-to-follow, court-ready transcripts.
Edit, add context, correct terminology, flag key lines and search for details without needing to export or switch tools.
From media import through review and editing to court-ready reporting, S21 Transcriber provides a seamless, fully offline workflow with detailed, timestamped reports.
As part of the spotlight, you’ll get full access to your own trial account and a self-guided training hub, including:
No pressure. No pitch. Just hands-on experience with the tools that could change how you work.
If what you saw during this session could support your unit’s workflow, we’d be happy to help you integrate S21 Transcriber into your environment, whether that’s a single workstation or a fully connected review suite.
Our next Spotlight Session will focus on S21 LASERi-X, a comprehensive solution for rapid victim identification, CSAM categorisation and media review. Its advanced AI capabilities provide enhanced review efficiency, prioritisation, and the ability to act faster.
We’d love to see you there.
Want to see real world usage?
Case Studies – www.semantics21.com/case-studies
Follow us on LinkedIn or X to catch each Spotlight update, or head to 👉 www.semantics21.com/spotlight to request your free licence and training.
Sign up 📝 http://bit.ly/3I58STF
No fuss. Just better forensics.
REGISTER NOW HERE
Retailers are under attack. Recent ransomware and malware campaigns have exposed critical weaknesses in how retail organisations detect, investigate, and respond to cyber threats. These attacks don’t just disrupt operations — they steal sensitive customer data, paralyze supply chains, and cause lasting reputational damage.
In today’s high-speed threat landscape, traditional investigation methods are too slow and fragmented. You need to act within minutes, not days!
Join this webinar to learn how modern forensic techniques can help your team launch immediate, coordinated investigations — no matter where the data resides. We’ll explore how to gain visibility across all endpoints, enable real-time collaboration between teams, and recover critical evidence from remote or mobile environments.
If you’re responsible for protecting your brand, your data, and your customers — this is a session you can’t afford to miss.
Key Takeaways:
Thursday, September 4, 2025
4:00 PM (CEST) | 3:00 PM (BST) | 7:00 AM (EDT)
Exterro Marketing
Harsh Behl, Vice President Product, Exterro
Matt Blackband, Associate Director – Head of Digital Forensics, Grant Thornton
In just one year, enterprise DFIR teams—as well as third-party service providers—have undergone a radical change due to the nearly universal integration of artificial intelligence.
As businesses face constant pressure to detect and respond to incidents with greater speed and precision, companies are increasingly taking advantage of the benefits of AI-powered digital forensics.
In this blog from Magnet Forensics, learn more about how enterprises are leaning on AI for speed and accuracy in their digital investigations, including:
MD-NEXT introduces Full Filesystem (FFS) extraction capabilities for the latest Samsung Galaxy devices of Android 16, including the Samsung Galaxy S25 and Samsung Galaxy Z Flip. This breakthrough enables forensic professionals to conduct thorough investigations with unprecedented access to critical digital evidence.
MD-NEXT FFS extraction provides comprehensive data access, ensuring complete recovery of system files, application data, deleted content, and forensic artifacts that conventional partial extraction methods cannot retrieve. MD-NEXT’s advanced architecture supports seamless integration with industry-leading System-on-Chip (SoC) platforms, including Qualcomm ,Exynos, MTK and UNISOC chipsets.
Our development team maintains continuous compatibility updates, ensuring immediate support for emerging flagship devices upon market release. This proactive approach eliminates investigative delays caused by unsupported models.
Universal Device Compatibility: MD-NEXT supports comprehensive data extraction across diverse device categories including smartphones, feature phones, IoT devices, smart televisions, unmanned aerial vehicles, and cloud services, providing a unified solution for multi-platform investigations.
Extensive Operating System Support: Our platform maintains compatibility with over 15,000 device models across multiple operating systems including Android, iOS, HarmonyOS, Windows, Tizen, KaiOS and more.
Advanced Physical Extraction Methods: MD-NEXT employs multiple extraction vectors including Bootloader manipulation, AnyLock Bypass protocols, ADB Pro (T1-T5) advanced debugging protocols, Fastboot interface utilization, JTAG boundary scan testing, and chip-off memory analysis for maximum data recovery potential.
Next-Generation Hardware Integration: Our proprietary MD-PLUG hardware platform delivers full filesystem access through both generic extraction methods and exclusive hardware-accelerated acquisition protocols, ensuring optimal performance and data integrity for mission-critical investigations.
Evolving Logical Extraction : ADB Backup, iOS Backup, Manufacturers’ backup protocol, App Downgrade, App Backup, App Plus and next thing by evolving new logical extraction technology.
MD-NEXT represents a comprehensive mobile forensic solution designed for law enforcement agencies, corporate security teams, and digital investigation professionals requiring reliable, court-admissible evidence extraction from modern mobile devices.
Contact our sales team to request a demo of MD-NEXT in your forensic investigation and discover how our advanced capabilities can expand the scope of your investigations.
A round-up of this week’s digital forensics news and views:
Digital forensics experts who were set to testify at Bryan Kohberger’s trial reveal evidence showing the convicted killer prepared extensively for the quadruple murders of University of Idaho students. Heather Barnhart and Jared Barnhart from Cellebrite discovered that Kohberger deliberately powered off his phone during the exact window of the November 2022 killings, downloaded detailed reports on serial killers, and used VPN technology to hide his online activity. Analysis of his digital footprint showed obsessive research into murder cases, scrubbed files, and evidence his phone had connected to WiFi at a restaurant where two victims worked.
Read more (the-independent.com)
Tech companies reported more than 9,600 cases of adults grooming children online in the UK during just six months last year, equivalent to about 400 cases per week. Law enforcement agencies including the FBI and UK’s National Crime Agency express growing alarm about sextortion threats targeting teenagers, with victims being blackmailed into sharing explicit images. Snapchat logged approximately 20,000 cases of concerning material in the first half of 2024, more than all other major social media platforms combined. The Guardian reports that some teenage victims have taken their own lives due to this abuse, prompting unprecedented awareness campaigns.
Read more (theguardian.com)
Digital forensics has always depended on automation, from early tools like EnCase v1 and FTK v1 that automatically detected and parsed file systems. Brian Carrier explains that automation handles intermediate steps in investigations but still requires skilled investigators to ask the right questions and understand context. He is developing a comprehensive mini-course on automation and AI in forensics through LinkedIn posts, blogs, webinars, and eventually video content.
Read more (linkedin.com)
Hannah Bailey, founder of Blue Light Wellbeing and former police officer with 15 years of frontline experience, discusses critical mental health challenges facing digital forensics investigators and law enforcement. Hannah, who left policing after experiencing PTSD and cancer, now works as a psychotherapist specializing in trauma therapy for high-risk professions. She emphasizes the need for proactive mental health support rather than reactive approaches, noting that digital forensics investigators face constant trauma exposure with added isolation from working alone with screens. Bailey advocates for regular supervision sessions and culturally-aware therapists who understand the unique stresses of law enforcement work.
Read more (forensicfocus.com)
Version 2025.08 of Unfurl has been released with improved TikTok ID analysis capabilities. Enhanced parser now extracts milliseconds, entity types, sequence numbers, and machine IDs from TikTok identifiers, thanks to research by Benjamin Steel. The update also fixes a bug in Google Search EI timestamp parsing where leading zeros in microseconds caused incorrect conversions.
Read more (dfir.blog)
Researchers have developed a new forensic framework that combines live, digital, and physical evidence collection to investigate drone-related crimes and accidents. Dongkyu Lee and Wook Kang propose a systematic analysis algorithm specifically designed for unmanned aerial vehicle evidence, addressing the growing need for post-incident investigation capabilities. Current drone security strategies focus primarily on real-time defense measures like detection and neutralization, but this research emphasizes the importance of forensic analysis to identify flight paths, pilot information, and accident causes. The framework aims to enhance the legal admissibility of drone forensic evidence in criminal and civil proceedings.
Read more (sciencedirect.com)
LinkedIn provides only rough time estimates like “1d” for posts, frustrating investigators who need precise timestamps for fact timelines. Researcher Ollie Boyd discovered that LinkedIn post URLs contain hidden timestamps – the 19-digit number at the end, when reduced to its first 41 bits, reveals the exact Unix timestamp of publication. This technique has been integrated into Bellingcat’s Uniform Timezone Chrome extension to help investigators extract precise publication times from LinkedIn posts and comments.
Read more (maynier.eu)
A new episode of Truth in Data examines the psychological impact on professionals working in digital forensics and incident response (DFIR). Episode 14 focuses on the often overlooked mental health toll that forensic investigators face while dealing with disturbing digital evidence and high-pressure cases. Mental health support and awareness in the cybersecurity field remains a critical but underaddressed concern.
Read more (youtube.com)
Welcome to the Oxygen Forensics webinar series — your go-to source for practical solutions to the most common and complex challenges in digital forensics — all in less than 20 minutes. Each episode delivers expert insights, real-world use cases, and quick, practical tips to help you work smarter, faster, and more effectively. Don’t miss out — tune in and level up your digital forensics game.
Check out our most recent on-demand webinars:
In the world of DFIR, one size rarely fits all. Sometimes, the goal is validation — ensuring work meets a defined standard. Other times, the sheer volume of data demands automation, though the costs in time, resources, and complexity can offset its benefits. Occasionally, the most efficient solution is simply rolling up your sleeves and tackling the task manually. Join John ‘Zeke’ Thackray and Keith Lockhart as they explore the pros, cons, and trade-offs of validation, automation, and DIY approaches in digital forensics.
Watch this 14-minute discussion about choosing the right digital forensics tool.
Join Amanda Mahan and Keith Lockhart for another Oxygen Tech Byte where they can’t wait to talk about geo-location data on some topics that just never stop being of interest, especially with the prolific collection of location data we all live with in 2025!
Watch as 5 different impacts of geo-location data are covered in 18 minutes.
Join Ryan Ebersole and Keith Lockhart for the next iteration of Oxygen Forensics Tech Bytes where they will discuss USB-based collections and the unmatched versatility of multi-format USB adapter tools for focused data targeting, triage and acquisition. Ideal for field operations or controlled lab environments, their portability and cross-platform and multi-device capabilities make them indispensable in modern forensic workflows.
Watch this 16-minute discussion of USB vs OTG for digital forensics.
You can find the full list of informative on-demand Oxygen Tech Bytes webinars here.
Oxygen Forensics is a global leader in digital forensics software, enabling law enforcement, government agencies, enterprises, law firms, and service providers to gain critical insights into their data faster than ever before. Specializing in remote and onsite access to digital data from cloud services, mobile and IoT devices, drones, device backups, UICC, and media cards, Oxygen Forensics provides the most advanced digital forensics data extraction capabilities, innovative analytics tools, and seamless collaborative analysis for criminal and corporate investigations to bring insight and truth to data.
# # #
Want to share an investigation with us?
We’d love to hear how our software supported you in solving your investigation. Please
contact us at marketing@oxygenforensics.com
Push past button-clicking—Amped Software training teaches the science behind forensic…
We are halfway through the S21 Transcriber Spotlight — catch…
Protecting children online shouldn’t come at the cost of investigators’…
Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your…
Explore a selection of the latest DFIR employment opportunities in…
Tired of risky online transcription tools? Discover a faster, fully…
Oxygen Remote Explorer v.1.9 is here—now with iOS and Telegram…
When working with images and videos in a forensic setting, clicking buttons won’t get you far. What truly makes the difference is understanding the evidence: its origin, its journey, and the challenges it presents.
That’s the philosophy behind Amped Software’s training programs, where image processing and forensic science meet real-world application. Amped’s goal isn’t just to teach you how to use their tools; it’s to help you understand the “why” behind every click.
In their classes, Amped’s expert trainers go beyond teaching you how to use our tools; they also cover the scientific theory behind forensic image and video analysis. Amped believes that understanding the theory is essential to becoming a better investigator.
The expert-led sessions combine hands-on software practice with foundational scientific concepts, from understanding compression and video encoding to applying proper methodology in evidence analysis and processing.
Tools may evolve and change but scientific understanding stays with you throughout your entire career.
No matter your role or experience, there’s a course designed to meet you where you are, and take you further.
Your foundation in forensic video enhancement starts here. Learn how to handle, process, clarify, and present video evidence, all in one single tool and while following proper forensic methodology.
August 18-22, 9 AM – 1 PM CEST, Online
August 26-29, 8 AM – 4 PM CST (USA), Kansas City, MO (In-Person)
September 15-19, 11 AM – 3 PM EDT USA/Detroit – EDT (DST: GMT −4), Online
October 27-31, 9 AM – 1 PM CEST (Rome, Italy time)
November 4-7, 9 AM – 5 PM CET (Rome, Italy time), Amped HQ (In-Person)
November 10-14, 9 AM – 1 PM CET (Rome, Italy time), Online
Already comfortable with FIVE?
This course unlocks its extended capabilities, from advanced aspects of video decoding and processing to deeper filter usage and investigative workflows. Ideal for users looking to push the software to its full potential.
Learn how to verify image authenticity and uncover tampering. Amped Authenticate gives you the tools to conduct scientific image integrity analysis, and the training ensures you understand the forensic concepts and methodology behind it.
September 22-26, 9 AM – 1 PM CEST (Rome, Italy time), Online
September 29 – October 3, 11 AM – 3 PM USA/Detroit – EDT (DST: GMT −4), Online
October 7-9, 9 AM – 5 PM CEST (Rome, Italy time), Amped HQ (In-Person)
This course is ideal for investigators, analysts, and first responders. You’ll learn how to convert proprietary video files, process video evidence, apply basic corrections and prepare the evidence for presentation. You will ensure its value and admissibility are maintained from the moment it’s seized.
After completing Amped FIVE training, you can tailor your learning with specialized add-on modules. These are designed for professionals who need targeted skills based on their role or casework focus.
Learn how to present video evidence in clear, accurate, and compelling formats for investigative reports and courtroom use.
Working on traffic cases? This module teaches how to calculate speed, distance, and real-world measurements from video evidence.
This module teaches the technical processes of analyzing proprietary video formats and converting DVR files accurately, without compromising evidence integrity.
October 21-23, 9 AM – 1 PM CEST (Rome, Italy time), Online
Stay up to date with the latest features, workflows, and improvements in Amped FIVE. This module ensures your knowledge evolves with the software.
November 25-27, 9 AM – 1 PM CET (Rome, Italy time), Online
After training with Amped FIVE, you’ll be ready to take the Amped FIVE Certified Examiner (AFCE) exam. This professional certification tests your theoretical and practical aspects of forensic video analysis with Amped FIVE.
However, it also goes beyond software skills. The AFCE tests your understanding of image and video forensics, from compression to methodology, and gives you the credentials to back your expertise.
It’s not just about knowing how. It’s about proving you do.
You handle critical evidence. You write and produce reports that are presented in court. You influence investigations and outcomes.
Amped Software training gives you the knowledge, skills and insight to face your everyday challenges in digital multimedia evidence processing.
A round-up of this week’s digital forensics news and views:
Patrick Siewert provides comprehensive advice for aspiring digital forensics entrepreneurs in the first part of a three-part series on starting a digital forensic business. He emphasizes the importance of choosing a clear, professional company name, carefully selecting target clientele, and establishing solid business foundations including mission statements and proper legal structures. Siewert warns against common pitfalls like taking on undesirable clients and reveals that major forensic tool providers make their products deliberately expensive and difficult for private practitioners to access, often due to pressure from their primary law enforcement customers.
Read more (dfirphilosophy.blogspot.com)
Hashcat releases version 7.0.0 after two years of development, featuring over 900,000 lines of code changes and contributions from 105 developers. Major new features include an Assimilation Bridge for integrating external resources, Python Bridge Plugin for rapid hash-matching implementation, and hash-mode autodetection. Performance improvements include up to 320% speed increases for scrypt and major optimizations for NTLM and NetNTLMv2, while 58 new application-specific hash types have been added including support for Argon2, MetaMask, and LUKS2.
OWASP GenAI Security Project releases its first comprehensive incident response guide for security practitioners dealing with GenAI application incidents. Created by a panel of experts from the project’s CTI Initiative, the guide provides guidelines and best practices without requiring deep GenAI knowledge. It aims to fill a critical gap in helping security teams respond effectively to incidents involving generative AI systems.
A forensics professional demonstrates how to build an affordable portable backup system called “UFADE Touch” using a Raspberry Pi 4B, 7-inch touchscreen, and specialized cooling components. Components cost around €175 and include a DSI interface display to preserve USB ports for data sources and drives. Assembly requires minor case modifications and specific configuration changes to Raspbian OS to support the display driver and optimize performance for the 1024×600 resolution screen.
A new video tutorial demonstrates how to use DB Browser for SQLite instead of traditional spreadsheet programs when conducting forensic analysis of CSV files. Sherman Kwok walks viewers through downloading the tool, importing CSV data, and using SQLite commands for sorting, filtering, and formatting data. The tutorial covers basic to intermediate techniques including regular expression filtering for more efficient data analysis.
Security researcher Pasquale Stirparo releases machofile, a new Python module designed for parsing Mach-O binary files with a focus on malware analysis and reverse engineering. The self-contained tool works across macOS, Windows, and Linux without dependencies and offers features including header parsing, entropy calculation, symbol extraction, and code signature analysis. Stirparo developed the initial version after attending Patrick Wardle’s macOS malware class, spending nearly two years refining the tool before its official release.
Daniel Jeremiah releases a comprehensive memory forensics dataset featuring controlled attack scenarios on Windows 10 systems for cybersecurity research and training. Six distinct scenarios cover process injection, credential dumping, Cobalt Strike beacons, and various remote access trojans including AsyncRAT and MasonRAT. Each scenario includes detailed memory dumps, attack characteristics, and evasion techniques designed for analysts to practice using tools like Volatility and YARA. Cases range from unknown infections to targeted intrusions, providing varied complexity levels for students, analysts, and researchers developing memory analysis workflows.
As we reach the halfway point of the S21 Transcriber Spotlight Session, the response has been incredible.
Over the past two weeks, we’ve explored key features that highlight how easy and fast it is to use this powerful, fully offline and secure tool. We’ve also highlighted how its real-world applications span diverse situations and regions, with multi-language support enabling investigators to work confidently with audio from a variety of sources.
The S21 Spotlight Session is now in full flow. See below for what has been covered in the last two weeks on our Social Media platforms:
Gui Walkthrough – a clean, intuitive interface
Real-World Applications – examples of how the powerful AI can benefit real casework
Built for Both: UK and US Transcription – one tool for all regions
Multi-Language Support – over 70 supported languages
To follow along live with these updates find links to our social media at the end of this article.
As part of the spotlight, you’ll get full access to your own trial account and a self-guided training hub, including:
✅ A 30-day free licence
✅ Step-by-step walkthroughs
✅ Real-world examples you can try
✅ A certificate on completion
No pressure. No pitch. Just hands-on experience with the tools that could change how you work.
Want to see real world usage?
Case Studies – www.semantics21.com/case-studies
Follow us on LinkedIn or X to catch each Spotlight update, or head to
👉 www.semantics21.com/spotlight to request your free licence and training.
Sign up 📝 http://bit.ly/3I58STF
No fuss. Just better forensics.
Investigating Internet Crimes Against Children (ICAC) is among the most vital and emotionally taxing roles in digital forensics. While their work delivers justice and protection for the most vulnerable, it often comes at a personal cost.
There’s growing awareness across the digital forensics community that supporting investigator well-being is just as important as solving cases. ICAC professionals regularly deal with high caseloads, long hours, and constant exposure to traumatic content involving child sexual abuse, exploitation, and trafficking. The cumulative stress of sifting through explicit images and footage, coupled with pressure to work quickly, places investigators at risk of burnout, secondary trauma, and long-term emotional distress.
Studies increasingly show elevated rates of PTSD-like symptoms among digital forensics professionals investigating these crimes. The field demands resilience, but it also requires proactive mental health support. That’s where technology can make a meaningful difference.
Leading DFIR technologists Detego Global believe tools should accelerate investigations and protect the people conducting them.
Detego Global has worked closely with ICAC, CSAE (Child Sexual Abuse and Exploitation), IIOC (Indecent Images of Children), and offender management teams to build a platform that reduces exposure, streamlines workflows, and supports sustainable casework. Several features were developed with direct input from frontline professionals.
To maintain forensic integrity while minimising the psychological burden of viewing traumatic material, Detego technology includes:
The Xpress HashScan Mode in Detego Field Triage rapidly identifies illicit content, cross-referencing millions of known child abuse images and videos by leveraging Project VIC and CAID (Child Abuse Image Database). Investigators can quickly triage devices and zero in on relevant evidence – up to 6x faster than before – without manually reviewing every file.
Using semantic search and AI-powered “show similar” tools, the Detego platform helps pinpoint images based on context or appearance (e.g., “distressed child” or “man with child”), streamlining searches while reducing unnecessary exposure.
Detego Analyse AI+ further supports well-being by automating time-consuming tasks, reducing the cognitive load and improving the efficiency of analysis. Investigators can:
What’s more, Detego Global partners with Project VIC to deliver full integration of the Project VIC SAFER model and Safer Viewing officer safety technology. VICSafer is designed to analyse large volumes of unknown images and videos encountered in child sexual abuse investigations, helping police locate files that have not yet been identified by law enforcement or recorded in a hash database. Together with Safer Viewing, which blocks out harmful content while still allowing examiners to conduct their review, this integration reduces investigator exposure to traumatic material without compromising the integrity of the investigation.
Detego Global’s all-in-one digital forensics platform also addresses the administrative pressures that contribute to burnout. With tools like Detego Case Manager, teams can manage evidence, workflows, roles, and reporting in a centralised system. Combined with field-ready triage, data extraction, and analytical tools, this structure streamlines data collection and reduces decision fatigue.
Whether in the lab or on-scene, investigators have access to a consistent, flexible platform that supports faster resolutions and more manageable caseloads.
With the right technology, it’s possible to accelerate digital investigations without compromising investigator well-being. In the words of one ICAC investigator:
“Not only did I find the material needed, but Detego pulled the usernames and passwords matching the cyber tip in no time at all. This tool is going to be part of our workflow for a long time.”
Such feedback reflects the value of technology that’s both powerful and empathetic, designed to safeguard those who protect others. Detego Global is proud to offer ICAC professionals solutions that reduce exposure, improve efficiency, and foster resilience.
Organisations can experience Detego technology through a free 30-day trial and see first-hand how these tools safeguard investigators’ mental health while accelerating critical investigations.
As part of its commitment to ICAC investigators, Detego Global provides exclusive offers, including bulk licence packages and specialist training programmes. Get in touch today to learn more.
We need you!
We’ve built the most advanced media forensics software in the world…
But we forgot one tiny detail: the name still sounds like a rejected X-Men character.
That’s where you come in.
Over the last few years, S21 LASERi-X has evolved from a powerful media review tool into the only true CSAM victim identification solution on the market. It’s got features nobody else has – Auto CSAM detection, AI location prediction, AI deepfake detection, school badge lookup, user exposure monitoring, AI describe – you name it, it’s in there.
But we’ve heard your feedback:
✅ “The tools amazing, it’s like ******** on steroids.”
❌ “There’s almost too much going on.”
So, we’ve spent the past year redesigning the whole thing – new look, simpler workflows, same powerful offline standalone engine. It’s nearly ready but before we unleash it on the world…
We need a new name.
And no, we don’t have Apple’s crack naming team, or the luxury of driving through California wine country until inspiration strikes.
So, we’re asking you – the brilliant, slightly sarcastic, digital forensics community – to help us choose a name worthy of the tool.
We’ve shortlisted a few options to vote on, or you can suggest your own (yes, even “Findy McFindFace” if you must – we’ll pretend to judge you quietly – (Find the Boaty McBoatface story if you need a laugh 😆).
⦿ S21 VisionX (for crystal-clear insight)
⦿ S21 Chimera (mythical creator that killed a griffin)
⦿ S21 Hunter (gets results, finds monsters)
⦿ S21 Reveal (because that is what it does)
⦿ S21 Media Explorer (nice and literal)
Takes 30 seconds, might change the future forever – no pressure.
Bragging rights + free software? Yes please. One lucky name-dropper gets a full year of access for their entire team to the software formerly known as S21 LASERi-X.
Curious now? Request a trial licence of S21 LASERi-X.
P.S. Please don’t call it “Analysi McAnalysisFace” – our marketing guy is already twitching.
A round-up of this week’s digital forensics news and views:
Two former FBI forensic examiners conducted an independent analysis of Jeffrey Epstein’s jail surveillance footage that appeared to have missing minutes. Their investigation reveals the timing discrepancies likely resulted from routine video processing rather than evidence tampering. The experts found three types of technical artifacts: a system reboot gap, edited content from the file’s beginning, and dropped frames during compression, accounting for all apparent missing time.
Dr. Zoe Billings and Mark Pannone discuss their innovative approach to managing stress in digital forensics through biological wellbeing education. Adapt & Evolve teaches investigators to recognize early physical warning signs of stress before mental health issues develop. They emphasize that chronic stress manifests physically through symptoms like lower back pain, high blood pressure, and digestive issues, which can be prevented through scientifically proven techniques.
A digital forensics expert develops “Toby,” a portable forensic toolkit built around a Raspberry Pi Zero 2 W that fits in a travel organizer and can be operated headlessly from mobile devices. It runs Kali Linux with custom forensic tools including MalChela and a built-in tool finder called “toby-find” that serves as a searchable cheat sheet for available commands. The compact kit includes wireless connectivity, battery power options, and can perform malware analysis, memory forensics, and field acquisition tasks.
Read more (bakerstreetforensics.com)
Simson Garfinkel receives the first-ever Test of Time Award at the 25th anniversary of DFRWS for his paper “Digital Forensics: The Next Ten Years,” which is the most cited paper in the conference’s history. The award recognizes Garfinkel’s foundational contributions to defining the field of digital forensics.
Researchers explore how artificial intelligence can enhance open-source intelligence gathering in digital forensics to improve cybercrime investigations. The study examines AI’s potential to automate and streamline the collection and analysis of publicly available digital evidence. This approach could significantly accelerate forensic processes and help investigators identify patterns in cyber criminal activities more effectively.
The Scientific Working Group on Digital Evidence has published a draft document titled “Technical Notes on the Use of Timing Advance Records (25-F-002-1.0)” for public review and comment. This draft represents the latest guidance from SWGDE’s forensics committee on the technical aspects and proper use of timing advance records in digital evidence analysis.
Security researchers have discovered critical vulnerabilities in PDF document handling that allow attackers to tamper with documents without detection. The flaws affect how PDF viewers process and validate document integrity, potentially enabling malicious actors to modify contracts, financial documents, and other sensitive files. These vulnerabilities pose significant risks to organizations that rely on PDF documents for secure communications and record keeping.
A new study examines the validity of foreground application data stored in AMD’s SQLite database usage events, with a focus on analyzing the accuracy and reliability of application usage tracking mechanisms. The findings contribute to better understanding of how application usage data is collected and stored in AMD systems.
Researchers from UNSW Canberra introduce IoT-CAD, a new digital forensics dataset designed to train AI systems for detecting and attributing cyberattacks in Internet of Things environments. The dataset captures traces from Windows and Linux systems across multiple sources including memory, hard drives, processes, and network traffic from various IoT devices. The team validates the dataset using machine learning, digital forensics, and explainable AI techniques, employing both centralized learning for attack detection and federated learning for attack attribution.
Manually transcribing or using an online tool and worried about data security? There’s a better way.
Transcribing audio and video can be time-consuming, frustrating and error-prone, especially with sensitive or complex casework. We know these challenges well, but there is a better way to work smarter, faster, and more securely.
We’re excited to launch our latest S21 Spotlight Session focused on S21 Transcriber, a fully offline, secure transcription tool designed to help investigators convert audio and video files into searchable, transcribed text, faster and with more confidence.
Unlike cloud-based AI transcription services, our fully offline solution guarantees your sensitive data never leaves your control, eliminating any concerns about where your data goes or how it’s used.
Transcribing audio to text is essential, but it shouldn’t be complicated. That’s why we designed S21 Transcriber to be both easy to use and powerful. Supporting a wide range of common audio and video formats, it lets you go from file import to full report in just a few clicks, making transcription effortless and accessible for everyone.
S21 Transcriber supports audio and video files from a wide range of sources – interviews, audio messages, videos, and more, all processed entirely offline.
Its powerful AI can detect even whisper-quiet speech, ensuring no detail is missed. Multi-language support enables quick translations in cases where fast intelligence gathering is critical.
All transcriptions are fully searchable, allowing investigators to quickly locate crucial intelligence and flag key moments within lengthy recordings, transforming how audio evidence is managed and analysed.
Unlike online AI tools, S21 Transcriber guarantees your sensitive data never leaves your control, providing peace of mind and complete security.
As part of the spotlight, you’ll get full access to your own trial account and a self-guided training hub, including:
✅ A 30-day free licence
✅ Step-by-step walkthroughs
✅ Real-world examples you can try
✅ A certificate on completion
No pressure. No pitch. Just hands-on experience with the tools that could change how you work.
Want to see real world usage?
Case Studies – www.semantics21.com/case-studies
Follow us on LinkedIn or X to catch each Spotlight update, or head to
👉 www.semantics21.com/spotlight to request your free licence and training.
Sign up 📝 http://bit.ly/3I58STF
No fuss. Just better forensics.
Oxygen Remote Explorer v.1.9 is here—now with iOS and Telegram…
Read the latest DFIR news – Cellebrite’s 2026 trends survey,…
Passware Kit 2025 v3 lets forensic teams decrypt BitLocker with…
Catch up on the final S21 CCTV Spotlight highlights and…
A burglary suspect claimed he was asleep—his Oura ring proved…
GMDSOFT’s Q2 2025 update boosts device support, adds new extraction…
The latest Oxygen Forensics Tech Bytes episodes are here—offering under-20-minute…
Oxygen Forensic® Detective v.17.3.1 is out now with targeted crypto…
The latest version of Oxygen Remote Explorer has been released!
Oxygen Remote Explorer revolutionizes the way businesses collect critical digital evidence. Whether investigating incidents remotely or onsite, our tool provides powerful, targeted data collection and analytic capabilities designed for efficiency and accuracy. With features like automated task scheduling and comprehensive data access, you can ensure no detail is overlooked – no matter where the evidence resides.
Oxygen users now have the ability to remotely collect data from iOS devices using the new Remote iOS Agent available in the Agent Management Center.
This new capability provides fast access to critical iOS device data while eliminating travel costs and minimizing disruption to the device user.
Remote collection of Telegram and Telegram Web data from Android devices is now possible for Oxygen users via the Remote Android Agent.
Remote Telegram data collection is crucial in corporate investigations as it helps to rapidly detect confidential data leaks and uncover unauthorized communications or insider threats occurring outside official channels.
Oxygen Forensics has added the ability to use hash sets when creating file search rules. We have also added the NOT IN operator for rules with the “Hash” and “Hash set” search conditions. This option allows searching for files whose hashes are not included in the selected hash set or do not match the selected hash.
Search by hash sets and the support for NOT IN operator provides greater search flexibility while enabling precise and efficient targeting of specific files.
Users can now choose “Issue on demand” to manually issue a license to new endpoints of any type or “Issue automatically” to allow the license to be issued automatically when the new endpoint connects to the server for the first time.
The ability to issue licenses both automatically and on-demand provides greater deployment flexibility.
Android devices may contain the Google Semantic Location artifact that stores detailed information about user’s movements, including precise locations and timestamps. Now this artifact is parsed in Oxygen Remote Explorer.
The additional detailed geolocation data parsed in Oxygen Remote Explorer might reveal key clues that aid investigation.
If you use Oxygen Remote Explorer, refer to the “What’s New” file in the “Options” menu or check out our Release Notes for a full list of updates.
If you are not yet a customer and are interested in seeing these enhancements in Oxygen Remote Explorer v.1.9, contact us to make arrangements.
Oxygen Forensics is a global leader in digital forensics software, enabling law enforcement, government agencies, enterprises, law firms, and service providers to gain critical insights into their data faster than ever before. Specializing in remote and onsite access to digital data from cloud services, mobile and IoT devices, drones, device backups, UICC, and media cards, Oxygen Forensics provides the most advanced digital forensics data extraction capabilities, innovative analytics tools, and seamless collaborative analysis for criminal and corporate investigations to bring insight and truth to data.
Want to share an investigation with us? We’d love to hear how our software supported you in solving your investigation. Please contact us at marketing@oxygenforensics.com