Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hero Image

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

Cumbria’s top cop leads fight against cyber crime

Cumbria police’s online expert Stuart Hyde is joining an internet safety day today. The acting Chief Constable, an international expert on computer crime and president of the charity the Society for the Policing of Cyberspace, will be involved with the

Defendant Ordered to Decrypt Laptop May Have Forgotten Password

A Colorado woman ordered to decrypt her laptop so prosecutors may use the files against her in a criminal case might have forgotten the password, the defendant’s attorney said Monday. The authorities seized the Toshiba laptop from defendant Ramona Fricosu

Forensics vendor warns Mac OS X FileVault vulnerable to decryption

Passware, a vendor of forensics tools for recovering data for law enforcement, has issued a warning that its forensics tools can bypass the security of FileVault disk encryption in Mac OS X if the computer is left powered on, recovering

FBI Director Says Cyberthreat Will Surpass Threat From Terrorists

Threats from cyber-espionage, computer crime, and attacks on critical infrastructure will surpass terrorism as the number one threat facing the United States, FBI Director Robert Mueller testified today. Mueller and National Intelligence Director James Clapper, addressing the annual Worldwide Threat

Case studies – what would you find useful?

Following on from an earlier discussion, I’d like to revisit the idea of “case studies”. What would people find useful in a case study, e.g. what subject areas would we like to see covered, what level of expertise, what format

Oxygen Forensic Suite 2012 v.4.0.1 released

Oxygen Forensic Suite 2012 v.4.0.1 introduces support for Touch application analysis for Android and Apple devices; improves examination of SkyFire mobile browser data adding Apple devices support. The new release adds more than 80 Android-based devices, the overall number of

BlackBag Technologies Announces New MacQuisition 2012.R1 Release

BlackBag Technologies, Inc. today announced the release of MacQuisition 2012.R1, a 3-in-1 live data acquisition, targeted data collection, and forensic imaging tool. New features include: * Targeted File Collection – Quickly triage, select, and acquire targeted files, folders, or entire

Irish business with tools to dig out digital evidence

Computer forensics start-up Cernam is to launch its first product later this month, a tool for gathering legally admissible digital evidence from online sources such as Facebook, blogs and message boards. The Dublin company sees a gap in the market

The Data Specimen is the Blood of Cyber Forensics

At first glance, one would assume that the only common thread that runs between a forensic lab that analyzes blood samples, fingerprints and DNA evidence, and a Cyber forensic lab that analyzes data is that both processes verify the facts

JADsoftware announces new IEF Triage product

JADsoftware Inc. has announced IEF Triage, a new edition to its computer forensics solution, Internet Evidence Finder (IEF). IEF can search for evidence within a number of applications including: social networking, IM chats, webmail, browsers, and p2p artifacts. IEF Triage

Forensic Imaging of Hard Disk Drives- What we thought we knew

By Todd G. Shipley and Bryan Door (A complete copy of this white paper and its figures and diagrams can be found at www.nfdrtc.net). WHAT WE HAVE BEEN TAUGHT Imaging of hard drives has been the main stay of the

Harry Onderwater

A few days ago the Dutch forensics community – indeed, the wider forensics community – lost one of its founding fathers, Harry Onderwater. Having worked for many years for the Dutch police in Amsterdam, Harry then moved to the Centrale

Can Your Digital Images Withstand A Court Challenge?

The term “digital” in law enforcement is almost immediately associated with digital forensics, i.e.; computer crimes, cyber terrorism, child porn on computer hard drives, and other areas that require special training, expertise, and equipment to investigate these types of digital

Review: Proof Finder by Nuix

Reviewed by Jonathan Krause of Forensic Control Well, this is an interesting proposition. Early last December Nuix, the respected producers of eDiscovery software, released an intriguing, and as far as I know in this sector, unique, application. Called Proof Finder,

SubRosaSoft.com Inc. Releases MacForensicsLab 4.0

SubRosaSoft.com Inc. announces the immediate availability of the latest version of their powerful computer forensic suite, MacForensicsLab 4.0. The new version brings a streamlined interface and many other improvements to make examinations quicker and more accurate than ever before.SubRosaSoft.com Inc.

AACC Digital Forensics Team Hacks Their Way to First Place

The cyber-forensics team at Anne Arundel Community College (AACC) took top honors among community colleges in a competition that pitted them against the best teams in the nation, and 52 other countries. The team consisted of AACC students from all