Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Dropbox Forensics

by Frank McClain A write-up about some forensic aspects of online storage/file-synching service Dropbox™ Cloud-based services are becoming more prevalent, and not just for businesses – end- and home-users are taking advantage of opportunities to automate backups, make files available

Standard Units in Digital Forensics

by Dr Chris Hargreaves Lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK. One of the earliest lectures in the MIT Openware programme in Physics begins with the lecture “Units and Dimensional Analysis”. Units of measurement

PitchLake – a tar pit for scanners

by Simon Biles Founder of Thinking Security Ltd., an Information Security and Risk Management consultancy firm based near Oxford in the UK. We’ve had two bank holidays in a row here in the UK – first off for Easter, then

How to Create an Open Source Network Forensics Appliance

By Ondrej Krehel Chief information security officer at Identity Theft 911 okrehel@IDT911.com IntroductionEncryption and anti-forensics attacker techniques are commonly encountered in incident response investigations, while the power of network forensics intelligence is often overlooked by busy IT and legal departments.

The Grid for Crime Prevention (G4CP) in Wales

by Sian Haynes and Stilianos Vidalis University of Wales, Newport Fujitsu is set to bring high-performance computing (HPC) to Wales. They will provide a distributed grid which is a project set over five-years costing up to £40 million. The grid

The End of Digital Forensics?

by Craig Ball When Microsoft introduced its Encrypting File System (EFS) in Windows 2000, the Cassandras of computer forensics peppered the listserves with predictions that the days of digital forensics were numbered. Ten years on and hundreds of systems acquired,

Evaluating Mobile Telephone Connection Behaviour – Part 2

The Basics of Evaluating Connection Records by Sam Raincock, IT and telecommunications expert witness Connection RecordsWithin the UK, details of past telephone connections are stored by the network providers. The minimum storage is advised by the Data Retention (EC Directive)

Biles’ Hierarchy of Disaster Recovery Needs

by Simon Biles Having failed to keep up with my New Year’s resolution of being more organised (the observant of you might have noticed the absence of a February column), it’s nice to be able to move into a new

The Question Of Cyber Terrorism

by Robert Murrill rmurrill@verizon.net Executive Summary This paper will take a look at Cyber terrorism and explaining what it is and what it isn’t by showing how closely related Cyber Terrorism and Cyber Warfare are. Although the affects of both

Personal Branding for Digital Forensics Jobseekers

by David Sullivan Looking at the job adverts here on Forensic Focus shows that after a really sluggish period the number of vacancies available in computer forensics and electronic disclosure is increasing. Many forensics professionals who would normally have changed

Geotags: Friend or Foe?

by David Benford Director, Blackstage Forensics I recently wrote a research paper, “Geotag Data: The Modification of Evidence on the Apple iPhone”, based around the possibility of modifying geotag evidence on the Apple iPhone. A test was performed as part

Is the NTSB a model for incident response?

by Sean McLinden Recently, the events surrounding the defacement of the HBGary Web site and publication of sensitive data were being bantered about on a number of forensic, security and incident response sites. As is typical for these kind of

I’m here! Now what?

by Ken Pryor Working for a small police department in a rural area, my opportunities to do digital forensic work on real cases are much fewer and farther between than those who work in large departments or in the private

Challenges of Smart Phone Forensics

by Rob Adams ACE, CDIA+ SALIX Mobile devices have become an essential component of our daily lives. These devices keep us connected and act as so much more than the cell phones and portable music players of the 1990’s. It