Enterprise Turns To AI For Speed And Accuracy In DFIR

Hero Image

Magnet Forensics explores how AI is revolutionizing speed and accuracy in DFIR....

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Breaking Digital Barriers: Galaxy S25 & Z Flip Fully Supported

Gain full filesystem access to the latest Samsung Galaxy devices with MD-NEXT....read more

Digital Forensics Round-Up, August 13 2025

Digital Forensics Round-Up, August 13 2025

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....read more

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Bahamas police receive digital forensics equipment from US Dept of State

The US Embassy’s acting deputy chief of Mission Bradley Lynn and regional security officer Derrick Boyd presented a Mac Book Pro computer forensics laptop package valued at more than $14,000 to the Royal Bahamas Police Force’s Central Detective Unit. The

Studying the web’s impact on sex offenders

Law enforcement agencies and psychologists are debating the relationship between the availability of the material online and those who are interested in it. Dr Ethel Quayle, a lecturer in clinical psychology at the University of Edinburgh said that studies have

Dropbox Forensics

by Frank McClain A write-up about some forensic aspects of online storage/file-synching service Dropbox™ Cloud-based services are becoming more prevalent, and not just for businesses – end- and home-users are taking advantage of opportunities to automate backups, make files available

Standard Units in Digital Forensics

by Dr Chris Hargreaves Lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK. One of the earliest lectures in the MIT Openware programme in Physics begins with the lecture “Units and Dimensional Analysis”. Units of measurement

PitchLake – a tar pit for scanners

by Simon Biles Founder of Thinking Security Ltd., an Information Security and Risk Management consultancy firm based near Oxford in the UK. We’ve had two bank holidays in a row here in the UK – first off for Easter, then

How to Create an Open Source Network Forensics Appliance

By Ondrej Krehel Chief information security officer at Identity Theft 911 okrehel@IDT911.com IntroductionEncryption and anti-forensics attacker techniques are commonly encountered in incident response investigations, while the power of network forensics intelligence is often overlooked by busy IT and legal departments.

The Grid for Crime Prevention (G4CP) in Wales

by Sian Haynes and Stilianos Vidalis University of Wales, Newport Fujitsu is set to bring high-performance computing (HPC) to Wales. They will provide a distributed grid which is a project set over five-years costing up to £40 million. The grid

The End of Digital Forensics?

by Craig Ball When Microsoft introduced its Encrypting File System (EFS) in Windows 2000, the Cassandras of computer forensics peppered the listserves with predictions that the days of digital forensics were numbered. Ten years on and hundreds of systems acquired,

Evaluating Mobile Telephone Connection Behaviour – Part 2

The Basics of Evaluating Connection Records by Sam Raincock, IT and telecommunications expert witness Connection RecordsWithin the UK, details of past telephone connections are stored by the network providers. The minimum storage is advised by the Data Retention (EC Directive)

Biles’ Hierarchy of Disaster Recovery Needs

by Simon Biles Having failed to keep up with my New Year’s resolution of being more organised (the observant of you might have noticed the absence of a February column), it’s nice to be able to move into a new

The Question Of Cyber Terrorism

by Robert Murrill rmurrill@verizon.net Executive Summary This paper will take a look at Cyber terrorism and explaining what it is and what it isn’t by showing how closely related Cyber Terrorism and Cyber Warfare are. Although the affects of both

Personal Branding for Digital Forensics Jobseekers

by David Sullivan Looking at the job adverts here on Forensic Focus shows that after a really sluggish period the number of vacancies available in computer forensics and electronic disclosure is increasing. Many forensics professionals who would normally have changed

Geotags: Friend or Foe?

by David Benford Director, Blackstage Forensics I recently wrote a research paper, “Geotag Data: The Modification of Evidence on the Apple iPhone”, based around the possibility of modifying geotag evidence on the Apple iPhone. A test was performed as part

Is the NTSB a model for incident response?

by Sean McLinden Recently, the events surrounding the defacement of the HBGary Web site and publication of sensitive data were being bantered about on a number of forensic, security and incident response sites. As is typical for these kind of