Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Hero Image

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Checking Masts – Cell Site Analysis (CSA)

First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Since linking with Jamie Morris at Forensic Focus to create a Mobile Forensics Discussion Forumto bring mobile telephone evidence to a wider audience, I have had several

Recording Telephone Calls

First published March 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com A question that often gets asked is “Can I record a telephone call?” and the answer to that is that you can (according to publicly available material),

Mobile Phone and GPS Forensics – Some Thoughts

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com Mobile telephones are the predominate wireless telecommunications device throughout the world and most certainly in the UK they predominate other technologies, where ownership has reached well over

Malicious Phone Call Legislation in the UK

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com It is being noted that there is an exponential growth in harassing and intimidating calls from financial companies, card companies and from outsource debt collection firms chasing

SonyEricsson Hidden Evidence

First published February 2009 by Greg Smith Mobile Telephone Evidence & Forensics trewmte.blogspot.com I have discovered that it is possible when manually examining some SonyEricssons (such as “K” range etc) that after a user has deleted the Last Number Dialled

TomTom GPS Device Forensics

First published January 2009 Written by Ben LeMere (blemere@gpsforensics.org) & Andy Sayers (asayers@gpsforensics.org) For more information visit GPSForensics.org Introduction: The sales of portable navigation devices are at an all time high. Last year, more than forty million portable GPS devices

Passive Network Security Analysis with NetworkMiner

First published January 2009 by Erik Hjelmvik networkminer.sourceforge.net It is disturbing how often networks are not properly documented in terms of IP plans, network segmentations and network security. Having a good view of the network is essential when performing a

A Discussion of Virtual Machines Related to Forensics Analysis

First published November 2008 by Brett Shavers (PDF version here) The Virtual Machine (VM)Description of the Virtual Machine The Virtual Machine Concept in Brief Virtual machines are not new and have been in use for well over a half century.

Email Evidence – Now You See it, Now You Don’t!

First published October 2008 By Sandy Boucher and Barry Kuang, Intelysis Corp. Background With the ever increasing role of computers and electronic communications in both our business and personal lives, emails have taken on a key evidentiary role in many

Forensic Analysis of the Microsoft Windows Vista Recycle Bin

First published May 2008 By Mitchell Machor MMachor@gmail.com 1/22/2008 (click here for a PDF version of this paper) – 1 – Introduction Contrary to due belief, when a file is deleted on a Microsoft operating system, it still exists on

Linux ‘dd’ basics

First published March 2008 Linux dd can be a powerful and flexible tool to have in your box.You will find it installed by default on the majority of Linux distributions available today and it can be used for a multitude

The International Society of Forensic Computer Examiners (ISFCE)

by Joleyn Smithing, ISFCE The International Society of Forensic Computer Examiners (ISFCE)is dedicated to the advancement of the science of forensic computer examinations. Established in 2002, the ISFCE began as a result of the efforts of Mr. John Mellon. A

Computer Evidence in the Casey Anthony Trial – A Post Mortem

"In the recent case of the State of Florida vs. Casey Anthony, a recovered Firefox 2 history from Unallocated Space became the focal point of the State's case surrounding arguments of "premeditation". During the course of the trial, two different

Looking Forward To A Career In Digital Forensics

First published January 2008 by James Hooker I am rapidly approaching my final year of University, studying for a Forensic Computing degree, and like all students across the globe on a similar course, I am on a mission to find