Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Hero Image

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Potential Impacts of Windows Vista on Digital Investigations

First published December 2007 by Christopher Hargreaves and Howard Chivers Paper received 30th April, 2007. C.J.Hargreaves, Cranfield University, Defence Academy of the United Kingdom, Shrivenham, SN6 8SW (+44 (0)1793 785753; e-mail: c.j.hargreaves@cranfield.ac.uk).H.Chivers, Cranfield University, Defence Academy of the United Kingdom,

A Forensic Analysis Of The Windows Registry

First published November 2007 Derrick J. Farmer Champlain College Burlington, Vermont dfarmer03@gmail.com (click here for a revised, quick reference PDF version of this paper) AbstractThis paper will introduce the Microsoft Windows Registry database and explain how critically important a registry

Corporate Investigations and the UK Data Protection Act

First published September 2007 by Rowenna Fielding INTRODUCTION A number of requirements of the Data Protection Act apply to workplace monitoring. While the DPA does not prohibit employee monitoring and investigation, any such activity must conform to the requirements of

Windows Vista – notes for forensic examiners (part two)

This article was first published in 2007 at http://www.securityfocus.com/infocus/1890 and is reprinted with permission by Jamie Morris Forensic Focus (www.forensicfocus.com) Intro In part one of this series [ref 1] we looked at the different editions of Vista available and discussed

Windows Vista – notes for forensic examiners (part one)

This article was first published in 2007 at http://www.securityfocus.com/infocus/1889 and is reprinted with permission by Jamie Morris Forensic Focus (www.forensicfocus.com) Intro While the fundamental principles of computer forensics remain largely unchallenged, the landscape upon which investigators operate is constantly changing.

F3 – The First Forensic Forum

‘F3 – The First Forensic Forum’, founded in the late 1990’s when forensic computing was still in its infancy, is a non-profit organisation with one specific goal which is reflected in our mission statement – “F3 exists to provide an

Writing a winning resume/CV for computer forensics vacancies

First published April 2007 In this short article, David Sullivan, a specialist computer forensics recruiter at www.appointments-uk.co.uk, provides some tips on compiling a winning CV along with a suggested CV template (available here). In the current job market, the key

Digital Evidence Discrepancies – Casey Anthony Trial

"Over the past few weeks, there has been worldwide interest in the trial of Casey Anthony which was held in Orlando, Florida. Anthony was indicted on charges of murder following the discovery of the body of her daughter Caylee Marie

Intrusion Detection System Logs as Evidence and Legal Aspects

First published January 2007 Fahmid Imtiaz School of Computer and Information Science Edith Cowan University E-mail: fimtiaz@student.ecu.edu.au Abstract Modern techniques and methodologies for detecting attacks and malicious activities on computers and networks has evolved a lot over the last couple

Forensic Image Analysis of Familiar-based iPAQ

Cheong Kai Wee School of Computer and Information Science, Edith Cowan University ckw214@yahoo.com Lih Wern Wong School of Computer and Information Science, Edith Cowan University lihwern@yahoo.com AbstractOne of the PDA forensic issues is the difficulty in maintaining image integrity as

Computer Monitoring: Software vs. Hardware Keyloggers

First published November 2006 Stephen Allen, Allen Concepts Inc., Chandler, AZ July 2006 www.keykatcher.com ABSTRACT John has been at his computer for hours, but his productivity has fallen lately. Is he emailing buddies, busy in chat rooms, or reading internet

The need for effective event management

First published November 2006 courtesy of GFI Software – www.gfi.com Introduction Underrated, undervalued and underutilized; events management is most often rated as a tedious and ungrateful task. System administrators shy away from event logs and the events contained within, citing