More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Hero Image

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

State Of Cybercrime Legislation Around The World

"The Council of Europe (not to be confused with the European Union/Commission) has worked tirelessly for several years to get different countries to adopt its version of a computer crime law. More importantly, The Council of Europe has been doing

Paraben Giving out PFIC Scholarships for Law Enforcement

Paraben is giving away 100 scholarships for Law Enforcement to PFIC 2010. If you have heard the buzz about this informative and innovative conference but don’t have the budget to attend, e-mail pfic2010@paraben.com. If you qualify and there are still

Appeals Court Guts Landmark Computer-Privacy Ruling

Bowing to the Obama administration, a federal appeals court Monday gutted its own decision that had dramatically narrowed the government’s search-and-seizure powers in the digital age. The 9-2 ruling by the 9th U.S. Circuit Court of Appeals nullifies Miranda-style guidelines

Police say IPhones can store a treasure trove of incriminating evidence

A burgeoning field of forensic study deals with iPhones specifically because of their popularity, the demographics of those who own them and what the phone’s technology records during its use. Law-enforcement experts said iPhone technology records a wealth of information

Cybercrime is Rampant Around the World, Says Study

A new study by security vendor Symantec reports that Internet crime has grown into a widespread problem globally. It also provides intriguing insights into consumers’ lax attitudes toward online piracy, plagiarism, and other illegal or unethical activities. The study says

Is Sarah Palin a Computer Criminal?

If Palin and her ghostwriter are in fact violating Facebook’s terms of use, that probably doesn’t seem like a big deal to most people. Just by surfing around the internet, we “agree” to dozens of website terms of use every

Oxygen Forensic Suite 2010 adds support for iTunes 10

The new 2.8.2 release of Oxygen Forensic Suite 2010 adds support for iTunes 10 as well as newest Blackberry and Samsung devices. All registered customers may download the new version immediately from their personal pages, a trial version is available

Please support David Benford running for the Cystinosis Foundation

David Benford from Blackstage Forensics is raising money for the Cystinosis Foundation by running in the Amsterdam Mizuno half marathon on the 17th of October. David’s daughter suffers from Cystinosis, a very rare and serious condition which is as yet

E-Mail Isn’t as Ethereal as You Might Think

At first blush, message headers seem esoteric. Why should a lawyer care about the alphanumeric ID assigned to a message, the message’s offset from Greenwich Mean Time or the names of the servers it traversed before delivery? The answer lies

Computer Forensics Experts, Who’s Your Daddy?

As computer forensics has become increasingly important to civil and criminal trials, certification for computer experts has been a growing business. Today there are a handful of nonprofit and for-profit organizations that offer computer forensic certification programs. However, no one

CSI SQL Server – Methods for collecting digital evidence

Forensic analysis of database systems is very specific and demanding task, and it was the main inspiration for writing this article. In this article you will find information about what digital forensic is and what kind of methods you can

Intro to Report Writing for Digital Forensics

So you’ve just completed your forensic examination and found that forensic gem or smoking gun in your case, so how do you proceed? Depending on where you fall as a forensicator (e.g., law enforcement, intelligence, criminal defense work, incident response,

Insiders Doubt 2008 Pentagon Hack Was Foreign Spy Attack

In the fall of 2008, a variant of a three year-old, relatively-benign worm began winding its way through the U.S. military’s networks, spread by troops using thumb drives and other removable storage media…”Some guys wanted to reach out and touch

High tech crime fighters in Garfield County Sheriff’s Office

When a detective with the Garfield County Sheriff’s Office collects a computer, cell phone, digital camera, thumb drive, or any other technological device that potentially holds evidence pertaining to a case, they take it to one person — Detective Cpl.