The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Digital Technology Footprints Trip Up Suspects

The man denied any wrongdoing, but Lakeland police had something on him – his cell phone. Since the department founded its intelligence unit in 2001, cell phones, computers, MP3 players, and many other forms of digital technology have taken on

SANS Announces New Resources for Computer Forensics

Forensics experts tend to work alone or in small groups and have few ways of sharing the most important lessons they are learning. SANS is trying to fill that gap in part because SANS trained many of the most effective

Secure Hash Competition Kicks Off

Dozens of amateur and professional cryptographers signed up last week for the United States’ first open competition to create a secure algorithm for generating hashes – the digital fingerprints widely used in a variety of security functions. The contest, run

AccessData offer for Guidance Software announced, rejected

AccessData Corporation has announced that on October 6th it sent a letter to Guidance Software expressing its interest in acquiring all of the company’s outstanding stock. On Friday October 31st, AccessData reports that it received a reply from Guidance Software

Computer crime soars in UK

Computer related crimes have risen by almost 10 percent in the UK last year alone, according to online identity firm, Garlick. The report claims that over 3.5 million online crimes were committed in the UK in 2007 – most of

libpff (alpha) released for open source PST and OST forensics

An alpha version of libpff for forensic investigators using open source forensic tools has been released. Libpff is a library with tools to read, extract and recover deleted e-mails. The file format on the personal folder format can be found

South Texas College instructor writes Computer Forensics for Dummies

Rey Anzaldúa’s new book, Computer Forensics for Dummies, hit the shelves in October 2008 and is helping consumers sleuth their own digital trails. “People underestimate the amount of digital information they leave behind on digital devices and throughout the Internet

Police may have beaten encryption key out of suspect

When criminals turn to disk encryption to hide the evidence of their crimes, law enforcement investigations can hit a brick wall. Where digital forensics software has failed to recover encryption passwords, one tried and true technique remains: violence. It is

Digital Forensics & Incident Response Go Live

The days of performing only traditional “dead” forensics on a host after a security incident are over. A shift to “live” forensics and incident response investigations is underway, with a round of new tools focused specifically on collecting volatile data

Evidentiary Songs Played by iPods

Some months ago we reported on the use of iPods as an educational tool, and provided information on schools and universities that have incorporated this technology for the benefit of their students. Our report today involves a more complex use

E-discovery’s here, but it doesn’t have to hurt

When headlines read, “Bear Sterns prosecutor builds case on e-mail,” how to keep or destroy electronically stored data may sound like a new business challenge. It doesn’t need to be, according to Derek Witte, who formerly practiced at Miller Johnson

UK Home Office mulls fighting hacking with corporate ASBOs

The Home Office is consulting on the possibility of applying serious crime prevention orders (AKA corporate ASBOs) to computer hacking laws. Serious crime prevention orders allow the courts to apply “injunctions” against criminal behaviour granted on the basis of the

TSK 3.0.0 and Autopsy 2.20 released

This major release of TSK contains many new library and tool features. * Orphan files (deleted files that have a metadata structure, but do not have a parent directory that can be reached from the root directory) are now shown

FBI sees rise in computer crime

Computer spying and theft of personal information have risen notably in the past year, costing tens of millions of dollars and threatening U.S. security, the FBI’s cyber division head said on Wednesday. FBI Assistant Director Shawn Henry told reporters that

UK cybercrime overhaul finally comes into effect

Updates to the ageing Computer Misuse Act (CMA) finally come into force in England and Wales on Wednesday (1 October). Modifications to the CMA – which was enacted in 1990 before the advent of the interweb – were included in