Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Hero Image

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Transforming Mental Health And Organisational Culture In Digital Forensics

Transforming Mental Health And Organisational Culture In Digital Forensics

Discover how Adapt & Evolve is helping transform digital forensic units through trauma-informed, evidence-based workshops on stress, psychological safety, and leadership....read more

Video of detective detailing Entwistle computer searches

A computer forensic expert continued testimony Wednesday in the Neil Entwistle murder trial. Police detective Lawrence James discussed with he found during a search of Entwistle’s laptop computer. Lawrence James told a Middlesex Superior Court jury yesterday that Entwistle did

Man Cleared of CP Charges After Hiring Computer Forensics Expert

[Here’s an article with more technical details on this earlier story – Jamie] Here’s a lesson for computer neophytes – when you get accused of having CP on your computer, subsequently get fired, lose your friends and family and face

How To Take Back Control Of The Discovery Process And Control Litigation Costs

For in-house attorneys, the costs of discovery rise when Electronically Stored Information (ESI) is uncontrolled. The objective of the litigation readiness process is to make sure that the IT professionals and the legal professionals, who certainly speak different languages, understand

Malware not man blamed in child abuse download case

A Department of Industrial Accidents investigator has been cleared of CP possession charges after a forensic investigation revealed that malware was to blame for depraved smut on his company laptop. Michael Fiola, 53, of Rhode Island, went through a massive

Internet companies to block CP sites

Verizon, Sprint and Time Warner Cable have agreed to block Internet bulletin boards and websites nationwide that disseminate CP, New York’s attorney general announced on Tuesday. The ISPs also agreed with New York Attorney General Andrew Cuomo to contribute more

Weak Evidence Links Congressmen’s Cyber-attacks to China

U.S. House of Representatives members who worry that China may have been responsible for attacks on their computers have provided little evidence to back up their claims, according to computer security experts…”It’s so very hard to conclude that something came

Live Acquisition and Triage tool for Law Enforcement

WetStone Technologies, Inc. announces U3 Live Investigator, a live acquisition and triage tool using U3 technology that is being created under the USB Live Acquisition and Triage Tool (US-LATT) contract funded by the National Institute of Justice (NIJ). U3 Live

North Wales Police launch firm to crack e-crime

North Wales Police have launched a crime fighting business to step up their fight against computer and mobile phone crime. Police and BIC Innovation have joined forces to launch DATRIS – Data Recovery & Investigation Service – a private enterprise

Help Needed with Encrypting Virus

After discovering a new and improved virus that encrypts important files on infected machines, researchers from Kaspersky are calling on fellow security professionals to lend a hand in cracking the massive key needed to liberate the ensnared data. The call

Rules of Evidence – Digital Forensics Tools

Forensics tools are often confused with other classifications of tools, such as incident management, e-discovery and data recovery. But while they can be used for those purposes, the difference is that they abide by formal evidence processing protocols such as

University of Cape Town (UCT) teaches computer forensics

The University of Cape Town (UCT) is training its first 15 postgraduates in computer forensics as part of an effort to establish a “centre of excellence” to combat, investigate and prosecute computer crime. UCT is from this year offering an

FTK 2.0 and “evidence leakage”

“They are now allowing EVIDENCE outside of the forensic lab. Not in the sense of copying data, but viewing the data, which due to caching is essentially the same as copying. This is not what I would consider acceptable in

Purdue prof schools law enforcement on Mac “cyber forensics”

Dr. Marc Rogers, Director of Cyber Forensics at Purdue University, is leading a three-day crash course for law enforcement officers from around the state of Indiana this week. He hopes this will be the first of many such training sessions

LiveWire Investigator Version 4.0-Live Network Investigation

WetStone Technologies has unveiled LiveWire Investigator Version 4.0 for incident response, vulnerability assessment, compliance audits and criminal investigations. Features include physical memory imaging, application and process state discovery, Windows service discovery, active port mapping, Windows log discovery and analysis, remote

Bletchley Park – In need of repairs

I do realise that this is slightly off topic, but for those that believe like I do that the history of our profession is important, I’d like to bring this to your attention. http://www.theregister.co.uk/2008/05/30/bletchley_park/ http://www.bletchleypark.org.uk/news/docview.rhtm/516816 If you don’t already know,