The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

North Wales Police launch firm to crack e-crime

North Wales Police have launched a crime fighting business to step up their fight against computer and mobile phone crime. Police and BIC Innovation have joined forces to launch DATRIS – Data Recovery & Investigation Service – a private enterprise

Help Needed with Encrypting Virus

After discovering a new and improved virus that encrypts important files on infected machines, researchers from Kaspersky are calling on fellow security professionals to lend a hand in cracking the massive key needed to liberate the ensnared data. The call

Rules of Evidence – Digital Forensics Tools

Forensics tools are often confused with other classifications of tools, such as incident management, e-discovery and data recovery. But while they can be used for those purposes, the difference is that they abide by formal evidence processing protocols such as

University of Cape Town (UCT) teaches computer forensics

The University of Cape Town (UCT) is training its first 15 postgraduates in computer forensics as part of an effort to establish a “centre of excellence” to combat, investigate and prosecute computer crime. UCT is from this year offering an

FTK 2.0 and “evidence leakage”

“They are now allowing EVIDENCE outside of the forensic lab. Not in the sense of copying data, but viewing the data, which due to caching is essentially the same as copying. This is not what I would consider acceptable in

Purdue prof schools law enforcement on Mac “cyber forensics”

Dr. Marc Rogers, Director of Cyber Forensics at Purdue University, is leading a three-day crash course for law enforcement officers from around the state of Indiana this week. He hopes this will be the first of many such training sessions

LiveWire Investigator Version 4.0-Live Network Investigation

WetStone Technologies has unveiled LiveWire Investigator Version 4.0 for incident response, vulnerability assessment, compliance audits and criminal investigations. Features include physical memory imaging, application and process state discovery, Windows service discovery, active port mapping, Windows log discovery and analysis, remote

Bletchley Park – In need of repairs

I do realise that this is slightly off topic, but for those that believe like I do that the history of our profession is important, I’d like to bring this to your attention. http://www.theregister.co.uk/2008/05/30/bletchley_park/ http://www.bletchleypark.org.uk/news/docview.rhtm/516816 If you don’t already know,

Mobile Phone Forensics

It’s been 20 years since a UK drug dealer discovered too late the folly of keeping all his records on a Psion Organiser, helpfully providing police with names and addresses of customers and suppliers, as well as sales records. Today’s

Guidance Software to Offer HBGary Responderâ„¢ for Live Memory Analysis

Guidance Software Inc. has announced a strategic alliance with HBGary Inc., a leading provider of security assessment solutions and services. Through this relationship, Guidance Software adds HBGary‘s unique live memory (RAM and volatile data) analysis solutions to its portfolio of

Ecuadorian analysts comment on INTERPOL’s laptop procedures

Last Thursday, May 15, the International Police Agency (Interpol) released their long-awaited report on the laptops and computer materials the Colombian Army said it captured after the March 1 bombing and raid on a guerrilla camp in Ecuador. As expected,

What makes a cyber criminal?

Cyber crime – internet banking and credit card fraud – is now the fastest growing sector of global organised crime, increasing at a rate of about 40% per year. With Brazil thought to have by far the largest number of

INTERPOL releases computer forensic report requested by Colombia

INTERPOL today presented the results of its forensic examination of eight seized FARC computer and hardware exhibits following a request for assistance in March of this year by Colombia, one of INTERPOL’s 186 member countries. INTERPOL Secretary General Ronald K.

CSI Stick: The Portable Cell Phone Forensic Tool

Paraben Corporation, a digital forensic technology provider, announced today that it has released the new Cell Seizure Investigator Stick (CSI Stick). The CSI Stick is a thumb drive size device that forensically acquires data from cell phones. This portable solution

WetStone Offers Training at Techno Security

WetStone will be hosting two pre-conference classes on May 30-31, 2008 at the 10th annual Techno Security Conference. The Live Investigator Training course is designed to teach students the techniques for acquiring digital evidence from a running suspect’s system in

Network forensics group test

Network-based tools covered some interesting territory. There are two classes of solutions that seem to be lumped into the network forensics category. The first incorporates all those offerings that do much of what traditional computer forensics tools do, only they