Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Hero Image

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....

Digital Forensics Round-Up, July 30 2025

Digital Forensics Round-Up, July 30 2025

Read the latest DFIR news – Epstein video analysis by ex-FBI experts, stress warning signs in forensics, Raspberry Pi toolkit “Toby,” PDF tampering risks, SWGDE timing advance guidance, and more....read more

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

S21 Spotlight Transcriber – Slow, Manual Transcription Or Insecure Online Service? There’s A Better Way.

Tired of risky online transcription tools? Discover a faster, fully offline alternative built for secure investigations....read more

Transforming Mental Health And Organisational Culture In Digital Forensics

Transforming Mental Health And Organisational Culture In Digital Forensics

Discover how Adapt & Evolve is helping transform digital forensic units through trauma-informed, evidence-based workshops on stress, psychological safety, and leadership....read more

Starting a Digital Forensics Section

Craig is sitting in his office enjoying a cup of coffee when his telephone rings. He answers and on the line is his boss, George, the laboratory director. George informs Craig that he wants to provide Digital Forensic analysis services

Public and police are finally taking online crime seriously

Recently, I attended a barbecue at a friend’s house in north London, where another friend was trying to fix his laptop. “Do you realise that there are three people, right now, using your wireless broadband?” the computer expert asked my

Defining Digital Forensics

Wouldn’t it be great if we could just look up the term “digital forensics” in the dictionary? Unfortunately, as you and others have found, it is not that easy. Even better, wouldn’t it be great if we could sort out

Forensics: New Options for the Enterprise

If you think finding out who did what with your data always means calling in high-priced spooks armed with arcane software, think again. The trend is toward placing the power to handle investigations in the hands of enterprises themselves. Why?

On the Trail of Digital Secrets

From prominent murder cases to lowly divorce proceedings, the e-mail messages that people send and the Web sites they view can and will be used in court. The people who unearth this data and make it usable in the courtroom

Businesses call for police cyber crime unit

UK businesses are calling for a dedicated national police unit to deal with the growing computer crime threat posed by hackers and international gangs of criminals. Organisations must currently report any attacks on their network or data to local police

Standards and Controls in Computer Forensics

The use of appropriate standards and controls is essential during forensic analyses if the resulting conclusions are to be considered scientific and used for prosecutorial purposes. No forensic examiner can rightly state that he or she provided quality analytical results

Forensic Analysis of Computer Programs

The practice of Reverse Engineering of computer programs has grown out of its obscure and nefarious origins and entered the realm of Computer Forensics. On an increasing basis Computer Forensic Examiners are encountering critical evidence of sophisticated cyber crimes contained

Indiana State Police Forensics Field Triage Program a Success

Approximately two years ago, the Indiana State Police instituted a unique program in which examiners conduct on scene computer forensics. The goal of the Computer Forensics Field Triage program is to utilize departmental resources efficiently to improve cyber crime investigations

WinHex, X-Ways Forensics, X-Ways Investigator 14.4 released

WHAT’S NEW? * Ability to extract e-mail messages and attachments from AOL PFC files. (forensic license only) Note that if these files have no extension, only a signature check will identify them as PFC files. * Can now extract embedded

Computer cop receives award

The New Britain police department’s computer crime expert was stumped. The state police’s lab couldn’t help. Even the FBI didn’t have the answer. But Lt. James Wardwell kept searching, trying to find some way to infiltrate a stack of erased

NZ IT practices inadequate for forensic evidence

The second annual New Zealand Computer Crime and Security Survey has revealed New Zealand organisations are ill-equipped to preserve computer forensic evidence. The University of Otago conducted survey – which aims to raise the level of security awareness and determine

Court systems ill-equipped to understand e-crime

Computer forensics investigator Bryan Sartin says court systems are ill-equipped to understand e-crime, even at a basic level. Here he describes a recent case of a hacker who stole customer information from a retail system. The case didn’t play out

Mobile Phone Forensic Course Available From Guidance Software

Guidance Software, Inc. today announced the availability of its introductory level mobile phone forensic course. The hands-on course introduces investigators to Neutrino™, the company’s mobile phone acquisition tool, and demonstrates how the product is used to perform comprehensive analysis and

Bloggers Held Under New Thailand Computer Crime Law

If you thought Germany’s new computer crime laws were strict, try posting an offensive comment on the Web in Thailand. According to the independent newspaper Prachatai, at least one person is being detained in the Bangkok Remand Prison for crimes

Understanding IM as Evidence

Instant messaging is an increasingly popular medium that’s sometimes an important link in the prosecution’s case. As with every new communication tool, it brings new challenges for criminal procedure. This multilayered technology provides the convenience of e-mail coupled with the