The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Microsoft offers one-click police report via IM

Users of Windows Live Messenger or MSN Messenger in the United Kingdom can click a new button in the chat application to contact police with reports of suspicious behavior and instances of inappropriate sexual conduct online… More (news.com)

DOD eyes new forensics

The Defense Department issued a challenge to coders in an effort to get help in computer forensics and data analysis. Contestants will compete to uncover and recover digital data that’s been hidden or damaged. “They will be dealing with all

Version 2.0 of StegAlyzerAS and StegAlyzerSS released

Backbone Security’s Steganography Analysis and Research Center (SARC) has released version 2.0 of StegAlyzerAS (Steganography Analyzer Artifact Scanner) and StegAlyzerSS (Steganography Analyzer Signature Scanner). The new versions have significant new improvements including the ability to scan images of seized storage

NIST’s goal: Keep digital evidence fresh

Scientists at the National Institute of Standards and Technology are known for sweating the nitty-gritty details of dull but vital standards for everything from bulletproof vests to medical measurement devices and IT encryption. And now, agency experts are bringing the

E-mail first step on trail

The investigation that led law enforcement to John Mark Karr can be traced to a single e-mail, sent some four years ago… More (Rocky Mountain News) While the FBI’s Atlanta spokesman, Stephen Emmett, declined to elaborate on the FBI’s role,

Computers play large role in solving cases

Computers can contain a wealth of evidence, making them valuable resources for law enforcement, government officials, private companies and the like. That’s even if the user thinks incriminating files have been deleted, or if nothing on the hard drive is

Cost of computer crime in NZ

New Zealand organisations spend on average about half a million dollars annually fighting computer crime within their organisations, according to a new University of Otago survey… More (Scoop)

WinHex & X-Ways Forensics 13.2 released

WHAT’S NEW IN V13.2? * There are new (optional) quick filter buttons in the directory browser column headers that allow to activate and modify dynamic filter settings more instantly. * The indexing algorithm was revised. The index files are now

Cybercrime Treaty: Effective Law Enforcement?

The U.S. Senate recently approved an international treaty designed to combat computer crime. The treaty has been touted by Senate leaders as enhancing the U.S. ability to cooperate with foreign governments in fighting terrorism, computer hacking, money laundering and child

UK police decryption powers ‘flawed’

The government faces criticism over plans to give police powers to make suspects produce readable copies of encrypted computer evidence.The police say the powers are needed because criminals are increasingly using encryption to hide evidence. They estimate that currently there

An introduction to Computer Forensics

E-business is, by definition, technology-dependent. With the increased use of technology it is often assumed that failures are directly related to IT. In actual fact, a significant number of failures or incidents are the result of unauthorised acts by employees

Live forensics

Computer forensics, much like more traditional forensics, is an art as much as a science. Its practice demands a detective’s intuition and a technician’s know-how. Only in this case, it’s to discern digital clues from the inner workings of electronic

The electronic autopsy – digital forensics Part 1

The popularity of TV shows such as CSI and true crime shows that portray forensic science in action have long held a fascination for audiences for the simply amazing conclusions that can be drawn from what seems so little evidence.

Ten Blunders That Stop E-Discovery Cold

A colleague recently asked me to list 10 electronic-data-discovery errors lawyers make with distressing regularity. Here’s that list, along with suggestions to avoid making them… More (Law.com)

Internet infidelity target of a new book

The opening chapter of John Paul Lucich’s new book is titled “Welcome to My World.” And a grim, labyrinthine world it is. A computer forensics expert who specializes in computer security and corporate fraud cases, Lucich is the author of