The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Computer Forensics Helping Texas Police Statewide

He is alone in front of his computer, and with the click of a button, his crime is erased – or so the technically savvy criminal may think. And to extract the evidence from computer hard drives, cell phones, personal

Private Forensic Examinations in RIAA case

As part of their investigation into illegal music downloading, the RIAA demanded full access to a suspect’s computer, which the accused felt was a violation of her privacy. The judge agreed with her and is letting her hire her own

The effective response to computer crime

The attraction of computer-based crime is obvious. Twenty years ago corporate spies would find it difficult to steal the entire contents of a filing cabinet, but today they can take far more by slipping a disc into their pocket or

Alabama prosecutors hiring cyber sleuths in digital forensics

When a computer, cell phone, e-mail or other high-tech device holds the key to a crime, cyber sleuths are called to dissect the digital evidence. In south Alabama, it’s Gus Dimitrelos, who is based in a Spanish Fort police office

Computer techs tip police on CP

As an information technology specialist, Troy Wallwork has seen the secrets inside plenty of computers, from financial records to love letters. But when a recent search of one customer’s PC turned up what looked like CP, he didn’t know what

State funding sought to fight computer crimes in Maine

Michael Cantara gets a knot in his stomach when he thinks about the backlog of computers that have yet to be analyzed as evidence in CP cases. Cantara, commissioner of the Department of Public Safety, asked lawmakers Monday to give

Computer crime non-typical for Macedonia

A regional conference on the theme Credit Card Frauds opened in Skopje on Tuesday. SECI’s Task Force on Combating Financial and Computer Crime organized the event. The conference brought representatives of 12 member-states of the SECI Regional Center for Combating

Target checklist: Socks, shampoo, forensics

…when the tape proved too fuzzy to use, investigators turned to one of the most sophisticated forensic labs in the country to help solve the case – at the Target Corp. The retailer’s technicians cleaned up the tape and helped

How to legislate against hackers

Everyone is in favour of sending hackers to prison for longer, but technology commentator Bill Thompson wonders if our MPs are competent to make good cyber-laws… More (BBC)

Call For Papers – Digital Forensics Research Workshop (DRFWS) 2006

Call for Papers The 6th Annual Digital Forensic Research Workshop (DFRWS 2006) August 14-16, 2006 Purdue University Lafayette, Indiana, USA www.dfrws.org dfrws2006 (at) dfrws (dot) org The purpose of this workshop is to bring together researchers,practitioners, and educators interested in

Cyberthreats? Call a digital Sherlock Holmes

When the CEO of a small San Diego publishing company started receiving threatening e-mails from an anonymous address, he had a pretty good idea that someone in the company’s IT department was involved. The CEO called his lawyers, who in

New data deletion software for consumers

Software that its developers claim will completely eliminate sensitive data from hard drives has been developed by Nova Development. Drive Erase Pro is targeted at people who want to ensure a hard drive or memory card is truly blank before

Special agent uses teen talk and computer forensics

Most weekdays, and some weekends and nights, find Special Agent James May sitting in front of a PC in his Detroit office, waiting for some cyberjohn to hit on him. Well, not him exactly, but one of his many teenage

Chasing cyber-crime, one byte at a time

Tom Heflin is the resident surveillance technician and computer forensics expert for the Augusta County Sheriff’s office, the department’s first line of defense against computer-based crimes. His primary job: Cracking open hard drives and electronic media seized by deputies to