Forensic Focus Investigator Well-Being Survey Results

Hero Image

Paul Gullon-Scott BSc MA MSc MSc FMBPSS highlights emerging themes and implications from the Forensic Focus Investigator Well-Being Survey 2024....

Digital Forensics Round-Up, December 05 2024

Digital Forensics Round-Up, December 05 2024

Read the latest DFIR news: $1.5M grant expands digital forensics lab at Harding University, SOF-ELK gets major updates with ECS integration, Cellebrite unveils Inseyets for streamlined mobile data investigations, and more....read more

AI-Powered License Plate Detection With DeepPlate

AI-Powered License Plate Detection With DeepPlate

Discover how DeepPlate from Amped Software leverages AI to assist investigators in analyzing distorted license plates....read more

How To Solve Digital Forensics’ Biggest Challenges With Oxygen Forensics

How To Solve Digital Forensics’ Biggest Challenges With Oxygen Forensics

Matt Finnegan from Oxygen Forensics joins the Forensic Focus Podcast to discuss advancements in mobile device forensics and emerging trends shaping investigations....read more

A Method for Forensic Previews

During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless,

UK Government and industry back IT security professionalism plans

Proposals to create a professional institution that would set minimum standards of professionalism for IT security specialists have won backing from the government and leading businesses. The form the institute will take has yet to be decided. One of the

Video Forensics: Catching the Crooks on Camera

Watching movies and your favorite episode of CSI (Crime Scene Investigation), you would think that recorded video is always crystal clear, easily showing a suspect’s face or his license plate, but this is far from reality. In fact, the recorded

Computer sleuths bring crime to light

When Coreen Kulvich and Meredith Tanner explore hard drives and Zip disks, they’re hunting more than just bytes of data. They’re looking for convictions. Kulvich, 29, and Tanner, 28, make up the Dakota County Sheriff Department’s small but increasingly vital

Australian ISP raided for BitTorrent links

An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian

Cases confirm computer privacy is illusion

Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won’t do it for yourself, do it for your lawyer – the one

Windows Security Log Encyclopedia (Press Release)

IT managers and their staffs now have the Windows Security Log Encyclopedia, a new Windows tool for monitoring, intrusion detection and for carrying out computer forensics. The new tool covers all nine audit categories of Windows Server 2003 and illuminates

Deleted computer files never truly gone

“Whenever you delete a file, you’re really not deleting the file,” said Georges Stokes, system administrator for Air Armament Center plans and programs office. “The data is still technically there.” The information that people attempt to delete from their computers

Indian certificate course on cyber crime

The Indian Society of Criminology (ISC) in coordination with Valliant CISSTech is to offer certificate courses on Cyber Forensics and Penetration Testing. Announcing this at a press meet in Chennai yesterday, R Thilagaraj, secretary, ISC and head of the department

Tracking PCs anywhere on the Net

A University of California researcher, Tadayoshi Kohno, says he has found a way to identify computer hardware remotely, a technique that could potentially unmask anonymous Web surfers by bypassing some common security techniques. In his paper Kohno mentioned possible forensics

Testifying in a Computer Crimes Case

As an IT professional and working network administrator, you may find yourself called upon to testify as a victim or witness (i.e., a representative of a company whose network is victimized) in a computer-related crime. Another possibility is that you

The value of sleuthing skills in IT security

In criminal investigations, forensic evidence is often used to prove that a person was at a particular place at a certain time, or even to show an irrefutable connection with a crime that has been committed. In the world of

Are you sitting next to a criminal?

Computer criminals could be working next to you every day, yet be stealing from your business. A survey carried out on 201 companies by the National High Tech Crime Unit, found that the impact of hi-tech crime in 2003 reached

Computer sleuths dig deep to solve crimes

John Mallery says his current job as a computer forensic expert has some parallels to his former calling as a comedian, juggler and knife thrower. “I’ve thrown knives around my wife. If I’m not in shape and I don’t practice,

‘Unit needed’ to tackle net porn

UK Police want a new body to be set up to investigate internet child pornography. It comes as new figures show arrests and convictions for downloading such images have quadrupled in two years. Home Office figures, revealed by children’s charity