Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Hero Image

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Digital Forensics Jobs Round-Up, August 04 2025

Digital Forensics Jobs Round-Up, August 04 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Collaborative Forensics: Overcoming Challenges In Multi-Jurisdictional Investigations

Discover expert strategies for cross-border investigations in Exterro’s on-demand webinar....read more

Real Digital Forensics

Another computer forensics book hits the shelves, along with accompanying website: http://www.realdigitalforensics.com/ If anyone’s read it please post a review to the forums.

Computer forensics: Donning your detective hat

“Quincy, ME,” the 1970s TV series, showed the dramatic potential of medical examiners. We’re waiting now for the premier of “Quincy, CF.” Computer forensics is playing an increasingly important role in thwarting wrongdoers at the federal, state and local level…

How CSI got computer forensics wrong

A team of computer forensic investigators has pointed out that a character in a recent episode of hit TV show CSI: Crime Scene Investigation failed to follow a basic rule of looking for evidence: don’t switch on the computer… More

Electronic data legislation in the UK

From casual e-mails to information on your iPod, electronic data can now be required as court evidence. Jonathon Crook, Jonathan Tardif and Andrew Szczech assess the business implications following recent changes to the Civil Procedure Rules… More (LegalWeek)

High tech hunt underway in pilfering of SSJID’s files

A computer forensic expert is continuing to pour over hundreds of South San Joaquin Irrigation District files that were “improperly accessed” to determine who — if anyone — should be pursued for prosecution… More (Manteca Bulletin)

FBI Hunkered in The Bunker

Imagine you have this going for you: the best the world’s only super power can give you in personnel, intelligence, hardware and software with cost overruns no problem. Meet Steve Martinez, cyber G-man… More (internetnews.com)

Danish Web Hosting Company Adds Free Forensic Tool

Danish web hosting company EasySpeedy (http://easyspeedy.com) has added a software-based Forensic investigation utility to its Remote Recovery System. The company, who specializes in hosting dedicated servers and Linux/BSD, suggests the utility will enable customers to remotely recover their data while

T3i Launches Information Forensics Digital Laboratory

T3i, a leading information security consulting firm, announced today that it has launched its Information Forensics Digital Technology Laboratory (DTL). The Hi-Tech Digital Laboratory was established in order to provide T3i client’s with an expanded range of services including digital

Trail of evidence leads Secret Service to computer forensics

The reason the Secret Service puts so much emphasis on computer forensics is fairly simple: Computers are where the clues are. “Today, just about every crime scene has some form of digital evidence,” said Dale Pupillo, deputy special agent in

Making a case for computer forensics

A commitment to establishing a computer forensics operation is an expensive proposition, and it’s not a one-time purchase decision. Computers and software have to be upgraded frequently. New technologies, such as cell phones and personal digital assistants, require new tools

Digital clues help police land high-tech pirates

Last month, the Sacramento Valley Hi-Tech Crimes Task Force, along with the U.S. Attorney’s Office and the Secret Service, busted what they described as a massive DVD pirate ring. When the case goes to court, the prosecuting attorneys should have

Phishing attackers and their mules sent down

Three men who sent thousands of emails purporting to come from eBay, and four others who acted as so-called money mules, were sent to prison by Preston Crown Court yesterday, marking the first convictions for a UK-run phishing operation… More

Denial of Service prosecution fails

A British teenager has been cleared of launching a denial-of-service attack against his former employer, in a ruling that delivers another blow to the U.K’s Computer Misuse Act. At Wimbledon Magistrates Court in London, District Judge Kenneth Grant ruled Wednesday

Expanding computer sleuth company moves to Herndon

A team of computer sleuths is hard at work in Herndon, doing everything from telling clients how secure their network to doing computer forensic work to figuring out what files a client’s disgruntled employee might have leaked to a competitor.