Magnet Forensics & NCMEC announce NCMEC GID in Magnet Griffeye products for U.S. ICAC investigations

Hero Image

Magnet Forensics and NCMEC launch NCMEC GID within Magnet Griffeye products, enabling U.S. ICAC investigators to instantly match case data with NCMEC’s repository of child sexual abuse material (CSAM) in real-time....

MD-Series Release Note Highlights : 2024 Q3 Review

MD-Series Release Note Highlights : 2024 Q3 Review

GMDSOFT’s Q3 release for the MD-Series introduces key advancements, including enhanced device and app support, improved image analysis, VoIP call analysis, drone data extraction, and AI-driven video tools....read more

Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Gernot Schmied, an IT civil engineer and court expert, reviews Amped Authenticate, a product from Amped Software designed to uncover the processing history of digital images and videos....read more

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11! Enjoy simplified Android FFS support, dark mode for XRY, streamlined Project VIC grading in XAMN, and improved file permissions in XEC. Plus, MSAB Kiosks and Tablets now support BitLocker and Wi-Fi....read more

Technology helps police in CP operation

Australian Customs officials say the latest technologies are assisting them in detecting the importation of CP. A man will appear in court this morning after customs officers at Melbourne Airport seized computer disks from his luggage on his arrival from

Lab cleared to examine digital evidence

New Hampshire’s state forensic laboratory has become the third in the United States to receive national accreditation for examining digital evidence, including images stored on computer hard-drives. The accreditation was awarded by the American Society of Crime Laboratory Directors, which

New downloads

The following files have been added to the downloads area: The Sleuth Kit Version 1.72 (source code)Autopsy Forensic Browser Version 2.03 (source code)PDA Forensic Tools:An Overview and AnalysisACPO Good Practice Guide for Computer based Electronic EvidenceHi-Tech Crime 2004 – the

Helping investigators gather crime evidence from PDAs

Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in

Police get help to cope – horrific scenes make counseling necessary

Modern policing puts an emphasis on mental health, said J. Mark Hall, a psychologist with a private practice in Glastonbury. He works with troopers from the state police computer crimes unit. Those officers spend their days trying to lure pedophiles

Washington/Seattle University program trains cybercrime fighters

The UW, Highline Community College (HCC) and Seattle University are teaming up to offer a joint computer forensics program, aided by a $270,000 grant from the National Science Foundation. After completing the 12 to 18 month program, students will earn

Feds invite comment on Internet wiretaps

The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies. More (Security Focus)

Seminar on criminal investigations in Goa, October 9th

A two-day seminar on ‘Crime investigation – modern techniques’ will be inaugurated at the Goa International Centre, on October 9. The inaugural session of the seminar will have a plenary lecture on ‘Computer crimes and cyber forensics’ delivered by the

Forensics gains credibility at Purdue

Chris Marsico, a graduate student, is using this semester to focus on the forensic possibilities of devices like iPODs. Just this summer, a group of car thieves in the UK was arrested, due in part to evidence discovered on an

Digital Investigation – Issue 3

From Matthew Smaldon at Elsevier: “I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this

Forensic Focus call for papers

The Forensic Focus “papers and articles” section http://www.forensicfocus.com/computer-forensics-papers.php is now online and we’re actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at admin@forensicfocus.com, thank you. Jamie–

Mobile threat to company data exposed by security experts

Companies must be more vigilant about employees using mobile devices – such as iPod music players and personal digital assistants (PDAs) – at work, security experts warned today. A computer forensics study into the latest Mini iPod, conducted by corporate

Peterson Testimony Turns to Computer Data

Testimony in Scott Peterson’s murder trial returned to what investigators found in his computers as prosecutors try to prove Peterson researched the San Francisco Bay before dumping his pregnant wife’s body there… More (Sun Herald)

New download: A National Research and Development Agenda (ISTS)

Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this