Amped Authenticate – Overcoming Multimedia Forensics Challenges With Expert Witness Testimony

Hero Image

Gernot Schmied, an IT civil engineer and court expert, reviews Amped Authenticate, a product from Amped Software designed to uncover the processing history of digital images and videos....

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11

Now available: XRY 10.11, XAMN 7.11, and XEC 7.11! Enjoy simplified Android FFS support, dark mode for XRY, streamlined Project VIC grading in XAMN, and improved file permissions in XEC. Plus, MSAB Kiosks and Tablets now support BitLocker and Wi-Fi....read more

Oxygen Remote Explorer Now Available

Oxygen Remote Explorer Now Available

Oxygen Remote Explorer v.1.6 is now available. Capture remote disk dumps, extract WhatsApp data via Wi-Fi, and use new passcode brute force tools. The update also includes speech-to-text in 50+ languages, enhancing remote investigations....read more

Freeland Powers Wildlife Protection Task Forces with Digital Intelligence

Freeland Powers Wildlife Protection Task Forces with Digital Intelligence

Thai and Lao officers, trained by digital forensics experts from Detego Global, collaborate in the fight against wildlife trafficking....read more

Arcadia PD has own computer forensics specialist

Detective Scott Elenberger started the Arcadia Police Department’s computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he’s retrieving digital evidence that’s

Paper: Steganography for the Computer Forensics Examiner

“An Overview of Steganography for the Computer Forensics Examiner” by Gary C. Kessler Abstract Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party.

Ashcroft wins Internet wiretap system

U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies. At issue is the 1994

PivX Solutions Announces Computer Forensics Partnership Agreement

PivX Solutions, Inc. has announced a partner agreement to expand the company’s nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.Under the agreement, PivX will be the exclusive provider of computer forensic expert witness and

Last Call for DIGEV 2004 Web Conference Registrations

Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can’t make the date all presentations will be archived

Defense loses motion in CP case

Montrose County District Court Judge Dennis Friedrich denied a motion Wednesday from defense attorneys to dismiss 19 misdemeanor child exploitation counts against Park Avenue Dance Works co-operator John Ward. At Wednesday’s hearing, David Penrod, a forensic examiner for Computer Forensic

Dozens of spammers, scammers arrested

U.S. Attorney General John Ashcroft today will announce the arrests of dozens of people nationwide charged with flooding e-mail inboxes with spam and perpetrating computer fraud and other cyber crimes. Many of the cases have their origin in Pittsburgh, where

Purdue, Law Enforcement Probe Digital World Of Computer Forensics

Purdue University is teaming with law enforcement officers to improve investigation of the new generation of crimes, including computer-aided terrorism, espionage, bank and business fraud, and identity theft. A collaboration with 20 law enforcement officers from throughout Indiana is part

Justice issues guidelines for handling digital evidence

The Justice Department’s National Institute of Justice has published the second in a series of guidelines for IT crime investigations. “Forensic Examination of Digital Evidence: A Guide for Law Enforcement” was created at the agency’s request by the National Institute

South Carolina Computer Crime Center Gets New Tool

The South Carolina Computer Crime Center, which opened in December 2002, handles the forensic examination of evidence collected during the investigation of computer crimes in South Carolina. Soon after it opened, the facility was faced with a rapidly growing volume

Site upgrade complete!

A very warm welcome to the new, improved Forensic Focus website! In addition to the usual features we’ve greatly improved the forum and are working hard on adding new content. We hope that you’ll take a second to register and

New weaknesses in crypto algorithms?

Encryption circles are buzzing with news that mathematical functions embedded in common security applications have previously unknown weaknesses. More (News.com)

Digital Evidence Web Conference – call for papers

The Forensic Institute, in conjunction with forensic.e-symposium.com, is hosting the 1st International Digital Evidence Web Conference. All submissions will be reviewed by a two-tiered committee consisting of the Advisory Group (3M Group) and a Review Committee (RECO Group). They are

High-tech volunteers fight cybercrime

Craig Schiller, an information security officer at RadiSys, isn’t just a high-tech “geek” at work. Neither is Corbin Nash, a security architect at Intel, or Mark Morrissey, a computer science instructor at Portland State University. These three are part of

FBI opens second computer crime lab

The FBI opened a new lab Tuesday dedicated to detecting computer-related crimes and training federal, state and local police to catch Internet pedophiles, frauds and thieves. It is the second such lab the FBI has opened in the United States,

Computer forensics at Bradford University (UK)

The University of Bradford has introduced a postgraduate course in Forensic Computing, in response to “growing demand for computer scientists” with specialist skills to investigate high tech crimes. The MSc is one of a handful of similar courses available to