Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Hero Image

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Group honors high-tech work on BTK

A Wichita police detective who helped solve the BTK murder cases has won an international crime investigation award. Detective Randy Stone, whose computer sleuthing provided a turning point in the hunt for BTK, will be given an award for “forensics

Storm brewing over SHA-1 as further breaks are found

Three Chinese researchers have further refined an attack on the encryption standard frequently used to digitally sign documents, making the attack 64 times faster and leaving cryptographers to debate whether the standard, known as the Secure Hash Algorithm, should be

Computer Forensics and Its Impact on Employment Litigation

Computer forensics is becoming a routine part of many employment cases. To cite a few recent examples handled by our firm: After a key employee suddenly resigned, the employer hired a computer forensics company to search the hard drive of

New forensic software released

With a raft of bogus bank Web sites and phishing scams flooding computers, it would appear that crime has gone dotcom like everything else. However, a new forensic tool has stepped into the computer crime scene to help search, not

Messages of fear in hi-tech invisible ink

The first sign that something was amiss came a few days before Christmas Eve 2003. The US department of homeland security raised the national terror alert level to “high risk”. The move triggered a ripple of concern throughout the airline

Judge weighs access to victim’s PC

The attorney representing Michael Hernandez, the teen charged with murdering his classmate last year in the bathroom of their middle school, wants to peek into the victim’s mind by scanning through the memories of the slain boy’s computer… More (Sun-Sentinel.com)

New paper: An Analytical Approach to Steganalysis

A new paper, "An Analytical Approach to Steganalysis" by James Wingate and Chad Davis, is now online and can be found here. A full list of articles and papers held at Forensic Focus can be found here. New submissions are

Software hide and seek

Delete isn’t enough anymore. Consider the case of Robert Johnson, the former Newsday publisher who, prosecutors allege, used a software program called Evidence Eliminator to rid his computers of CP. Pressing ”delete” makes files invisible, perhaps, but it doesn’t make

Secret files may be record of past crimes

Three days before police say he murdered an Idaho family, Joseph Duncan bragged online about an encrypted, tell-all journal that wouldn’t be broken into for decades. He figured technology would catch up in 30 years, “and then the world will

Diskology Adds Write Blocking to Portable Hard Disk Duplicator

Diskology, Inc. announced a new version of their award-winning Disk Jockey portable hard disk duplicator today. The new model includes a write blocking feature essential for computer forensic examinations. The new unit is available as part of a “Forensic Kit”

Forensic Computers release Linux forensic system

Forensic Computers announced today that they have released a Linux forensic system that integrates the full technical, legal and personnel requirements into a complete package in conjunction with TaFusion MEPIS Linux. A live CD is included with the application that

UK police want new computer powers

The UK Association of Chief Police Officers (ACPO) has called for new powers to allow police to tackle rogue websites, and make withholding encryption keys a criminal offence. The new proposals are buried inside a long and sometimes controversial list

Kroll Ontrack Named Most Used Electronic Discovery Service Provider

This week, the editors of “Law Office Computing” announced the winners of the 11th Annual Reader’s Choice Awards. This year’s survey results recognized Kroll Ontrack as one of the most used service providers in the electronic discovery category. Electronic discovery

Retired officer returns to computer policing

Some forensic experts look at fingerprints, blood or other evidence to solve a crime. Rudy Jones searches computer hard drives. “Computers are used in every aspect of today’s society,” said Jones, a 53-year-old York County resident. “People use the computer

Turiss LLC Opens Washington State Office

Turiss LLC, a digital investigations and information protection firm headquartered in Reston, Virginia, today announced the opening of a new office in Washington state to provide for the computer and cyber security needs of clients on the West Coast and

CyberSecurity to Offer New Certification Process

CyberSecurity Institute announced yesterday that testing for the CyberSecurity Forensics Analyst (CSFA) certification will begin in November of this year, with overview sessions for the process kicking off this September. The new certification process stresses the skills needed for real