Digital Forensics Round-Up, August 13 2025

Hero Image

Read the latest DFIR news – evidence of Kohberger’s detailed murder preparations, an alarming rise in child sextortion cases, Brian Carrier’s new mini-course on automation and AI in forensics, and more....

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Well-Being In Digital Forensics And Policing: Insights From Hannah Bailey

Hannah Bailey shares her journey from frontline policing to founding Blue Light Wellbeing, explaining why culturally-aware mental health support is crucial for DFIs and frontline workers....read more

Oxygen Tech Bytes In July 2025

Oxygen Tech Bytes In July 2025

Level up your DFIR skills in under 20 minutes with Oxygen Tech Bytes’ expert-led, on-demand webinars....read more

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....read more

Rise in UK public sector PC misuse

Computer fraud and abuse is on the rise in the public sector, a report by the public watchdog, the Audit Commission, has found. The number of computer fraud cases has doubled, up from 8% of cases in 2001 to 16%

Course boosts computer forensics capability in Hong Kong

To enhance officers’ computer forensics capability, the Hong Kong Police organised a two-week “Computer Forensics Certification Course” last month that 18 computer forensics examiners attended. The first part covered file system level analysis which underpins all computer forensics theories. The

PGP use ruled relevant in Minnesota

A Minnesota appeal court has ruled that a trial judge was within his rights to allow police evidence about the presence of an encryption program on a defendant’s computer to be admitted in a child abuse case. The ruling came

LanpherWilson Acquires Computer Forensic Group, Inc.

LanpherWilson Corporation today announced that it has acquired Computer Forensic Group, Inc. of Germantown, MD to form a new company called Turiss, a digital investigations and information protection firm with target markets in the corporate, legal and government arenas… More

Fletcher aides leave plentiful trail of e-mail

Comfortable with high-tech gadgets, Gov. Ernie Fletcher’s aides use state-issued computers and BlackBerries to send e-mail that details their deeds, plans, turf battles, even their moods, sometimes on an hourly basis. Now, that e-mail is a trail of bread crumbs

The Certified Computer Examiner Certification

While computer forensics certifications are not as mainstream as an MCSE or CCNA, there are several forensic certifications that are growing in prominence and that are worthy of investigation if you are considering this type of certification. One of these

Sault College (ON, Canada) to host computer forensics workshop

Sault College (Marie, ON, Canada) will present a computer forensics workshop for IT professionals from June 13 to 17. James Lewis, site director for the Centre for Systems Security and Information Assurance (CSSIA) at Washtenaw Community College in Ann Arbor,

Keyboard cops

Forget leaving fingerprints at the scene of the crime. Today’s police know that the hard evidence they find on your hard drive can put you behind bars. Computer forensic analysts – the detectives of the digital world – are in

CFP: DFRWS — Extended Deadline

From Brian Carrier: The paper submission deadline for DFRWS 2005 has been extended untilFriday June 3, 2005. For those who have already submitted papers, you canstill edit your submission on the server. For those who requested anextension or are behind

An Inside Look at a Disk Recovery Service

In many failure-related cases, the chances of recovering data from a hard disk range from good to very good. If the electronic system is the only thing affected, then the drive can often be reused after the control panel has

Used hard drives betray company secrets

A study of 200 hard drives bought on eBay this year reveals that over 70 per cent contained sensitive personal or business data. German data recovery firm O&O Software was able to recover 3.3 million files, including 40,000 Word documents,

EnCase Device Configuration Overlay Data Acquisition Weakness

Arne Vidström has reported a weakness in EnCase, which can be exploited to hide information on a disk. The weakness is caused due to missing support of Device Configuration Overlays (DCO) and therefore causes the program to not acquire parts

New Paper: The Forensic Chain of Evidence Model

A paper by Atif Ahmad entitled “The Forensic Chain of Evidence Model – Improving the Process of Evidence Collection in Incident Handling Procedures” is now available online. The paper can be read here. A full list of papers and articles

Online crime – new tools, old tricks

This week virus writers took a further step into the underworld when they released a Trojan horse program that holds computer data hostage unless you pay $200. The program infects computers through a weakness in Internet Explorer. It finds files

Montana agencies left private information on discarded computers

State agencies failed to remove private information before retiring outdated state computers, risking public disclosure of Social Security and credit card numbers, medical records and income taxes, a new report discloses. The legislative audit, obtained Tuesday, blamed unclear state policy