Halfway Through The S21 Transcriber Spotlight Session

Hero Image

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Safeguarding ICAC Investigators: Detego Global’s Commitment To Mental Well-Being

Protecting children online shouldn't come at the cost of investigators' mental health—see how Detego Global is changing the game....read more

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 Wants Your Help To Rename LASERi-X

Semantics 21 is renaming their groundbreaking CSAM forensics tool—and your idea could win your team a free year of access....read more

Digital Forensics Jobs Round-Up, August 04 2025

Digital Forensics Jobs Round-Up, August 04 2025

Explore a selection of the latest DFIR employment opportunities in this week’s Forensic Focus jobs round-up....read more

CFP: DFRWS — Extended Deadline

From Brian Carrier: The paper submission deadline for DFRWS 2005 has been extended untilFriday June 3, 2005. For those who have already submitted papers, you canstill edit your submission on the server. For those who requested anextension or are behind

An Inside Look at a Disk Recovery Service

In many failure-related cases, the chances of recovering data from a hard disk range from good to very good. If the electronic system is the only thing affected, then the drive can often be reused after the control panel has

Used hard drives betray company secrets

A study of 200 hard drives bought on eBay this year reveals that over 70 per cent contained sensitive personal or business data. German data recovery firm O&O Software was able to recover 3.3 million files, including 40,000 Word documents,

EnCase Device Configuration Overlay Data Acquisition Weakness

Arne Vidström has reported a weakness in EnCase, which can be exploited to hide information on a disk. The weakness is caused due to missing support of Device Configuration Overlays (DCO) and therefore causes the program to not acquire parts

New Paper: The Forensic Chain of Evidence Model

A paper by Atif Ahmad entitled “The Forensic Chain of Evidence Model – Improving the Process of Evidence Collection in Incident Handling Procedures” is now available online. The paper can be read here. A full list of papers and articles

Online crime – new tools, old tricks

This week virus writers took a further step into the underworld when they released a Trojan horse program that holds computer data hostage unless you pay $200. The program infects computers through a weakness in Internet Explorer. It finds files

Montana agencies left private information on discarded computers

State agencies failed to remove private information before retiring outdated state computers, risking public disclosure of Social Security and credit card numbers, medical records and income taxes, a new report discloses. The legislative audit, obtained Tuesday, blamed unclear state policy

e-Cops playing catch-up in Oz

Australia’s electronic crime investigators are at risk of being outrun by new technology, one of the country’s senior computer forensic technicians has revealed. Australian Federal Police (AFP) Electronic Evidence Forensic and Technical co-ordinator Paul Reedy said police investigators would have

eBay cybercrime chief tells UK to wise-up

Howard Schmidt, the former cybersecurity adviser to the White House, has warned that there aren’t enough trained police officers in the world to tackle cybercrime effectively. Schmidt, now the chief security strategist at auction site eBay, told delegates at the

An elite force takes on the dark side of computing

In an unmarked building in downtown Washington, Brian K. Nagel and 15 other Secret Service agents manned a high-tech command center, poised for the largest-ever roundup of a cybercrime gang. A huge map of the U.S., spread across 12 digital

New Article: The Mobile Forensic Platform

A couple of years ago, the IJDE published an article by Frank Adelstein entitled “MFP: The Mobile Forensic Platform”. With the kind permission of both Frank and the IJDE I’m delighted to reproduce the article at Forensic Focus and it

Techno Forensics 2005, Gaithersburg, Maryland

November 28-30, 2005, NIST Headquarters, Gaithersburg, Maryland www.Forensics2005.com The Inaugural Techno Forensics conference will be sponsored by the Institute of Computer Forensics Professionals (ICFP) and Hosted by NIST. The conference is founded on the principles of standardization in the field

Deloitte & Touche LLP Unveils New Electronic Evidence and Analytic Service

The Forensic & Dispute Services practice of Deloitte & Touche LLP has launched AFTnet Services, an advanced technology and analytic solution for large and complex litigation matters and forensic investigations. AFTnet Services provides client counsel and their economic and forensic