Forensic Focus Digest, June 13 2025

Hero Image

Discover what's new on Forensic Focus – explore advanced H265 video analysis with Amped FIVE, dive into the latest Oxygen Analytic Center updates, uncover Magnet Forensics' innovative cloud-powered processing, and more....

How To Analyze H265 Video Compression With The Coding Tree Units Filter In Amped FIVE

How To Analyze H265 Video Compression With The Coding Tree Units Filter In Amped FIVE

Struggling with H265 video in investigations? Learn how CTUs in Amped FIVE reveal image reliability and hidden compression artifacts....read more

Introducing Oxygen Analytic Center v.1.5

Introducing Oxygen Analytic Center v.1.5

Oxygen Analytic Center v.1.5 is here, featuring new Device Dashboards, 2FA security, and improved UX—streamlining your digital investigations....read more

Digital Forensics Round-Up, June 11 2025

Digital Forensics Round-Up, June 11 2025

Read the latest DFIR news – Project Odyssey protects victim privacy, Amped Authenticate detects AI images, Apple updates introduce forensic artifacts, and more....read more

FBI Computer Forensics Laboratory in “TOP 50” awards

The FBI’s Regional Computer Forensics Laboratory (RCFL) initiative has been chosen as one of the “Top 50” programs in the 2005 Innovations in American Government Awards competition. The RCFL Program is a national network of one-stop, full-service digital evidence laboratories.

UK police foil massive “online” bank theft

Police in London say they have foiled one of the biggest attempted bank thefts in Britain. The plan was to steal £220m ($423m) from the London offices of the Japanese bank Sumitomo Mitsui. Computer experts are believed to have tried

Web to have ‘terror watch’ team

Five European governments are setting up a hi-tech team to monitor how terrorists and criminals use the net. The group will make recommendations on shutting down websites that break terrorism laws. The plans for the initiative came out of a

Live each day like you’re going to be hacked

Forensics was a word repeated throughout this week’s SecureWorld conference. Experts mentioned the media firestorm that has enveloped ChoicePoint and other companies where hackers were able to steal mountains of consumer data that could eventually be used for identity theft

A Method for Forensic Previews

During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless,

UK Government and industry back IT security professionalism plans

Proposals to create a professional institution that would set minimum standards of professionalism for IT security specialists have won backing from the government and leading businesses. The form the institute will take has yet to be decided. One of the

Video Forensics: Catching the Crooks on Camera

Watching movies and your favorite episode of CSI (Crime Scene Investigation), you would think that recorded video is always crystal clear, easily showing a suspect’s face or his license plate, but this is far from reality. In fact, the recorded

Computer sleuths bring crime to light

When Coreen Kulvich and Meredith Tanner explore hard drives and Zip disks, they’re hunting more than just bytes of data. They’re looking for convictions. Kulvich, 29, and Tanner, 28, make up the Dakota County Sheriff Department’s small but increasingly vital

Australian ISP raided for BitTorrent links

An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian

Cases confirm computer privacy is illusion

Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won’t do it for yourself, do it for your lawyer – the one

Windows Security Log Encyclopedia (Press Release)

IT managers and their staffs now have the Windows Security Log Encyclopedia, a new Windows tool for monitoring, intrusion detection and for carrying out computer forensics. The new tool covers all nine audit categories of Windows Server 2003 and illuminates

Deleted computer files never truly gone

“Whenever you delete a file, you’re really not deleting the file,” said Georges Stokes, system administrator for Air Armament Center plans and programs office. “The data is still technically there.” The information that people attempt to delete from their computers

Indian certificate course on cyber crime

The Indian Society of Criminology (ISC) in coordination with Valliant CISSTech is to offer certificate courses on Cyber Forensics and Penetration Testing. Announcing this at a press meet in Chennai yesterday, R Thilagaraj, secretary, ISC and head of the department

Tracking PCs anywhere on the Net

A University of California researcher, Tadayoshi Kohno, says he has found a way to identify computer hardware remotely, a technique that could potentially unmask anonymous Web surfers by bypassing some common security techniques. In his paper Kohno mentioned possible forensics

Testifying in a Computer Crimes Case

As an IT professional and working network administrator, you may find yourself called upon to testify as a victim or witness (i.e., a representative of a company whose network is victimized) in a computer-related crime. Another possibility is that you