Neal Ysart, Co-Founder, The Coalition Of Cyber Investigators

Hero Image

Neal Ysart shares how The Coalition of Cyber Investigators tackles OSINT integrity, complex investment fraud, and the rise of AI-driven scams....

Forensic Focus Digest, August 08 2025

Forensic Focus Digest, August 08 2025

Discover what’s new on Forensic Focus – explore the balance between expertise and efficiency in digital forensics, tackle the challenges of multi-jurisdictional investigations, and learn how transforming organisational culture can improve mental health in the field....read more

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....read more

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Crime time for Chinese net users

Around 20% of the world’s hijacked computers sending out spam, attacking websites and hosting unsavoury material are in China, says a report. The figures, from security firm Ciphertrust, come amid spiralling rates of internet use in China… More (BBC)

Police culture

If you ask Chris Budge, the police are no worse – and may even be a lot better – than any other organisation when it comes to looking at p**n at work. Budge should know. The computer forensic consultant runs

Criminal IT: The crime you can still get away with

In the field of computer crime, there is one glaring problem: the law. Until relatively recently, there was no law to criminalise what might be recognised as obvious ‘mischiefs’ performed against computers; there was no legal framework to make hacking,

Experts in distributed computing see potential for computer forensics

Golden Richard III, a professor of computer science at New Orleans University and a digital forensics expert, has been experimenting with using distributed computing to recover lost computer files. By harnessing the number-crunching power of several computers to work on

Cyberchase: Experts discuss benefits, risks

Like Hansel and Gretel [Brill explained] people leave crumbs as they wander cyberspace or work on their computer desktops. Following those crumbs, forensic scientists at Kroll have been able to trace Saddam Hussein’s stolen billions; understand the implosion of Enron;

Computer aces sleuth for FBI

Sept. 11 turned Sung-Ki Lim and Sang Jun from geeks to G-men. Well, they’re still geeks, but instead of pursuing an MBA or traveling far and wide as systems analysts, the two men are putting their technical skills to work

New Article: Job hunting advice for UK computer forensics professionals

A superb new article by David Sullivan entitled “Job hunting advice for UK computer forensics professionals” is now online at http://www.forensicfocus.com/computer-forensics-jobs-uk I am sure our UK members will find it a very worthwhile read! Jamie

Fraud propels demand for computer forensics training

In the ‘if you can’t beat ’em, join ’em stakes’, computer-based crime is driving more and more IT professionals to study the skills and tools needed to unravel and reveal the inner workings of cyber fraudsters. The general upsurge in

Browser History: What Happened?

Occasionally, you might need to trace a user’s Web-browsing path. Manual forensic analysis, which involves digging through cookie files, the browser’s cache, and browser history data, isn’t easy. For a good rundown on forensic analysis of browser activity, you should

New Article: Mining the Protected Storage Area

A new article by Andy Dodd entitled "Using areas of the Microsoft Windows registry to mine data for use in Forensic Computing" has been added to the computer forensics papers and articles section. We are always happy to consider new

Skeletons on your hard drive

There are a number of options for cleansing the drives of unwanted computers, from special wiping software to destruction services to manufacturers’ recycling programs. But what many PC owners don’t realize, experts say, is that these methods are often not

Task force cracks down in California

Computer crimes are like viruses – they infect many and quickly, mutating as technology grows ever more complex. In the Solano area, though, there’s an antidote – “NC3TF.” In layman’s terms, that’s the Northern California Computer Crimes Task Force, a

It’s no secret — they’re here to help (with computer forensics)

Local US law enforcement agencies that lack resources and technology to extract and analyze the data on seized computers and electronic devices now can turn to the U.S. Secret Service for help. Government technicians will analyze computers, cell phones and

Forensic Focus email list changes

The Forensic Focus email list has moved from the old Yahoo! Groups system to our own software. This should speed up the registration process and remove the commercial advertising which was previously present. To subscribe, please send a blank email