The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Web Browser Forensics, Part 1

Electronic evidence has often shaped the outcome of high-profile civil law suits and criminal investigations ranging from theft of intellectual property and insider trading that violates SEC regulations to proving employee misconduct resulting in termination of employment under unfavorable circumstances.

Hi-tech crime costs UK plc £2.4bn

According to a survey for the National Hi-Tech Crime Unit (NHTCU), almost nine out of 10 firms suffered some kind of IT-based crime last year. A major risk was action taken by disgruntled employees, often working with crooks on the

Step-by-Step Incident Response

When a critical enterprise server is breached, a well thought-out incident response plan will help you contain damage, speed up service restoration, and collect forensic information. If you have reason to believe that a system has been compromised, either by

Another Look at Log Files

Marcus Ranum architected the first commercial firewall in 1990. He founded Network Flight Recorder Security, the company responsible for the first network forensics tool. And last summer at the Usenix conference, during a course he was teaching on log file

RCFL network plans expansion in 2005

WASHINGTON, D.C.- The FBI is poised to expand the country’s premier computer forensics laboratory network starting in May, according to Assistant Director Kerry E. Haynes, Operational Technology Division. Additional Regional Computer Forensic Laboratories (RCFLs) are scheduled to open in Portland,

UK centre to tackle net paedophiles planned

A unit to protect children in the UK from internet paedophiles is being set up by the Home Office. About 100 staff, including police and child welfare experts will join the Centre for Child Protection on the Internet next April.

Court helps Ryanair trace staff pilots who criticised on-line

An Irish judge has awarded Ryanair an injunction to prevent the destruction of web site user data in a court battle over the identities of its pilots who criticised the airline’s working practices in an on-line forum for Ryanair pilots,

Microsoft fighting cybercrime

Microsoft is developing analytical tools to help international law enforcement agencies track and fight cybercrime. Microsoft unveiled the tools development program at the kickoff on Wednesday of three days of technical training for Australian law enforcement agencies. The Forensic Computing

Aussie Feds target computer forensics

Australia’s hi-tech crime squad has vowed to change the perception of the internet as an anonymous haven to one where users are not as nameless as they might think. At a three-day computer forensics workshop in Canberra Federal Police Australian

Net fingerprints combat attacks

Eighty large net service firms have switched on software to spot and stop net attacks automatically. The system creates digital fingerprints of ongoing incidents that are sent to every network affected. Firms involved in the smart sensing system believe it

Jeff Weise’s e-mail trail led authorities to Jourdain

It’s hard to cover your tracks on your computer. Deleted files aren’t immediately deleted. And software programs on most PCs keep all sorts of data trails, recording the Web sites you visit, the pictures you look at, the e-mails you

Online CP investigation costs UK police £15m

The cost of forensically examining the computers seized during the UK police’s Operation Ore investigation into online CP will total £15m, according to the National Crime Squad (NCS). Operation Ore was launched after the FBI smashed an illegal CP ring

Expert rejects Lundy evidence

A computer forensics expert who has spent up to 400 hours examining evidence in the Mark Lundy murder case says he has ruled out police claims that Lundy manipulated a computer clock to give himself an alibi. The Crown at

Can computers survive cross-examination?

Between my fingers typing these words and the Word application which records them there is a huge range of different programs, not all of which I know intimately. If even a simple document such as this is potentially affected by

UK MP to raise bill to boost computer crime laws

Derek Wyatt, chairman of the All Party Internet Group, is to raise a 10 minute rule bill in the Commons next month calling for the Computer Misuse Act to be strengthened. The move follows a campaign by Computer Weekly, businesses