Semantics 21 CEO, Dr Liam Owens, Receives Prestigious Outstanding Contribution To Online Child Protection Award At IPPPRI 2025

Hero Image

Semantics 21 CEO Dr Liam Owens receives the prestigious Outstanding Contribution to Online Child Protection award at IPPPRI 2025....

Atola Adds iSCSI Support And Enhanced RAID Features To Its TaskForce Imagers

Atola Adds iSCSI Support And Enhanced RAID Features To Its TaskForce Imagers

Atola’s latest TaskForce update adds iSCSI support, making it possible to image remote drives that can’t be physically removed—alongside major improvements to RAID handling, imaging speed, and a new built-in Hex viewer....read more

Major Step Forward For Public Safety As Forensics Europe Expo Co-Locates With The Blue Light Show

Major Step Forward For Public Safety As Forensics Europe Expo Co-Locates With The Blue Light Show

Forensics Europe Expo and The Blue Light Show join forces in June 2025 to create the UK’s ultimate emergency services event—don’t miss this game-changing collaboration at Olympia London!...read more

Forensic Focus Digest, May 16 2025

Forensic Focus Digest, May 16 2025

Discover what’s new on Forensic Focus – explore harmful DFIR narratives around burnout, hear career insights from Jessica Hyde, unpack key takeaways from Cellebrite’s 2025 industry survey, and more....read more

Washington/Seattle University program trains cybercrime fighters

The UW, Highline Community College (HCC) and Seattle University are teaming up to offer a joint computer forensics program, aided by a $270,000 grant from the National Science Foundation. After completing the 12 to 18 month program, students will earn

Feds invite comment on Internet wiretaps

The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies. More (Security Focus)

Seminar on criminal investigations in Goa, October 9th

A two-day seminar on ‘Crime investigation – modern techniques’ will be inaugurated at the Goa International Centre, on October 9. The inaugural session of the seminar will have a plenary lecture on ‘Computer crimes and cyber forensics’ delivered by the

Forensics gains credibility at Purdue

Chris Marsico, a graduate student, is using this semester to focus on the forensic possibilities of devices like iPODs. Just this summer, a group of car thieves in the UK was arrested, due in part to evidence discovered on an

Digital Investigation – Issue 3

From Matthew Smaldon at Elsevier: “I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this

Forensic Focus call for papers

The Forensic Focus “papers and articles” section http://www.forensicfocus.com/computer-forensics-papers.php is now online and we’re actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at admin@forensicfocus.com, thank you. Jamie–

Mobile threat to company data exposed by security experts

Companies must be more vigilant about employees using mobile devices – such as iPod music players and personal digital assistants (PDAs) – at work, security experts warned today. A computer forensics study into the latest Mini iPod, conducted by corporate

Peterson Testimony Turns to Computer Data

Testimony in Scott Peterson’s murder trial returned to what investigators found in his computers as prosecutors try to prove Peterson researched the San Francisco Bay before dumping his pregnant wife’s body there… More (Sun Herald)

New download: A National Research and Development Agenda (ISTS)

Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this

E-crime and computer evidence conference (ECCE) 2005

ECCE 2005 will consider aspects of digital evidence in all types of criminal activity, including timelines, methods of evidence deposition, use of computers for court presentation, system vulnerabilities, crime prevention etc. ECCE 2005 is an international conference and will be

NSRL and Recent Cryptographic News

The NSRL staff have received questions about the announcement of a SHA-0 collision at the CRYPTO 2004 conference, as well as other collisions. NIST staff from the Computer Security Division were in attendance, and the statements here are meant to

Arcadia PD has own computer forensics specialist

Detective Scott Elenberger started the Arcadia Police Department’s computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he’s retrieving digital evidence that’s

Paper: Steganography for the Computer Forensics Examiner

“An Overview of Steganography for the Computer Forensics Examiner” by Gary C. Kessler Abstract Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party.

Ashcroft wins Internet wiretap system

U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies. At issue is the 1994