The Balance Between Digital Forensic Examiners And Digital Evidence Technicians: Expertise Vs. Efficiency

Hero Image

Can digital forensic labs cut backlogs without cutting corners? Debbie Garner explores how tiered workflows using both examiners and technicians can strike the right balance....

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

More Than Software: Amped Training Teaches You The Science Of Forensic Video And Image Analysis

Push past button-clicking—Amped Software training teaches the science behind forensic video analysis....read more

Digital Forensics Round-Up, August 06 2025

Digital Forensics Round-Up, August 06 2025

Read the latest DFIR news – starting a digital forensic business, Hashcat v7.0.0, GenAI incident response guidance, cross-border investigation challenges, and more....read more

Halfway Through The S21 Transcriber Spotlight Session

Halfway Through The S21 Transcriber Spotlight Session

We are halfway through the S21 Transcriber Spotlight — catch up on the latest demos and see how investigators are using the tool in real casework....read more

Feds square off with organized cyber crime

At the RSA Conference on Thursday Ronald Plesco, counsel to the National Cyber-Forensics and Training Alliance, a computer forensics organization established by the FBI and private industry, pointed to the trend in recent years of spammers building networks of compromised

Investigators uncover dismal data disposal

An investigation into the disposal of computer equipment has uncovered psychological reports on school-children, confidential company data and even details of an illicit affair on hard drives that should have been wiped clean. Universities, schools and global businesses are routinely

USA’s Sixth Cyber Lab Opened in Silicon Valley

The FBI calls them Regional Computer Forensics Laboratories, or RCFLs. Their specialty? The cyber equivalent of dusting for fingerprints: finding evidence of criminal and terrorist activity on PCs, laptops, cell phones, digital cameras, MP3 players, PDAs, DVD recorders, and other

Book review of Windows Forensics and Incident Recovery

Harlan Carvey is a Windows security instructor who created his own 2-day, hands-on course in Windows incident response and forensic investigations. This book shares some of Carvey’s extensive knowledge and expertise in recognizing and responding to attacks on Windows systems

ProDiscover 4.0 Adds Perl Scripting and Expanded Volatile Data Capability

Technology Pathways, LLC has announced ProDiscover Incident Response 4.0, with support for Perl scripting and expanded capabilities for volatile data capture and analysis. With support for Perl version 5, information security and cyber-crime investigators can develop scripts to search and

Taking a bite out of cybercrime

The call sounded like an advertisement for a credit card security plan. Someone in London had purchased a piece of Americana, a toy tractor from Ohio, with the credit card number of an Old Colony Road resident. Capital One credit

Piracy case: log files ‘don’t show downloads’

An expert witness in the MP3s4free.net music piracy case has conceded to the Federal Court in Sydney that log files seized in a 2003 raid did not show music actually being downloaded. During cross-examination and after long arguments about the

Teachers cleared in school probe

Forensic computing techniques proved decisive in proving staff at a Buckinghamshire primary school had not been surfing for porn at work. The head of the school called in Disklabs, a computer forensics and data firm, last year when he discovered

Phishing suspect arrested in the UK

UK Police have arrested a 21-year-old man they suspect of running a phishing scam that targeted customers of online bank Smile. The unnamed man has been released on bail while a specialist data forensics team examines computer equipment that was

The secret war against hackers

Gavin Hyde-Blake, the manager of IT forensics at Carratu International, the corporate investigation company, offers a crumb of comfort to besieged corporates. “Most hackers are lazy,” he says. “Make their life difficult and most will walk away.” More (Telegraph)

Seize the data

You can dust for fingerprints after a robbery, but you wouldn’t dust a hard drive after a cybercrime. That’s where computer forensics comes in. It helps law enforcement agents copy and analyze information stored on hard drives and devices such

Real-life CSI vastly different than what’s on TV

Crime scene investigators for the Warner Robins Police Department (US) have a lot of the crime-fighting gadgets that actors do on the popular CSI television shows. And there are other similarities between what real-life CSI investigators do and what’s portrayed

Computer based crime linked to international crime syndicates

Andrew Clark, director and co-founder of Inforenz, spends much of his time as an expert forensics witness for the UK government, banks, and MNCs. He notes that there are signs that computer-based crimes are becoming the province of international organised

Digital evidence: Today’s fingerprints

Police and prosecutors are fashioning a new weapon in their arsenal against criminals: digital evidence. The sight of hard drives, Internet files and e-mails as courtroom evidence is increasingly common. “Digital evidence is becoming a feature of most criminal cases,”

DOD seized 60TB in search for Iraq battle plan leak

The U.S. Department of Defense (DOD) seized hundreds of computers and around 60T bytes of data as part of an investigation into how details of the U.S. invasion plan for Operation Iraqi Freedom were leaked to The New York Times,