Stephen Branigan, one of the founders of the New York City task force on cybercrime and author of High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front, talks to Seth Fogie about hacker motivations and how to solve cyber crimes.… Read more
Hey everyone, Tarah Melton here, and today I’m going to show you a new artifact that you can enable in AXIOM 4.4 when processing a Windows evidence item, called NTFS Timestamp Mismatch.
In July, digital forensics professionals from the public, private, and academic sectors came together to hear about some of the latest research in the industry.
Hey everyone, Tarah Melton here, and today we’re going to walk through a workflow that you can use alongside a new artifact in AXIOM 4.4 that will help you present data output from Magnet’s free too, the Magnet Web Page Saver.
The COVID-19 pandemic slowed many of the gears in justice systems the world over, as courts postponed jury trials, experimented with virtual juries and hearings, and weighed prison conditions against public safety.
In this video, I’m going to show you how to download cloud tokens with XRY. This does require the XRY Cloud license to download them. You don’t get them without that license – as you can see here, I did obtain three cloud tokens, you can see the icons on the right for Facebook, Google and Instagram.
A computer forensics expert says a critical document presented to jurors was edited on one of the defendants’ work computers – contradicting the defendant’s testimony last week. That’s the latest in the fraud and conspiracy trial of four former Merrill … Read more
ECCE 2005 will consider aspects of digital evidence in all types of criminal activity, including timelines, methods of evidence deposition, use of computers for court presentation, system vulnerabilities, crime prevention etc.
The conference programme is now online and can be … Read more
A LEADING police scientist has claimed universities are promoting forensic science courses to meet demand from students inspired by TV crime series just to put â€œbums on seatsâ€. Jim Fraser swaps police fieldwork for teaching and research this week when … Read more
These days, the search for truth takes lawyers not into company file cabinets but into company computers. With 93 percent of business documents now “borne” electronically, the story of U.S. workplaces increasingly gets told on computer disks, spread sheets and … Read more
Researchers at Purdue University have developed image analysis techniques that may one day help tie counterfeit money and forged documents to the printers that produced them. In lab experiments, the researchers examined documents that came from 12 different models of … Read more
Federal agents found CP links on a computer that had been sitting in the Camden County Prosecutor’s Office for seven months after it was seized from a Bellmawr man. But there was little authorities could have done to search the … Read more
IT professionals looking to gain computer forensic certification are being offered an accelerated six-day course by the Training Camp. The IT training provider said its course is aimed at e-security experts, police, military personnel, legal professionals and government agencies. It … Read more
Australian Customs officials say the latest technologies are assisting them in detecting the importation of CP. A man will appear in court this morning after customs officers at Melbourne Airport seized computer disks from his luggage on his arrival from … Read more