Detective Scott Elenberger started the Arcadia Police Department’s computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he’s retrieving digital evidence that’s … Read more
We caught up with Magnet Forensics' Jad Saliba about digital forensics, social justice, and his resolutions for 2021.
Michael Lappin talks through some of FTK's features including REGEX, volatile data and reducing case sizes.
Keith Lockhart talks us through a Huawei device extraction with a Kirin chipset using Oxygen Forensic Detective.
Forensic Focus talks to Mike Dickinson about how things have changed in digital forensics over the last two decades, and what he thinks the future might hold.
VeraCrypt and the former TrueCrypt are two of the most challenging types of encryption to bypass.
Latest Forum Posts
Yes, the computer forensic experts can do this work. We...
By danjames, 10 hours ago
“An Overview of Steganography for the Computer Forensics Examiner” by Gary C. Kessler
Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. … Read more
U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.
At issue is the 1994 … Read more
PivX Solutions, Inc. has announced a partner agreement to expand the company’s nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.Under the agreement, PivX will be the exclusive provider of computer forensic expert witness and … Read more
Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can’t make the date all presentations will be archived … Read more
Montrose County District Court Judge Dennis Friedrich denied a motion Wednesday from defense attorneys to dismiss 19 misdemeanor child exploitation counts against Park Avenue Dance Works co-operator John Ward.
At Wednesday’s hearing, David Penrod, a forensic examiner for Computer Forensic … Read more
U.S. Attorney General John Ashcroft today will announce the arrests of dozens of people nationwide charged with flooding e-mail inboxes with spam and perpetrating computer fraud and other cyber crimes.
Many of the cases have their origin in Pittsburgh, where … Read more
Purdue University is teaming with law enforcement officers to improve investigation of the new generation of crimes, including computer-aided terrorism, espionage, bank and business fraud, and identity theft.
A collaboration with 20 law enforcement officers from throughout Indiana is part … Read more
The Justice Departmentâ€™s National Institute of Justice has published the second in a series of guidelines for IT crime investigations.
â€œForensic Examination of Digital Evidence: A Guide for Law Enforcementâ€ was created at the agencyâ€™s request by the National Institute … Read more
The South Carolina Computer Crime Center, which opened in December 2002, handles the forensic examination of evidence collected during the investigation of computer crimes in South Carolina. Soon after it opened, the facility was faced with a rapidly growing volume … Read more