Following three years of research, an international team of researchers have compiled the first ever “World Cybercrime Index,” which identifies the globe’s key cybercrime hotspots by ranking the most significant sources of cybercrime at a national level.
read more
No longer a question of if but when an attack is going to happen, there is a pertinent need for education in identification, resolution and bolstering defences against future attacks.
read more
Looking ahead, technology will continue to reshape and modernize law enforcement strategies to prevent ongoing threats, fight crime and ultimately deliver justice.
read more
These examples underscore the need for collaboration across an investigation’s life cycle, so investigators and prosecutors have a full understanding of the evidence’s value to a case.
read more
As digital analysis becomes increasingly important in criminal investigations, the study will evaluate how traditional methods of communication, including organizational cultures and even language, may be outdated for conducting digital forensic work.
read more
Two separate research projects have each been awarded half a million dollars in defense funding to advance memory forensics, which is a frontier field in digital investigations to recover elusive evidence of criminal activity.
read more
When every binary digit of evidence holds the potential to shape justice, there exists a hidden digital treasure chest capable of unravelling the most intricate of mysteries—it’s called the full file system (FFS).
read more
Researchers spent months digging into the ways that Russians are working to sway public perception about Ukraine through narrative laundering methods, including planting fake news stories on foreign news websites, creating fake social media accounts and even creating entire fake news websites using artificial intelligence.
read more
Because of their critical role and long life, Industrial Control Systems are increasingly frequent targets for cyberattacks ranging from industrial espionage to attacks for financial gain, such as ransomware, as well as sabotage and terrorism.
read more
The photo-realistic digital images were generated in hopes of increasing the chances that someone will come forward to assist in identification.
read more
One of the most popular Dark Web markets is the Invisible Internet Project (I2P), a fully encrypted private network layer that leverages unidirectional tunnels to allow users to connect without tracking and collecting their location or data.
read more
In a first for the Bureau of Criminal Investigation, which created a clay model of the John Doe, a series of photo-realistic digital images also were generated in hopes of increasing the chances that someone will come forward to assist in identification.
read more
The Digital Forensic Investigation Unit is breaking new ground in the field of digital forensics relating to child sexual exploitation and child sexual abuse images.
read more
Leicestershire Police will measure the “physical and mental toll of the job” on its forensic teams in a groundbreaking study using data analytics from the world of Formula One.
read more
Forensic researchers conducted many experiments to test the reliability of building level registration by iPhones via the location tracker and step counter.
read more