The 40-hour courses are open to the public, and designed for new digital analysts or transitioning professionals, including former military.
read more
The Minnesota Department of Public Safety Bureau of Criminal Apprehension (BCA) has unlocked a cell phone that was used to capture video of a June 2021 incident in Minneapolis during which Winston Smith was fatally shot by law enforcement.
read more
Harding University is pioneering cybersecurity and criminal defense workforce development through a $1.5 million grant awarded from the state to the university’s digital forensics lab.
read more
The security of vehicles in the IoV age has been found to be vulnerable to cyberattacks that may cause regrettable events via interception or even alteration of vehicle-infrastructure communication.
read more
SQL databases are vital in digital forensics, storing everything from chat logs to deleted data. Learn the role of WAL files, the challenges of recovering deleted records and the best practices for ensuring data integrity.
read more
University of Amsterdam PhD candidate Aya Fukami has identified hardware vulnerabilities in phones to bypass the security of modern devices, allowing her to extract data from phones in a way that was previously not possible.
read more
It’s extremely difficult to work a murder case without the victim’s body, but—with dogged investigation, persistent witness interviews and some digital forensics magic—that’s exactly what the Douglas County (Colorado) Cold Case Team did, culminating in the arrest and indictment of two individuals last week.
read more
The technology enables law enforcement agencies to identify critical evidence, speed up investigations and safeguard victims.
read more
While the missing data could cause gaps in the evidence that obstructs your investigation, it may be possible to recover the messages with the right tools and techniques.
read more
In the field of digital forensics, time is not just a concept but a critical piece of evidence that, when decoded correctly, can reveal the hidden stories behind digital activities. They are essential in investigations to establish a chronology, validate data and build a narrative.
read more