University of New Haven Cyber Forensics decided to unbox some expensive digital forensics equipment and record it with Google Glass and a Geo Pro. Everyone has watched unboxing videos - but we have never seen someone unbox digital forensics equipment! Enjoy the write-blockers, forensic duplicators/wipers and the beast F.R.E.D.
Gary Kessler explores the acceptability of digital evidence in court as regards the Federal Rules of Evidence.
A look at the Department of Defense Cyber Crime Center's Digital Forensics Academic Excellence Program.
Dr. Hany Farid, a distinguished professor at Dartmouth College and the "father" of digital image forensics, is an expert on authenticating images.
A technical introduction to digital forensics geared towards fellow geeks who think tinkering with data in hex is fun and interesting.
This is a post-exploitation demonstration with a walk-through of exploiting a Windows machine, getting a copy of the Web server's home page, and then modifying it with an iframe that points to an exploit server.
Here's how to locate the MFT and MFT Mirror from the Volume Boot, using EnCase.
As we start the month of October, we grow closer to the November 2nd, 2010 Challenge submission deadline. The 2010 DC3 Challenge already has over 30 teams with partial and full submissions. With over 11 prizes available this year, make sure to get your submissions in.
Operation Swordphish partners the University of Alabama at Birmingham cybercrime laboratory with the Alabama Department of Public Safety and Alabama District Attorneys Association with the goal of prosecuting state and local cybercrimes.
Armen Keteyian reports on the vast amount of data on photocopier hard drives which store images of every document scanned, copied, or emailed by the machine.
In this NIST Colloquium Series presentation, Dr. Hany Farid discusses the impact that camera manipulation and alteration have caused, focusing on digital tampering and manipulation, techniques for authenticating digital media, and mathematical and computational forensic techniques.
Computer Forensics Expert Steve Burgess explains what's left over when a file is deleted, and what happens when it is created.
Computer Forensics Expert Steve Burgess explains what can and cannot be recovered from different kinds of e-mail programs such as Outlook, Eudora, and Webmail.
A video guide on how to trace the geographic origin of a Hotmail e-mail.
Child pornographers will soon have a harder time escaping prosecution thanks to a new technology that can reliably link digital images to the camera with which they were taken, in much the same way that tell-tale scratches are used by forensic examiners to link bullets to the gun that fired them.
Ed Stroz, Co-President, Stroz Friedberg, speaks on the manipulation of digital evidence and its effect on investigations, especially when presenting evidence in legal proceedings.