The need for advanced technology to swiftly identify terrorism suspects is paramount. S21 LASERi-X, an innovative tool from Semantics 21, has emerged as critical for investigators. This case study del... ...more
Case Studies
June 24, 2024•2 min read
See how a large global consulting firm streamlined their evidence management and storage tracking by switching from Excel spreadsheets to Monolith’s case management platform. ...more
Case Studies
September 14, 2022•0 min read
Justin Tolman and Lynne Roossien invited John Price of the West Midlands Police to join them on an episode of FTK Over the Air, Exterro’s podcast. Police Investigations move to the Cloud is the 12th e... ...more
Case Studies
August 17, 2022•1 min read
Child abuse, exploitation and trafficking are some of the most appalling crimes committed in our society. Unfortunately, the problem is far more significant than most of us realize. In the fiscal year... ...more
Case Studies
February 15, 2022•5 min read
Dr. Liam Owens, Founder and CEO of Stafford-England-based Semantics 21, explores how artificial intelligence is changing the face of law enforcement. ...more
How To Article
June 26, 2024•4 min read
As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an ... ...more
How To Article
December 21, 2023•2 min read
This is the common reaction; a device needs extracting, and you find it in a BFU state. According to other vendors, your options are now limited. Even if you do get an extraction, it will only acquire... ...more
How To Article
December 18, 2023•3 min read
Access to MediaTek’s Boot ROM interface is the best way to extract the maximum amount of data from any device with a MediaTek chipset. The Boot ROM is always there, and it will not change. Because of ... ...more
How To Article
October 30, 2023•3 min read
When crime scene or accident investigators examine a location, they take all the necessary measures to accurately collect, record and document the environment and characteristics, so as to have the be... ...more
How To Article
April 04, 2023•6 min read
Cyber moves fast, so staying on top of everything can be difficult to impossible at times. So, to effectively future-proof your cyber career, you can do some or all of the following things. Doing so w... ...more
How To Article
March 23, 2023•5 min read
I often come across this topic among those interested in digital forensics and incident response (DFIR). People seem to ask the same question – “Do I need to learn how to code?” – as if it’s a dreaded... ...more
How To Article
March 01, 2023•3 min read
Non-Volatile Memory (NVMe) storage, which Wikipedia defines as a type of computer memory that can retain stored information even after power is removed, was developed in 2009. In comparison, volatile ... ...more
How To Article
February 07, 2023•3 min read
Open-source intelligence doesn’t just refer to the accessibility of information. OSINT is the practice of collecting information from publicly available sources that is widely used by analysts in near... ...more
How To Article ,Hub Article
December 12, 2022•9 min read
As the world continues to adopt the use of cloud storage and make it a part of everyday use in personal and professional settings, you should be aware of the forensic artifacts and logs available for ... ...more
How To Article ,Hub Article
November 10, 2021•5 min read
Many forensic examiners and investigators are used to having resources at their place of employment to work cases. We believe the learning process never stops and no one can be an expert in everything... ...more
How To Article ,Hub Article
November 03, 2021•7 min read
It’s pretty much given that we live in a Windows-centric world. The majority of businesses and individual users out there use Windows machines to get work done. And because of that, it’s safe to say t... ...more
How To Article ,Hub Article
October 14, 2021•5 min read
There is a lot of trust put into your digital forensic tools when it comes to processing data. Many times, the “magic” of the tool remains someone unknown to the end-user. Each company claims to have ... ...more
How To Article ,Hub Article
October 12, 2021•4 min read
Signal is widely considered to be one of the most secure messaging services. Even Edward Snowden called Signal his favorite messenger app. ...more
How To Article ,Hub Article
September 14, 2021•7 min read