Search
Explore content from JFS, ASB, the AAFS Newsfeed, and other content using the search bar or filters.
Accepting Nominations for the Carrie Morgan Whitcomb Outstanding Service Award
Preparing for AAFS 2024
Scholarship and Grant Opportunities – Abstracts Now Being Accepted
DMS Section News—Welcome to AAFS 2024
OSAC-Proposed Standard Survey Request
DMS Moderators Needed!
Membership & Promotion Deadline Approaching!
Closing Time! Submit Your Nominations for the Carrie Morgan Whitcomb Outstanding Service...
Not Tik Tok ... Tick Tock! The Clock is Running!
AAFS DMS Call for Abstracts and Workshop Proposals
Study on the standard components of digital forensics laboratory
Recently, digital forensics has become increasingly important as it is used by investigation agencies, corporate, and private sector. To supplement the limitations of evidence capacity and be recognized in court, it is essential to establish an environment that ensures the integr...
Evaluating digital video transcoding for forensic derivative results
Video data received for analysis often come in a variety of file formats and compression schemes. These data are often transcoded to a consistent file format for forensic examination and/or ingesting into a video analytic system. The file format often requested is an MP4 file for...
Accepting Nominations for the Carrie Morgan Whitcomb Outstanding Service Award
A reference database of Windows artifacts for file‐wiping tool execution analysis
Anti‐forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file‐wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging...
Effects of language mismatch in automatic forensic voice comparison using deep learning...
In forensic voice comparison, deep learning has become widely popular recently. It is mainly used to learn speaker representations, called embeddings or embedding vectors. Speaker embeddings are often trained using corpora mostly containing widely spoken languages. Thus, language...
Exploiting the post‐attendee URL feature in Zoom webinar to distribute malware
The post‐attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set...
Academy Aperçus—December 2022
Forensic authentication method for audio recordings generated by Voice Recorder...
The number of smartwatch users has been rapidly increasing in recent years. A smartwatch is a wearable device that collects various types of data using sensors and provides basic functions, such as healthcare‐related measurements and audio recording. In this study, we proposed th...
Multimedia stream hashing: A forensic method for content verification
Forensic examination of digital audio, video, and images frequently requires transforming multimedia data from one format to another. The transformative activity may cause changes to the administrative elements of the file but leave the multimedia streams unchanged and intact. Ho...
Technical reporting in digital forensics
One of the primary roles of a practitioner in the field of digital forensics (DF) is to conduct the examination of any lawfully seized digital device content and report upon any findings that may support an inquiry being conducted. While there are many intricacies to this task, i...