A round-up of this week’s digital forensics news and views:
T3K Promotes AI Tool For CSAM Media Descriptions
T3K introduces MEDETO, an AI-driven forensic tool designed to dramatically reduce the time investigators spend reviewing CSAM images and videos by automatically generating clear, consistent media descriptions. Positioned as a major step forward for digital forensics and law enforcement, MEDETO aims to save practitioners hundreds to thousands of hours while supporting more efficient and scalable investigations.
Covert Cyber Investigator Well-Being With Carol Brooks
Cyber and organizational psychologist Carol Brooks discusses her PhD on covert cyber investigators and how psychological stressors can shape res…
A round-up of this week’s digital forensics news and views:
T3K Promotes AI Tool For CSAM Media Descriptions
T3K introduces MEDETO, an AI-driven forensic tool designed to dramatically reduce the time investigators spend reviewing CSAM images and videos by automatically generating clear, consistent media descriptions. Positioned as a major step forward for digital forensics and law enforcement, MEDETO aims to save practitioners hundreds to thousands of hours while supporting more efficient and scalable investigations.
Covert Cyber Investigator Well-Being With Carol Brooks
Cyber and organizational psychologist Carol Brooks discusses her PhD on covert cyber investigators and how psychological stressors can shape resilience and decision-making. Carol says inconsistent job titles and built-in suspicion make recruiting participants hard, even beyond law enforcement. She urges investigators to complete an anonymous, ethics-approved survey to improve support.
Diffusion-Driven Patches Target Facial Verification, With SSIM 0.95 Detection
Researchers show that facial identity verification systems can be evaded with up to 95% success using diffusion-generated adversarial patches. Published by Quantum Zeitgeist, the study demonstrates how subtle visual modifications can fool biometric systems while remaining hard to detect. The authors also present forensic techniques to identify and mitigate these attacks, highlighting urgent risks and defenses for biometric security.
Read more (quantumzeitgeist.com)
DFRWS USA 2026 Announces Dates And Extended Abstract Deadline
DFRWS USA 2026 runs July 27–30 in Arlington, Virginia, with a hybrid option. Full paper abstracts are due by Friday, February 6. Organizers highlight peer-reviewed research, keynotes, workshops, demos, and community events, with strong student participation and mentorship.
Disassemble That Video With Frame-Counts-Galore
Frame-counts-galore, a FOSS Python tool from Alexis Brignoni, breaks videos into frames and records per-frame timing and hashes. Using ffmpeg, it outputs a CSV plus provenance and processing logs to support review and chain-of-custody. A demo shows how frame timestamps help confirm fixed versus variable frame rates and scope content.
Read more (matthewplascencia.substack.com)
Reverse Engineering iOS WebKit Plugin That Alters YouTube Links in Messages
A new reverse engineering write-up claims iOS Messages uses an undocumented WebKit plug-in to rewrite YouTube requests. It reportedly sets a hard-coded Referer pointing to an internal Apple URL, changing the stream and reducing ads. Findings may interest mobile analysts tracking link handling and network artifacts.
Digital Forensic Triage Promises Faster CSAM Investigations
Rising CSAM volumes are pushing agencies toward triage-first workflows that surface key evidence in hours. NCMEC and INHOPE data point to millions of reports and rapid URL growth. Field examples using ADF tools describe ruling out non-relevant devices, limiting investigator exposure, and routing priority items to full lab analysis.
Gautam Buddh Nagar Builds High-Tech Cyber Crime Station Amid Online Fraud Surge
Gautam Buddh Nagar police are building a dedicated cyber police station in Sector-20 to handle rising online fraud. Planned as a 3,500-square-meter facility costing ₹3.30 crore, it will centralize investigations and add a high-tech forensic lab. Meanwhile, staff have trained via the CyTrain portal to improve digital evidence handling.