Understanding NCMEC CyberTipline Reports
Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing...

What is a server?
In criminal cases, it’s common for law enforcement to seize mobile devices and computers that might have electronically stored...

Not guilty
A few weeks ago, a defense attorney reached out to me for help with an upcoming felony bench trial. He had several questions surrounding...

Magnet Certified Forensics Examiner
This past weekend, I earned the "Magnet Certified Forensics Examiner - AXIOM" certification. I got a a 94.4%! I took the associated...
Guidance Software Forensic Bug Bounty
A couple of months ago, Guidance Software announced a short-term research program through Bugcrowd. Bugcrowd runs "bug bounty" programs...
Can't our IT person take a look?
A number of organizations still rely on their IT staff to examine computers for misuse but don't provide their staff with any specialized...
Updates - 9/13/2017
I mentioned last month that I was trying out a couple of expert witness directories. My first listing was posted on HG Experts. Now, I...

Stop Using MD5
Cryptographers (the people who make and break codes) have told us not to use the MD5 algorithm for twenty years. Why are we still using...

HG Experts Article: Deleted Files
I have a new article up on HG Experts: Attorneys who need to read and understand reports by computer forensics professionals and/or who...

What happens when you delete a file?
I try not to get too deep into the weeds. This video covers the basics that an attorney, investigator or HR director would need to know....