Follow Us

August 30, 2019

Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing and Exploited Children (NCMEC). Both prosecutors and defense attorneys should be familiar with these reports and the information th...

September 3, 2018

In criminal cases, it’s common for law enforcement to seize mobile devices and computers that might have electronically stored information that is relevant to the case at hand (with warrants, of course).  In cases involving businesses, that information is often stored...

March 26, 2018

A few weeks ago, a defense attorney reached out to me for help with an upcoming felony bench trial. He had several questions surrounding the anticipated testimony of the prosecution's expert witness and needed a consultant, not a testifying expert.  The prosecution's e...

November 15, 2017

This past weekend, I earned the "Magnet Certified Forensics Examiner - AXIOM" certification. I got a a 94.4%!  I took the associated course a month ago but various things kept popping up and I kept putting off the test. I'm relieved to have the test out of the way and...

October 13, 2017

A couple of months ago, Guidance Software announced a short-term research program through Bugcrowd.  Bugcrowd runs "bug bounty" programs for software companies through which security researchers can report security vulnerabilities and get paid for their work.  In this...

October 2, 2017

A number of organizations still rely on their IT staff to examine computers for misuse but don't provide their staff with any specialized tools and/or training.  This is a recipe for disaster.

Disclaimer: I'm not exactly a neutral party in this discussion because I have...

September 14, 2017

I mentioned last month that I was trying out a couple of expert witness directories.  My first listing was posted on HG Experts.  Now, I have a listing up at ALM Experts as well.  I will also have a listing in the 2018 Western Directory of Legal Expert Pages (in h...

September 7, 2017

Cryptographers (the people who make and break codes) have told us not to use the MD5 algorithm for twenty years.  Why are we still using it?

MD5 and SHA-1 are the two hash algorithms that are used to verify the authenticity of digital evidence.  Both algorithms have sec...

September 6, 2017

I have a new article up on HG Experts:

Attorneys who need to read and understand reports by computer forensics professionals and/or who need to present recovered files as evidence should understand how files are stored on computers and mobile devices, what happens when...

September 2, 2017

 I try not to get too deep into the weeds.  This video covers the basics that an attorney, investigator or HR director would need to know.

Please reload

  • LinkedIn Social Icon
  • Facebook Basic Square

September 3, 2018

March 26, 2018

September 14, 2017

September 7, 2017

Please reload

Recent Posts
Search By Tags
Featured Posts

Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing and Exploite...

Understanding NCMEC CyberTipline Reports

August 30, 2019

Please reload

Please reload


Steven Alexander


Trace Digital Forensics, LLC


Bakersfield, CA





  • LinkedIn Social Icon
  • Facebook Social Icon

© 2019 Trace Digital Forensics, LLC.  Bakersfield, CA.