Follow Us

September 3, 2018

In criminal cases, it’s common for law enforcement to seize mobile devices and computers that might have electronically stored information that is relevant to the case at hand (with warrants, of course).  In cases involving businesses, that information is often stored...

October 2, 2017

A number of organizations still rely on their IT staff to examine computers for misuse but don't provide their staff with any specialized tools and/or training.  This is a recipe for disaster.

Disclaimer: I'm not exactly a neutral party in this discussion because I have...

September 7, 2017

Cryptographers (the people who make and break codes) have told us not to use the MD5 algorithm for twenty years.  Why are we still using it?

MD5 and SHA-1 are the two hash algorithms that are used to verify the authenticity of digital evidence.  Both algorithms have sec...

September 6, 2017

I have a new article up on HG Experts:

Attorneys who need to read and understand reports by computer forensics professionals and/or who need to present recovered files as evidence should understand how files are stored on computers and mobile devices, what happens when...

September 1, 2017

This was originally posted on LinkedIn and on the Trace Digital Forensics blog on the old website.  I'm reposting it here because I think the content is still valuable.  If time permits, I will update this with a Part 2 focused on mobile devices.

I'm sometimes aske...

Please reload

  • LinkedIn Social Icon
  • Facebook Basic Square

September 3, 2018

March 26, 2018

September 14, 2017

September 7, 2017

Please reload

Recent Posts
Search By Tags
Featured Posts

Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing and Exploite...

Understanding NCMEC CyberTipline Reports

August 30, 2019

1/2
Please reload

Archive