National Center for Missing and Exploited Children
federal rules of evidence
October 2, 2017
A number of organizations still rely on their IT staff to examine computers for misuse but don't provide their staff with any specialized tools and/or training. This is a recipe for disaster.
Disclaimer: I'm not exactly a neutral party in this discussion because I have...
September 1, 2017
This was originally posted on LinkedIn and on the Trace Digital Forensics blog on the old website. I'm reposting it here because I think the content is still valuable. If time permits, I will update this with a Part 2 focused on mobile devices.
I'm sometimes aske...
Understanding NCMEC CyberTipline Reports
August 30, 2019
What is a server?
September 3, 2018
March 26, 2018
Magnet Certified Forensics Examiner
November 15, 2017
Guidance Software Forensic Bug Bounty
October 13, 2017
Can't our IT person take a look?
Updates - 9/13/2017
September 14, 2017
Stop Using MD5
September 7, 2017
HG Experts Article: Deleted Files
September 6, 2017
What happens when you delete a file?
September 2, 2017
This was originally posted on LinkedIn and on the Trace Digital Forensics blog on the old website. I'm reposting it here because I think the content...
What can we get from digital forensics?
Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing and Exploite...
August 2019 (1)
September 2018 (1)
March 2018 (1)
November 2017 (1)
October 2017 (2)
September 2017 (7)
August 2017 (1)