Crime Scene

Top 3 Mistakes Made On Scene with Digital Evidence

Digital devices have become so ubiquitous that virtually every crime scene now includes one or more pieces of digital evidence in the form of a mobile phone, laptop, desktop, tablet or other device. Performing a proper forensic analysis on this type of evidence can take time, but it’s often decisions and actions taken during the …

Options for Dealing with the Digital Forensics Backlog

Options for Dealing With the Digital Forensics Backlog

Law enforcement and prosecutors face a daunting 6 – 18 month backlog to process digital evidence through an RCFL or state computer forensics lab. Unfortunately, the grim reality of public budgets and the explosive growth of digital evidence means that this backlog is not going away any time soon. The only question is how your …

Flashback Data Digital Forensics Utility

Digital Forensics Hack – $I File Parser – Free Download

Digital forensics software has come a long way in providing tools to help digital forensic examiners do their jobs more efficiently. However, when you’re performing hundreds or thousands of examinations per month, you still find yourself doing a lot of repetitive, manual work. The experts at Flashback Data have created a nifty productivity tool to …

3 Words Never To Use When Talking About Digital Evidence in a Courtoom

3 Words Never To Use When Talking About Digital Evidence in a Courtroom

At work, a “copy”, “ghost” or “mirror” of your data can help you collaborate with coworkers or quickly recover a lost or corrupted file. In a courtroom, any of these three terms can get you into trouble. WHAT EXACTLY ARE YOU COPYING, GHOSTING OR MIRRORING? The trouble arises from what exactly is being copied. Most …

Forensic options on locked or broken mobile devices

Forensic Options – Locked / Broken Mobile Devices

“JTAG” and “chip-off” processes are a well-known last resort when standard forensic tools can’t recover data from a locked or damaged mobile device. While these terms may be well-known, the actual processes are extremely technical and involve an understanding of circuit board and memory chip architectures. Here is what you need to know about each …

Digital Forensics vs eDiscovery

The Major Differences Between Digital Forensics and eDiscovery

Our world is becoming more technological every day, and businesses and individuals are relying on a variety of digital means to store their data. If you or your business is involved in a legal proceeding, for example, your digital records may be required to assist with litigation. Although individuals and businesses are required to digitally …

Cyber-Attack: Does it mean the end?

We’ve all the heard stories about the 200,000+ systems in 150 countries getting hacked last week. The attacks hit computers running factories, hospitals, banks, government agencies, and transport systems in countries including Russia, United States, Ukraine, Brazil, Spain, India and Japan, among others. Among those hit were Russia’s Interior Ministry, Spain’s Telefonica, FedEx Corp. in …