Ask the right questions

3 Questions to Ask When Hiring a Private Digital Crime Lab

The 6 to 18 month backlog to process digital evidence at almost every state crime lab and RCFL is forcing law enforcement agencies to consider alternatives, especially for high-profile and time-sensitive cases. Private labs and digital forensics services are available to help, but law enforcement needs to be aware of the differences in working with …

Crime Scene

Top 3 Mistakes Made On Scene with Digital Evidence

Digital devices have become so ubiquitous that virtually every crime scene now includes one or more pieces of digital evidence in the form of a mobile phone, laptop, desktop, tablet or other device. Performing a proper forensic analysis on this type of evidence can take time, but it’s often decisions and actions taken during the …

Options for Dealing with the Digital Forensics Backlog

Options for Dealing With the Digital Forensics Backlog

Law enforcement and prosecutors face a daunting 6 – 18 month backlog to process digital evidence through an RCFL or state computer forensics lab. Unfortunately, the grim reality of public budgets and the explosive growth of digital evidence means that this backlog is not going away any time soon. The only question is how your …

Flashback Data Digital Forensics Utility

Digital Forensics Hack – $I File Parser – Free Download

Digital forensics software has come a long way in providing tools to help digital forensic examiners do their jobs more efficiently. However, when you’re performing hundreds or thousands of examinations per month, you still find yourself doing a lot of repetitive, manual work. The experts at Flashback Data have created a nifty productivity tool to …

3 Words Never To Use When Talking About Digital Evidence in a Courtoom

3 Words Never To Use When Talking About Digital Evidence in a Courtroom

At work, a “copy”, “ghost” or “mirror” of your data can help you collaborate with coworkers or quickly recover a lost or corrupted file. In a courtroom, any of these three terms can get you into trouble. WHAT EXACTLY ARE YOU COPYING, GHOSTING OR MIRRORING? The trouble arises from what exactly is being copied. Most …

Forensic options on locked or broken mobile devices

Forensic Options – Locked / Broken Mobile Devices

“JTAG” and “chip-off” processes are a well-known last resort when standard forensic tools can’t recover data from a locked or damaged mobile device. While these terms may be well-known, the actual processes are extremely technical and involve an understanding of circuit board and memory chip architectures. Here is what you need to know about each …

Digital Forensics vs eDiscovery

The Major Differences Between Digital Forensics and eDiscovery

Our world is becoming more technological every day, and businesses and individuals are relying on a variety of digital means to store their data. If you or your business is involved in a legal proceeding, for example, your digital records may be required to assist with litigation. Although individuals and businesses are required to digitally …