Digital Forensics and the Case Timeline

How To Align Your Forensics Support to Your Case Timeline

“We go to trial in 2 days and I need this digital forensic analysis done tomorrow!” We get requests like this frequently and we do our best meet our clients’ case timelines if we can. If your case needs the support of digital forensics, it’s important to understand how to align your forensic needs to …

Crime Scene

Top 3 Mistakes Made On Scene with Digital Evidence

Digital devices have become so ubiquitous that virtually every crime scene now includes one or more pieces of digital evidence in the form of a mobile phone, laptop, desktop, tablet or other device. Performing a proper forensic analysis on this type of evidence can take time, but it’s often decisions and actions taken during the …

Options for Dealing with the Digital Forensics Backlog

Options for Dealing With the Digital Forensics Backlog

Law enforcement and prosecutors face a daunting 6 – 18 month backlog to process digital evidence through an RCFL or state computer forensics lab. Unfortunately, the grim reality of public budgets and the explosive growth of digital evidence means that this backlog is not going away any time soon. The only question is how your …

3 Words Never To Use When Talking About Digital Evidence in a Courtoom

3 Words Never To Use When Talking About Digital Evidence in a Courtroom

At work, a “copy”, “ghost” or “mirror” of your data can help you collaborate with coworkers or quickly recover a lost or corrupted file. In a courtroom, any of these three terms can get you into trouble. WHAT EXACTLY ARE YOU COPYING, GHOSTING OR MIRRORING? The trouble arises from what exactly is being copied. Most …

Forensic options on locked or broken mobile devices

Forensic Options – Locked / Broken Mobile Devices

“JTAG” and “chip-off” processes are a well-known last resort when standard forensic tools can’t recover data from a locked or damaged mobile device. While these terms may be well-known, the actual processes are extremely technical and involve an understanding of circuit board and memory chip architectures. Here is what you need to know about each …

digital forensics

When You Need to Finally Call a Digital Forensics Expert

In an age of the cloud, it is easy to take convenient access to data for granted. With older or more secure information, localized storage can fail potentially corrupting valuable data. Before handing the job off to your in house IT team, consider hiring a digital recovery expert first. Digital Forensics Expert: Job Description and …

Case No. 06286- Embezzlement

We were engaged by a company to examine its technical infrastructure for suspected intrusion and/or monitoring. Investigation revealed an ongoing breach was in fact occurring, but the source was internal. We discovered multiple keyloggers and other monitoring software had been deployed to company computers. Further investigation determined the source was a trusted employee and that, …