Beyond Text Messages

Beyond Text Messages

Beyond Text Messages The various forms of chat communications. On a mobile device or computer, communications can exist across a variety of applications; IM and text messages are just the start of the potentially-relevant user messages. People hold conversations...
Email Authentication

Email Authentication

Email Authentication Issues and solutions in email evidence. Email evidence can prove valuable to a case. However, it is important to thoroughly authenticate emails used in litigation. Failure to prove the validity of an email item could render a crucial piece of...
Anti-Forensics

Anti-Forensics

Anti-Forensics Techniques bad actors use to hide their tracks. Businesses involved in fraud, employees involved in misconduct, and criminals engaged in computer-related crime all frequently take steps to destroy, conceal, or confuse digital evidence. Depending on the...
Social Media Forensics: A Primer

Social Media Forensics: A Primer

Social Media Forensics: A Primer A brief overview of the technical, legal, and practical issues in a social media investigation. Individuals and organizations share massive amounts of information on social media both voluntarily and involuntarily. In some cases, this...
Cell Phone Forensics: A Primer

Cell Phone Forensics: A Primer

Cell Phone Forensics: A Primer Mobile device evidence in litigation and investigations. Mobile devices, including cellphones, smartphones, and tablets, contain an astonishing amount of information about their users and the people or organizations they interact with....