Beyond Text Messages The various forms of chat communications. On a mobile device or computer, communications can exist across a variety of applications; IM and text messages are just the start of the potentially-relevant user messages. People hold conversations...
Email Authentication Issues and solutions in email evidence. Email evidence can prove valuable to a case. However, it is important to thoroughly authenticate emails used in litigation. Failure to prove the validity of an email item could render a crucial piece of...
Anti-Forensics Techniques bad actors use to hide their tracks. Businesses involved in fraud, employees involved in misconduct, and criminals engaged in computer-related crime all frequently take steps to destroy, conceal, or confuse digital evidence. Depending on the...
Social Media Forensics: A Primer A brief overview of the technical, legal, and practical issues in a social media investigation. Individuals and organizations share massive amounts of information on social media both voluntarily and involuntarily. In some cases, this...
Cell Phone Forensics: A Primer Mobile device evidence in litigation and investigations. Mobile devices, including cellphones, smartphones, and tablets, contain an astonishing amount of information about their users and the people or organizations they interact with....
We are pleased to announce the new name of our company: ArcherHall. We have the same ownership, same dedicated team, and same great service that we’ve delivered for over 20 years. We look forward to continuing to work with you!