Email is the lifeblood of any organization; as data is transmitted so is the ability to capture it as evidence. With any email processing, there are a simple few rules to follow that allow you to get the maximum amount of data. First, always keep the data in the...
Guest Blogger: Chief Todd A. Faulkner, Hinsdale Police Department One of the biggest barriers for every investigator is locked devices. We hear countless suggestions that are about tools, but what about adjustments in techniques for the seizure that can work with any...
Some people are intimidated when they hear the words ‘cloud’ and ‘digital evidence,’ and immediately start to worry. There is not as much to worry about as one might believe when it comes to actually collect the data. The worry comes into play on the legal...
Mobile Device Digital Forensics is just coming out of its infancy. The data extracted from a mobile device can also be used to do audits of devices and security checks for vulnerabilities. Using the Mobile Evidence Comparer function in the E3 Platform is one of those...
After spending time researching Tinder and realizing how happy I was to not be dating, I wondered what electronic nuggets it left behind as one of the top dating apps. As a popular tool for dating, or “getting together,” it becomes a tool of connection for many people...
Recent Comments