Recent Articles

April 11, 2014 8:54 am
Gary Torgersen
Each social media platform is different, with unique code and variations. Each one runs on its own hardware and software platform, and some, such as Facebook, have even developed custom technology to run their sites. Because of that, each requires its own method of forensically collecting data. 
April 8, 2014 1:00 pm
D4, LLC
As mobile device usage and capabilities increase, the importance of these gadgets as sources of electronically stored information becomes undeniable. The more we rely on these accessories as vehicles for business communications and entertainment, the more data we create and consume. For every additional bit and byte that is born in the ether, there is a heightened chance that the information will become fodder for electronic discovery.
April 4, 2014 9:09 am
Ronen Engler and Christa M. Miller
Vendors and operating systems can vary widely, particularly with Android, but also even within iOS and BlackBerry user groups. More than 40 iOS versions are commercially available, and are spread among six different iPhones, five iPads, and five iPod Touch devices.
March 28, 2014 8:15 am
Dr. C Andras Moritz, Kristopher Carver, Jeff Gummeson
Once a password has been bypassed, an investigator has full access to the computer, allowing them to gather any evidence necessary, including the contents of the DRAM in the system. You can then use a PCI Express or ExpressCard device for memory acquisition.
March 21, 2014 8:21 am
Benjamin Wright
In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.  
March 10, 2014 6:20 am
Ronen Engler and Christa M. Miller
Not only does data storage vary from device to device and OS to OS, but devices may also be passcode-protected and/or encrypted. iPhone passcodes fall into two categories: simple and complex. A mobile data extraction tool should be able to reveal a simple passcode automatically for most devices.
March 7, 2014 8:36 am
John J. Barbara
A question often asked is, “What education and training is necessary to work in digital forensics?” There is not one easy, simple answer to this question. First of all, an individual has to make a choice of career pathways, namely do they wish to work in the public sector or in the private sector. 
March 5, 2014 5:26 am
John J. Barbara
Hard drives provide an efficient and cost-effective means to manage large amounts of data. However, we should remember that throughout the history of data storage, current media technology only lasts a short time (i.e., the floppy disk) before being replaced by some newer, bigger, better, and faster method of storing data.  
March 5, 2014 5:31 am
Rebecca Waters
We speak of it often and think about it even more: considering the pace at which technology is advancing, digital forensic investigators must constantly continue to learn new skills, understand new techniques, and keep appraised of the changing demands of the job.
March 4, 2014 1:47 pm
Rebecca Waters
Ed Primeau, a Michigan-based audio forensic expert, plays an important role analyzing sound recordings to be presented as admissible evidence in a court of law, and typically completes 40 to 50 voice identification cases each year. DFI News spoke with him to see what it takes to specialize in audio forensics.  
Subscribe to DFI News