Forensic Science

Computer forensics disk imaging

Computer forensics disk imaging

When we are dealing with different computer forensic cases, we usually need to perform disk imaging. Disk imaging in computer forensics is different and much stricter than the common data copy and disk image, it must ensure the copied data is...

 

Wireless Telephones Potential Evidence

Wireless Telephones Potential Evidence

Electronic devices may contain viable evidence associated with criminal activity. Unless an emergency exists, the device should not be accessed. Should it be necessary to access the device, all actions associated with the manipulation of the...

 

How to recognize digital evidence

How to recognize digital evidence

An interesting snippet from the United States Secret Service on how to recognize digital evidence: Computers and digital media are increasingly involved in unlawful activities. The computer may be contraband, fruits of the crime, a tool of the...

 

Forensic Data Recovery from Flash Memory Basic

Forensic Data Recovery from Flash Memory Basic

The evolution in consumer electronics has caused an Texponential growth in the amount of mobile digital data. The majority of mobile phones nowadays has a build in camera and is able to record, store, play and forward picture, audio, and video...

 

identity theft potential evidence

identity theft potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. hardware and software tools backdrops...

 

gambling potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. address books calendar customer...

 

email threats/harassment/stalking potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. email threats/harassment/stalking address...

 

domestic violence and fraud including online fraud

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. Domestic violence address books financial/asset...

 

murder/death investigation potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. address books diaries email/notes/letters financial/asset...

 

computer/network intrusion potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. address books configuration files email/notes/letters executable...