skip to Main Content

Apple iPhone “Significant Locations”

Apple iPhone “Significant Locations” I recently attended a conference of civil litigators in Virginia.  During the cocktail hour and after a very interactive CLE presentation on “Leveraging Data in Insurance Fraud Investigations”, I was talking with a few attendees about…

Read More

Discussion: SCOTUS, Carpenter & Call Detail Records

On November 29, 2017, the Supreme Court of the United States (SCOTUS) will hear arguments in the case of Carpenter v. US.  At the heart of the arguments is whether or not the government (i.e., law enforcement) need a search warrant…

Read More

Electronically Stored Information (ESI) in High-Profile Cases

f it seems like the frequency of high-profile and attention-grabbing cases involving Electronically Stored Information (ESI) and digital evidence in the media are on the increase, you’re 100% correct!  ESI is ubiquitous – on our computers, on our phones, on our…

Read More

Don’t Forget the Victim (And Their Device)!

Regardless if your case involves computers, tablets, iPhones, Android devices or all of the above, one thing the investigative community can agree on is, every case is different.  Sure, certain cases will follow a workflow pattern, but the circumstances of every…

Read More

Clash of the Titans: Apple vs. The U.S. Government

I’ve had many spirited discussions and read many thought-provoking articles since the Federal Magistrate ordered Apple to cooperate (even more than they already have) with the FBI in the investigation of alleged San Bernardino terrorist Sayed Farook and his locked iPhone 5c.  Most…

Read More

Pro Digital: Investigative Solutions

Regular readers of this blog know that my professional experience and expertise started in the investigative realm.  Ever since I first got interested in law enforcement, I wanted to be an investigator and I’ve been fortunate enough to not only see…

Read More

Five Tips for Effective Technical Warrant-Writing

Having worked in law enforcement at the level of investigator and forensic examiner and subsequently transitioning to a trainer/private practitioner role, I’m starting to gather the benefit of something many law enforcement (LE) agents may well overlook – diversity of…

Read More

The Four Factors of Mobile Forensics

As with most private-sector digital forensic practitioners in the modern market, a great majority of our cases involve mobile device forensics.  These cases range from employment disputes to divorce.  invariably, whenever we get an intake consult for one of these cases, we…

Read More

Never Use P2P

Why You Should Never Use Peer-to-Peer For those of you who don’t already know, peer-to-peer file sharing is a big deal, not only for “legitimate” purposes (i.e., trading of non-contraband files), but also for more nefarious purposes such as trading…

Read More
Back To Top