skip to Main Content

Training Review: X-Ways Forensics

I’ve been involved in computer/digital forensics since 2009, starting off my first training with Basic Data Recovery & Acquisition (BDRA) given by the National White Collar Crime Center (NW3C)in Fairmont, WV. Many of you have probably started your forensic training at NW3C…

Read More

Customer Service in Digital Forensics

My first jobs as a teenager were in customer service.  The brief first foray into the world of customer service was at an amusement park, which ironically, was anything but amusing.  After 3 months there, I transitioned to a retail environment where…

Read More

Pro Digital: Investigative Solutions

Regular readers of this blog know that my professional experience and expertise started in the investigative realm.  Ever since I first got interested in law enforcement, I wanted to be an investigator and I’ve been fortunate enough to not only see…

Read More

Five Tips for Effective Technical Warrant-Writing

Having worked in law enforcement at the level of investigator and forensic examiner and subsequently transitioning to a trainer/private practitioner role, I’m starting to gather the benefit of something many law enforcement (LE) agents may well overlook – diversity of…

Read More

The Four Factors of Mobile Forensics

As with most private-sector digital forensic practitioners in the modern market, a great majority of our cases involve mobile device forensics.  These cases range from employment disputes to divorce.  invariably, whenever we get an intake consult for one of these cases, we…

Read More

Keep Windows 10 off Your Forensic Machine (for now)

With the much anticipated recent release of Windows 10 comes a number of concerns for digital forensic examiners.  Full disclosure, I’m an Apple guy.  I like Apple products very much and wish I could do all of my forensic work on OSx,…

Read More

Never Use P2P

Why You Should Never Use Peer-to-Peer For those of you who don’t already know, peer-to-peer file sharing is a big deal, not only for “legitimate” purposes (i.e., trading of non-contraband files), but also for more nefarious purposes such as trading…

Read More

Auditing Social Media Contacts

Quick note: I’ve done some light research and seen where there are a few articles onlie about how companies should audit their social media for market effectiveness.  This article is not about that.  This article is about why YOU should audit your personal &…

Read More

The INconvenience of INfosec

The INconvenience of INfosec in the Digital Age I often get requests from civic groups, consumer groups and the media to speak about information security (infosec) practices, trends, etc.  Although infosec is not our primary role at Pro Digital, it does…

Read More
Back To Top