Cryptocurrency Fraud
Cryptocurrency accounts wiped out 'in an instant' by cyber crooks. ABC Action News I-Team Investigator Adam Walser has uncovered cyber-criminals have found ways to drain people’s cryptocurrency accounts in the…
Device Handling and Digital Evidence Processing and Analysis
Using Predefined Criteria This protocol will cover all the steps needed to comply with the attached court order in case # FMCE13007297 signed by Judge Fabienne Fahnestock. Specifically, the defined…
Threading: A Serious Threat for 2019
This has become a serious threat and will define 2019 for sure. Already seen it in 5 separate cyber forensics examinations and investigations: I have been conducting cyber forensics since…
10 Common Expert Witness Mistakes
Forensic testimony is given by an expert witness using their expertise in science or technology to reach conclusions for a lawsuit or prosecution. Simply put, forensics is the science of…
Best practices for collecting mobile devices in a civil case vs criminal case
The collection of mobile devices in civil cases vs criminal may differ for several reasons. The primary difference is after a mobile device has been imaged or the data extracted,…
Skin Surface or Protected Algorithm?
What correctly identifies a fingerprint and its ability to decrypt and access sensitive mobile devices and content. Latent fingerprinting has been in existence for hundreds of years and similar to…