Meet the Examiners
We are proud to count a large number of former Digital Forensic Examiners, from both the Law Enforcement and Corporate sectors, as members of the team—providing a wealth of valuable knowledge and insights and shaping all that we do.
Get to know more about them and the expertise they bring to Magnet Forensics, and feel free to drop them an email or follow them on social media!
Trey Amick is a forensics investigator with a background in both law enforcement and corporate investigations. As a detective with the Rock Hill Police Department in South Carolina, Trey was sworn as a Special Deputy United States Marshal and supported the US Secret Service Electronic Crimes Task Force. Previously, he served in roles in both Patrol and Professional Standards.
Most recently, as a corporate investigator, Trey managed the Enterprise Cyber Education and Awareness Team at Capital One, where he also served as part of the Cyber Technical Investigations Team. Trey is currently a Forensics Consultant at Magnet Forensics, where he assists in the development of Magnet AXIOM and provides skilled support to customers with his combined knowledge of AXIOM and digital forensics.
Martin Barrow started front-line policing doing uniform patrol, and after 3 years into his career started the route to becoming a Detective Constable. Martin then joined the Digital Forensics Unit in the last few years of his police career. He examined both computers and mobile phones, conducting the installation, configuration, training and majority of fault finding on the range of software and hardware used, quickly becoming the unit’s Deputy Technical Manager. Martin also researched processes to improve techniques and provided assistance to persons both inside and outside the unit in their line of work, using software such as Axiom, Internet Evidence Finder, Cellebrite, XRY, ADF, Intella, EnCase, X-Ways, GriffEye, Autopsy, and Passware. Martin is also a member of IACIS and gained CFCE accreditation.
Patrick Beaver’s experience is distinctive to law enforcement as he has experience testifying on Capitol Hill for the House Judiciary Committee and providing written briefs to United States Congress. Patrick worked with Congress to hold electronic service providers accountable for failing to work with law enforcement on legal requests. Patrick’s testimony and written briefs prompted additional hearings on Capitol hill and continues to advocate for law enforcement and victims of serious crimes.
Patrick has a unique experience with digital forensics and cyber investigations. Prior to Magnet Forensics, Patrick was assigned to the Northern Virginia/Washington D.C. Internet Crimes Against Children Task Force (NOVA/DC ICAC). While at NOVA/DC ICAC he conducted undercover investigations while part of ICAC. The undercover investigations targeted individuals engaged in the exploitation of children. This included the “Darknet” and other cyber locations hidden from public view. Patrick identified targets, wrote search warrants, executed search warrants, and conducted forensics examinations of the evidence collected from the target.
Patrick has traveled all over the United States investigating exploitation cases. Patrick is currently a Professional Services Consultant & Forensics Instructor with Magnet Forensics. Patrick has worked with Magnet Forensics since January of 2018 after moving on from a rewarding career with the Loudoun County Sheriff’s Office as a detective. Patrick has been charged with maintaining the only Magnet Forensics training facility since being hired on. Patrick travels all over the world and teaches law enforcement, private sector, and other entities on how to conduct digital forensics investigations. Patrick provides professional services in digital forensics to private and government agencies.
Patrick has received several awards to include the Bronze Medal of Valor for his actions in law enforcement in 2018. Patrick was recognized by United States Congress for this achievement in his law enforcement career. Patrick was named the Veterans of Foreign wars – Outstanding Public Servant Citation – Law Enforcement for 2017-2018. Patrick received an award by the FBI for Commendable Performance During a Joint Task Force Investigation in 2018. This award was signed by FBI Director Christopher A. Wray for assistance in an investigation involving international terrorism and child exploitation in the Washington D.C. region.
Kim Bradley retired from the Commonwealth of Kentucky where she worked the last nine years of her career as Forensic Computer Examiner with the Kentucky State Police (KSP). She was assigned to the Federal Bureau of Investigation’s Cyber Crime Task Force and worked for five years at the Kentucky Regional Forensics Laboratory (KRCFL). While at the KRCFL, she earned the Computer Analysis Response Team (CART) Forensic Examiner certification and received training in mobile forensics, video forensics, audio forensics and laboratory management. Kim also served as the Laboratory Quality Manager and assessed many of the other RCFL’s. After returning to KSP’s Electronic Crime Branch Laboratory from the task force assignment, she became a Certified Law Enforcement Instructor with the Kentucky Law Enforcement Counsel and provided numerous training classes for sworn officers, intelligence analysts and dispatchers while also working mainly Internet Crimes Against Children (ICAC) examinations. Prior to her retirement, she helped to establish and manage a (satellite) KSP Digital Forensics Laboratory on the campus of Eastern Kentucky University (EKU). Her state service before moving into digital forensics included positions in software development and database management. In addition to holding several certifications, Kim has an Associates degree in Early Childhood Education from EKU, a Bachelor of Science degree in Computer Science from Kentucky State University and a Master of Science degree in Digital Forensic Science from Champlain College.
Chris Cone began his law enforcement career in 1998, working for local, county and state agencies. He spent most of his career as a criminal investigator specializing in digital forensics and high-tech crimes investigation and was a member of the state’s Internet Crimes Against Children task force. Chris finished his law enforcement career as the Director of Forensic Services for the Arkansas Attorney General’s Office where he managed operations of the digital forensics lab in their Cyber Crimes Unit. In addition to industry recognized digital forensics certifications (IACIS CFCE, ISFCE CCE and both the GIAC GCFE and GNFA), he maintains information technology focused certifications from CompTIA including A+, Network+ and Security+.
Doug has been in his current position of Forensics Trainer with Magnet Forensics since January 2, 2018. In his current position, he provides training in digital forensics and the usage of Magnet’s tools such as IEF and AXIOM to users in North America and worldwide. Doug previously worked as a Senior Special Agent with the Arkansas State Police with over 26 years investigative and instructional experience. While there, he helped develop and maintain the Internet Crimes against Children Task Force. He also worked as a contract instructor with the National White Collar Crime Center (NW3C) for about 6 years. Doug has instructed at the United States Secret Service National Computer Forensics Institute (USSS-NCFI) specializing in in mobile investigations and forensics. Doug has provided expert testimony in State and Federal Court in mobile forensics and instructed for various other conferences and organized events.
Lyn Goh has 30 years of experience working in IT, starting her career working on mainframe systems and networks. In 1999 she joined the UK’s Forensic Science Service where she worked as a computer forensics investigator investigating a wide range of crimes and giving evidence on cases that included child exploitation, drug smuggling, people trafficking and fraud. After leaving the Forensic Science Service Lyn worked for UK financial regulator and worked on both criminal and regulatory investigations, many of which involved liaising with and/or working on joint operations with overseas regulators and prosecuting bodies. Prior to joining Magnet Forensics, Lyn worked for Guidance Software as a part-time instructor for 7 years and then a full-time instructor for 2 years. Lyn has a Bachelor of Science degree in Chemistry and Natural Science and a post graduate Master of Science degree in Computer Forensics.
Hoyt Harness is a retired sergeant with the Arkansas State Police with over twenty-three years of experience between two separate agencies. In addition to cyber and digital forensics positions, he has served as an undercover narcotics investigator and a SWAT sniper for both state and local law enforcement agencies and a federally deputized task force officer for multiple U.S. Government agencies. He was assigned to FBI’s Innocent Images National Initiative (IINI) Task Force in 2001 investigating technology-facilitated child exploitation and Internet crimes against children. In 2003, he was tasked with establishing Arkansas’ Internet Crimes Against Children Task Force (ARICAC) and acted as the state’s first ICAC Commander for several years. He worked diligently helping other state and local agencies develop a technical and tactical capability to address cybercrime and the victimization of children via technology during that time and later. He was certified as a military instructor in 1993 and a police instructor in 1999. He has taught a plethora of cyber investigation and digital forensic courses over the years. He has owned and operated Reveal Forensic Investigations, LLC providing cyber investigative and digital forensic services to the private sector and he manages Free and Open Source Software (FOSS) technologies projects under the guise of Positronikal Technologies Group. An investigation that he was part of regarding the murder of a police officer was featured in an episode of A&E’s “Cold Case Files” titled “The Sting Operation” in 2006.
Jerry Hewitt followed his fathers’ footsteps into UK law enforcement, joining Northumbria Police as a Cadet in 1978 and staying with them until his move to Magnet Forensics in July 2019. He has always had an interest in technology and gadgets. Building his first Sinclair ZX80 computer in the late 1970’s was his start in computing. He became a licensed Amateur Radio operator in the early 1980’s and connected the two hobbies long before the days of smartphones. Jerry was a proud member of Northumbria Police for over 40 years. He moved from Uniform beat patrol to the Motor Patrols Department and then Air Support where he was the training officer. Some time spent as an authorised firearms officer and then becoming a Detective in the Criminal Investigation Department (CID). He also worked as a remote staffer with AOL UK, yes, he still has an AOL Email address! During his time in CID he investigated many cases which involved Child Sexual Exploitation and the relatively new world of Digital Forensics.
In 2009, he retired from Northumbria Police only to rejoin three months later, as a High-Tech Crime Unit Forensic Investigator. It was during this time that he first came across Jad Software’s Internet Evidence Finder (IEF). Six years after that and he became the Digital Forensic Unit Manager running a team of 30 staff and, with other stakeholders, helped make Northumbria Police DFU the excellent Unit it is today. Now part of the full time, United Kingdom based, training team for Magnet Forensics.
Lynita (Lyn) Hinsch is a certified and experienced computer forensics professional. She began her training as an enlisted Computer and Communications Specialist in the U.S. Air Force with the Air Force Pentagon Communications Agency (AFPCA) in Washington, DC. After enlistment Lyn continued her career in both the Federal and Local Law Enforcement space working for such agencies as the U.S. Department of State, Defense Intelligence Agency, and Maricopa County Sheriff’s Office before joining the corporate information security sector where she spent several years prior to Magnetizing! She is a Champlain College alum with an undergraduate degree in Computer and Digital Forensics and more than a decade of experience.
Jessica Hyde is an experienced forensic examiner in both the commercial and government sectors. She is currently the Director of Forensics at Magnet Forensics and an Adjunct Professor teaching Mobile Forensics in the graduate programs at both Champlain College and George Mason University, where she achieved an MS in Computer Forensics. Her previous roles included performing forensic examinations as a Sr. Mobile Exploitation Analyst for Basis Technology, Senior at EY, and Senior Electrical Engineer at American Systems. Jessica is also proud to be a veteran of the United States Marine Corps.
Dallas started in the infosec industry about 15 years ago as a consultant with Ernst and Young, where he worked with clients on various security related initiatives. From there he moved into a similar role with Booz Allen Hamilton, supporting numerous government agencies, such as the DoD, IRS and NOAA in all things security. About 5 years ago, he started focusing more on the digital forensics and incident response (DFIR) space, when he joined Carbon Black supporting their CB Response application. Prior to joining Magnet, he was serving as a DFIR Analyst for a large government contractor, where he focused mostly on IR, forensics and threat hunting.
Detective Larry McClain (retired) of the O’Fallon Police Department served as a forensic examiner/investigator with the Regional Computer Crime Education and Enforcement Group of Greater St Louis. He started with the task force since July 2008 and served until 2017. Larry has 23 years of law enforcement experience. He holds the Certified Forensic Computer Examiner (CFCE) certification through the International Association of Computer Forensic Specialists. Additionally, he is certified examiner for matters relating to forensic investigations of computers, cell phones, and hacking. He is a current member of the International Association of Computer Investigative Specialist (IACIS), the High Tech Crime Investigation Association (HTCIA), and previously the Regional Computer Crime Education and Enforcement Group of Greater Saint Louis (RCCEEG), and the Missouri Internet Crimes Against Children (ICAC) Task Force. Det. McClain served as a Task Force Officer with the FBI Child Exploitation Task Force, as well as a member of the U.S. Secret Service Electronic Crimes Task Force. He has received training in computer forensics and investigations from numerous organizations, including the International Association of Computer Investigative Specialists, the United States Secret Service National Computer Forensic Institute, the National White Collar Crime Center, the FBI, Guidance Software, Magnet Forensics, Access Data Software, Internet Crimes Against Children Task Force, the National Center for Missing and Exploited Children (NCMEC), and the Department of Defense. He is certified as a Digital Evidence Acquisition Specialist (DEAS) and a Seized Evidence Recovery Specialist (SCERS) from the Department of Homeland Security. A veteran of the United States Marine Corps, Det. McClain has a Bachelor of Arts degree in criminal justice from Columbia College and a Master of Science degree in administration from Lindenwood University. He is an instructor for various law enforcement entities in subjects related to cybercrime investigations and digital forensics, as well as an adjunct professor at Lindenwood University, Maryville University, and Saint Louis University where he has developed and teaches courses on cybercrime investigation, digital evidence, and computer forensics.
Jamie McQuaid CISSP, CFCE, MCFE is a forensics investigator with a background in corporate investigations spanning various industries from telecommunications to financial services and manufacturing. His responsibilities included conducting both forensic and physical investigations as well as incident response globally across the organization. McQuaid is currently a Forensics Consultant at Magnet Forensics where he assists in the research and development of Magnet AXIOM and speaks at various information security and forensics conferences on his research and a variety of topics in the field of digital forensics. He holds an Advanced Diploma in Computer Security and Investigations from Fleming College and an Honors B.A. from the University of Toronto.
Tarah Melton, GCFA, GREM, is a digital forensics examiner with a background in the Federal Government, supporting customers focused on counterterrorism, cyber defense, and incident response. Her responsibilities included forensic lab management and conducting digital forensic investigations in both the US as well as overseas, completing two deployments to Afghanistan. She holds a BS in Digital Forensics from Bloomsburg University of Pennsylvania. Tarah is currently a Forensic Consultant at Magnet Forensics, where she provides support to customers with her combined knowledge of Magnet tools and digital forensics, as well as assisting with the development of Magnet products.
Tim Moniot’s journey into Digital Forensics began as a Police Officer / Detective, working in one of the largest and busiest Metropolitan police departments in the Western United States. During his tenure of conducting violent crimes against persons investigations, computer technologies were beginning to rapidly develop and became valuable evidence in cases. In 2003, Tim was assigned to started training in digital forensics and technical investigations, where he quickly learned that he not only had a knack for, but a keen interest, in DFIR. In 2014, after having had the honor of serving on multiple federal task forces with the FBI and United States Secret Service, and after over 20 years of law enforcement service, Tim retired. He then entered the private sector DFIR world, dove into the e-Discovery sector, and continues to practice DFIR to this day. Tim has been with Magnet Forensics since 2017 as a Senior Solutions Consultant at Magnet, where he works with clients all across North America, consulting on and providing technical DFIR solutions.
Jad Saliba is a former digital forensics investigator who left policing in 2011 to devote all of his time to developing software solutions that dramatically improve the process of recovering and analyzing Internet evidence left behind. He has since dedicated his efforts to building Magnet Forensics and developing Magnet IEF into a thorough and easy-to-use software solution that recovers Internet-related artifacts from computers, smartphones and tablets. As Magnet Forensics’ CTO, Jad is focused on researching new methods of recovering and analyzing all types of evidence for digital forensics investigations. His goal remains to create the best Internet forensics tools possible—helping those in the trenches make a difference in their communities.
Erich Schmidt joined Magnet Forensics in 2020. Erich was a Deputy Probation Officer in San Diego, California for nine years prior to working at Magnet. Erich served on a high-tech crimes task force and conducted digital forensic investigations and high-profile investigations. Erich was sworn as a Special Deputy United States Marshal to support local task forces, and also worked as a technical advisor to numerous corporations. Erich started his instructor career by teaching open-source investigation techniques to law enforcement agencies in the United States, and he is passionate about using technology to solve crime.
Eugene Silva is an experienced forensic examiner with a 30-year career as a police officer at the Waterloo Regional Police Service (WRPS).
He has worked in a variety of roles and units in policing, including uniform patrol, the Targeted Street Crime Unit, the Drug Enforcement Unit, Surveillance, Undercover work and Part VI authorizations (Wiretaps). He is a trained Hostage & Crisis negotiator and has been part of the Public Safety Unit.
He was mentored by the RCMP in Computer Forensics after which he formed the Technological Crimes Unit for WRPS. Leading a small team of investigators, he also conducted forensic examinations, search and seizure of computers, mobile devices and other electronic media analysis.
Eugene is a long time active member of the High Tech Crime
Investigators Association (HTCIA) where he has held various executive board positions at the Ontario chapter, including President, 1st VP, 2nd VP, and Secretary.
In 2006, Eugene obtained his Certified Forensic Computer Examiner (CFCE) certification, through the International Association of Computer Investigative Specialists (IACIS). After his CFCE certification, he became a CFCE Peer Review coach to many international students looking to also obtain their CFCE certification.
In 2015, he was selected by IACIS to be the CFCE Regional Manager for Canada, responsible for over 40 Peer Review CFCE coaches across Canada and the United States.
In 2017, Eugene became the officer-in-charge of the then newly formed Cybercrime Branch for his police service comprised of Computer and Mobile Forensics investigators, Video Forensics investigators, Internet Child Exploitation officers, Social Media & Open Source Intelligence personnel and pure Cybercrime investigators.
Eugene has conducted over 1200 investigations involving either computer related media or cellular phone devices. This includes homicide investigations, counterfeiting, drugs, guns & gangs, Internet child exploitation, sexual assaults, cryptocurrency, data breaches, ransomware, and the darknet, just to name a few.
Eugene is a qualified court expert in both provincial and federal courts of Ontario. He has been used by both the Crown and the Defense as an expert witness due to his unbiased approach to conducting his digital forensic analysis and court testimony.
He has instructed a number of courses relating to computer & mobile forensics and open source intelligence (OSINT) at his police service, at the Ontario Police College and at the Canadian Police College.
In 2017, he co-presented on a Canadian child sex tourism investigative case study for INTERPOL’s Specialists Group on Crimes Against Children.
Eugene has mentored police officers from other police agencies in Ontario who were looking to start up their own Cybercrime or Computer Forensic units.
As a Forensic Consultant for Magnet Forensics, Eugene will provide skilled support to customers with his combined knowledge of Magnet Forensics tools and digital forensics investigations.
Matthew Simon is the APAC Forensic Sales Consultant for Magnet Forensics. Matthew’s role is to support customers of Magnet Forensics across the APAC region in the application of digital forensics, to understand the technical challenges investigators are facing and help ensure the company is providing the most relevant and innovative solutions.
Matthew previously held the role of Digital Crime Officer at the INTERPOL Global Complex for Innovation where he was in the Digital Forensics Laboratory. In this role he worked closely with the INTERPOL member countries to provide incident response, capacity building and training, and digital forensics laboratory support. Prior to his time at INTERPOL, Matthew spent almost five years in criminal law enforcement as an Electronic Evidence Specialist with the Electronic Crime Section of the South Australia Police in Australia. He actively worked with police investigators on many serious criminal
matters and provided expert reports and oral expert testimony in court for numerous cases
Matthew has a PhD by research in digital forensics and a Bachelor’s Degree with First Class Honours from the University of South Australia. He is an expert digital forensics practitioner, an academic researcher and is experienced in computer and mobile forensics.
Andrew Thorpe has worked as a Police Constable for the South Yorkshire Police service since 2004. Roles include incident response, Riot Policing and covert proactive roles including working with intelligence and gang related cases. He has been accredited as an Advanced Car Driver, Taser Trained Officer, Public Support Unit Officer including advanced method of entry and PEACE model interview training. His varied roles and skills have helped him develop in dealing with a vast array of situations including grieving victims of crime, confrontational situations, demanding deadlines and highly confidential information. In 2015, Andrew joined the High Tech Crime Unit within the South Yorkshire Police service as a forensic examiner of mobile phones and tablets, computers and laptops and storage media. He has performed examinations into a variety of cases including Murder, Rape, Drug supply, Fraud, Cyber Crime, Indecent Child Images and Child Sexual Exploitation. Joining Magnet Forensics as a Senior Technical Support Specialist in September 2019, Andrew helps manage questions from our customers on Magnet Axiom, IEF, Review, Automate and general forensic questions.
Emma joined Magnet Forensics April 2020 as a Solutions Consultant covering Digital Lab Solutions for EMEA, prior to this she worked within South Wales Police for 13 years, 9 years as part of neighbourhood front line Policing team and for that last 4 years within the Tarian Regional Cyber Crime Unit (RCCU) which covers the 3 welsh Police forces – South Wales, Gwent and Dyfed Powys.
Emma joined the RCCU as a Digital Forensics Investigator where she led complex operations/investigations covering cyber dependent & enabled crimes. After two years within the department Emma was promoted to RCCU Manager, leading a team of digital forensic investigators and examiners as well as heading up the ISO accreditation process. During her time within the unit, she received a Chief Constables Commendation for her work on high level complex crimes and Protect campaigns as part of Team Cyber UK. Emma also holds her CFCE certification.
Rhys Tooby joined Magnet Forensics in April 2019 as a Solutions Consultant for the EMEA region. Prior to joining the team at Magnet, Rhys had a long career with South Wales Police where he was a Digital Forensic investigator for 7 years before he became the Manager of the Digital Forensics and Cyber Crime Unit for an additional 5 years. He was responsible for managing a dedicated team who provided advanced technical solutions to support the investigation of crime. Believing in Magnet’s mission, Rhys left his policing career to pursue a career working closer with other agencies to help repeat the success of his own former lab. Rhys specializes in developing solutions and custom workflows within labs with digital forensics tools and digital evidence management.
Jamey was in the US Army and retired in 2008 with two bronze stars and 4 deployments to Iraq and Kuwait. While serving Jamey was a member of the United States Army Criminal Investigation Command as a CID Special Agent Warrant Officer and helped develop the US Army’s Digital Forensic Examiners program. He lives in Houston TX and has been married for 29 years and has two adult daughters ages 19 and 21. Jamey is passionate about Memory Forensics and enjoys teaching as he knows he is able to affect cases in a much larger scale that way. Jamey has been conducting digital forensics since 2001 and has the following certifications: MCFE, CISSP, CEH, SCERS, CFSR, and ENCE.
Christopher Vance has been a Forensic Instructor for Magnet Forensics since March of 2016. Before working for Magnet, Christopher delivered online and in-person training for several vendor and non-vendor solutions as well was a frequent instructor for Marshall University’s Forensic Science Center. Before becoming an instructor, Christopher worked for the West Virginia State Police’s Digital Forensics Unit as a Forensic Specialist for 8 years primarily focusing on mobile forensic investigations for a wide array of case types. Christopher specializes in mobile application and artifact analysis in both iOS and Android devices.
Mike Williamson came to Magnet Forensics after a 12 year career as a police officer with the Calgary Police Service. There he worked in a variety of roles including patrol operations, IT project management, software development, and most recently as a digital forensic examiner and expert witness. Prior to law enforcement, Mike worked in the oil & gas sector in an IT systems analyst role.
Mike has always enjoyed programming and in his 6 years as a forensic examiner, was able to develop more specialized skills such as reverse engineering, development of custom reporting tools, and performing advanced acquisition techniques like chip off.