Whitepaper: How important are Facebook Artifacts?

Facebook can be an indispensable online resource when recovering forensic artifacts to use as digital evidence. It can provide a glimpse into an individual’s life, offer geographical information to indicate where a person was on...

Read more >

How to Uncover the Covered Tracks

There are a variety of techniques used by suspects to erase and/or hide the things they do online. In this whitepaper, we will explore 3 different methods a person might use to conceal their online...

Read more >

Skype Forensics: Analyzing Call & Chat Data From Computers & Mobile

As a leading platform for voice and chat communications, Skype is often used as a platform for harassment or bullying incidents due to the perception that an individual’s actions are anonymous while on the Internet....

Read more >

Create a better digital forensics report using IEF

While most forensic examiners spend the majority of their time analyzing the evidence from their case, one of the most important steps in the investigative process – creating a digital forensics report– is often rushed....

Read more >

US Defense Cyber Crime Institute (DCCI) validates IEF v6.2

We are pleased to announce that Internet Evidence Finder (IEF) v6.2 has been validated by the United States Defense Cyber Crime Institute (DCCI). DCCI is the research, development and evaluation arm that tests tools tailored...

Read more >

Using Common Hashing Algorithms to Identify and Categorize Pictures

Forensic investigators are well aware how common hashing algorithms such as MD5 and SHA-1 help them confirm that their forensic image is an exact copy of the original disk or volume. This assists the investigator...

Read more >