Digital Forensics Experts – Cell Phones and Secrets
Digital Forensics Experts - Cell Phones and Secrets Apple, Android, or other—it doesn’t matter the operating system, smartphones have lightning fast processing that lets us do almost anything. Today’s smartphones are so sophisticated that using them to call people...
read moreOur Digital Behavior – From A Computer Forensic Investigator’s Perspective
Our Digital Behavior – From A Computer Forensic Investigator Perspective The digital world is taking over and for many, this is a good thing. Shopping, shipping, communicating and sharing ideas or messages has never been easier or faster. In fact, the average adult...
read moreComputer Forensics for Custody Cases
Computer Forensics and Custody Cases No one gets married with the hopes of an amicable divorce in the future. We go into marriage with love and expectations of a forever companionship. Since this is an imperfect world and we are imperfect people, divorce is sometimes...
read moreThe Rise of Computer Crime
The Rise of Computer Crime It’s a brief list of people who haven’t benefited in some way from the rise of the personal computer. And even PC’s have been replaced by more sleek, powerful and portable devices like tablets and laptops that deliver all the abilities...
read moreMobile Forensics – Data of Distracted Drivers
Mobile Forensics - Data of Distracted Drivers "The cell phone is probably the single most important piece of evidence you will find at a crime scene today." - former FBI Director James Comey As mobile technology continues to evolve and become an important part of...
read moreDigital Forensics – The Information You Can’t See
Digital [dij-i-tl]: pertaining to, noting, or making use of computers and computerized technologies, including the Internet. Forensic: [fə’renzik]: scientific tests or techniques used in connection with the detection of crime. The technology explosion that has flooded...
read moreThe Guardian Forensics Blog features a wealth of content regarding eDiscovery, Digital Privacy, Preventing Cyberattacks, and more topics.