Blog
When is a Computer Forensic Investigation Needed? (2 of 2)
In my previous post, I identified several primary differences between computer forensic investigations and electronic discovery processing. Next, I’d like to identify some general case categories and tasks that involve a computer forensic investigator. Case...
When is a Computer Forensic Investigation Needed? (1 of 2)
Electronic discovery and computer forensic investigations often go hand in hand. The challenge for many in the legal community is how to identify what ESI (Electronically Stored Information) requires more than typical electronic discovery processing. First, computer...
Recovering Deleted Images
There are three common scenarios in which you may want to recover deleted images: Images accessed from web sites Images downloaded by a user or obtained through file sharing applications Photos stored on a computer hard drive, camera or memory card During a computer...
Encrypted Hard Drive Dangers
You have requested a hard drive clone or image and discover that the contents cannot be culled or reviewed. One reason may be hard drive encryption. Encryption involves ”scrambling” the contents of a file or hard drive so that they cannot be viewed without the...
File Carving – Valuable Remnants Recovered!
Carving files, which can be performed manually or through an automated process, permits the recovery of a portion of a corrupted or deleted file. During a computer investigation, examiners may encounter deleted files that cannot be fully recovered. However, enough of...
Imaging Hard Drives – Will you get what you expect?
If you or a partnering service bureau need to be able to process or review your client’s files from an imaged hard drive, you may be in for a surprise. The results of an imaged hard drive are often stored in a forensic image format or what is referred to as an...
Understanding File Timestamps
The terms, ‘file timestamps’ and ‘file metadata’ are often used interchangeably, however, they can have two completely different meanings. I trust the following will help clarify the differences. 1) There are two separate ‘timestamps’ for office documents and several...
What are File Headers? (Signatures)
Many file types can be identified by using what’s known as afile header. A file header is a ‘signature’ placed at the beginning of a file, so the operating system and other software know what to do with the following contents. Many electronic discovery applications...
Recovering deleted files (3 of 3)
To recover deleted files, user activity logs, Internet history, and other potentially relevant custodian information, a 'physical' copy or forensic image of the hard drive or other media is required. Creating a physical copy or forensic image preserves the entire...
Recovering deleted files (2 of 3)
It often comes as a shock to attorneys and their staff when they hear that electronic discovery processing doesn't automatically search the entire contents of a custodian’s hard drive. So, it’s worth stating again for emphasis here. Common electronic discovery...
Get in Touch with Us
Schedule a FREE demonstration or ask any question. We’d be happy to help.