Blog

  This may not be a DIY project. The past few years have seen some famous cases of government officials destroying, or otherwise losing, emails and text messages. Some famous cases come to mind including one involving a presidential candidate as well as those of high ranking...

Many of today's larger computer systems are using Unix based operating systems. It's mostly due to lower cost. It has a reputation for being more secure than Windows, but this does not mean that it can't be hacked. In fact, the infamous computer intrusion involving...

Private investigators who also do digital forensics are often asked to look at electronic devices such as computers or cell phones. Why is this done? It's because there is no better way to find out what is going on inside the mind of another person...

In a University of Washington study, titled "Using Ad Targeting for Surveillance on a Budget," they created a mobile banner ad and a website. Next, they purchased advertising from companies like Facebook and Google that sell advertising based on the geographical location the ad appears, which...

The rules pertaining to electronic evidence used in federal courts may be changing soon.   What is important is this proposed change which states: "Data copied from an electronic device, storage medium, or file, if authenticated by a process of digital identification, as shown by a certification...

Retired FBI Special Agent John Cauthen has joined TEC Inquiries, Inc. as an investigator.  He specializes in computer and electronic investigations.  You can see his resume here: He spent the last two years in the FBI Tampa Field office where he served as the CART Coordinator. (CART...