Are You Prepared to comply with the Supreme Courts latest ruling?

The Supreme Court recently ruled that a warrant must be obtained before searching any cell phone; But, What do you do if the phone is remotely wiped BEFORE you obtain the warrant? The possibility of this happening makes it ESSENTIAL that you have faraday bags with you to isolate the phone and eliminate the risk of losing all of the data/evidence on the phone…most importantly, to eliminate the … [Read more...]

Forensic Store is Hard at Work for the Army

We are very busy at the Forensic Store this week. The Army contacted us requesting 10 Cell Phone Companion Kits: 5 D.A.R.T. and 5 Kasemanager (HTCI's Military Data Analysis tool) Bags. In theater, it is imperative that examiners have the right tools on hand, without carrying bulky or heavy equipment. These kits contain everything a Mobile Forensic Examiner needs both in the field and in the lab, … [Read more...]

Taking Down Child Prostitution Rings

DFI News featured an amazing article on Monday detailing the rescue of 105 underage prostitutes, ranging in age from 13-17, during a 76 city-sweep over 3 days. During this operation, law enforcement arrested 150 pimps and saved countless other minors from a future of prostitution. This effort was part of a decade long project by the FBI, resulting in the rescue of “2,700 children since 2003. … [Read more...]

Using Isolation Bags to Keep Your Car Safe

  Back in November, we talked about how Isolation Bags worked with a little help from our friends at Top Gear Basically, a Faraday or Isolation bag stops radio waves from reaching whatever is inside. For law enforcement, these bags are integral in mobile device seizures because they maintain the integrity of the device. Without these bags, … [Read more...]

The Boston Marathon: How Smartphones are Changing Investigations

In the days following Monday’s Boston Marathon bombing, the world has witnessed how technology has changed the investigation process.  The goals remain the same: find the person(s) responsible and bring justice to the 3 people who lost their lives and the 144 who were injured. The scene was likened to a war zone and the injuries to those caused by IEDs. So how do authorities find and prosecute the … [Read more...]

Top 10 Cybersecurity Challenges for 2013

In 2013, Cybersecurity has become a top global priority. According to the White House, the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and “America's economic prosperity in the 21st century will depend on cybersecurity.” As individuals, world businesses, and governments move towards mobile technology, social media, and Cloud based … [Read more...]

NFSTC’s CSI Night 2013: VIP Event Highlighted Forensic Technology

On Wednesday, February 27, National Forensic Science Technology Center (NFSTC) hosted CSI Night 2013, bringing together business and technology leaders, law enforcement, and military personnel from around Tampa Bay. Guests at this invitation only event at the Largo facilities got a behind-the-scenes look at technology advancements impacting today’s forensic science industry. A Technology … [Read more...]

The NSA’s Preemptive Strike Against Chinese Hackers

The necessity for cyber security has increased worldwide, especially since China will be the world's most sophisticated hacker of foreign companies, states Google chief Eric Schmidt. His new book 'The Digital Age' co-written by Jared Cohen, who manages Google Ideas, confirms Schmidt's theories about China's hacking abilities. A recent report tying the Chinese military to computer attacks … [Read more...]