Skip to content

May 1–2: U.S. Courts CSA IT Conference

San Diego, CA • May 1–2 DriveSavers will be one of only 25 top technology companies at the U.S. Courts CSA IT Conference. The purpose of this event is to provide training to U.S. Courts computer system administrators working in federal defender offices nationwide. Most of the training provided is…

Digital Forensic Process—Presentation

By John Ahearne, Forensic Analyst   This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis In this article, we outline certain digital…

Legal Email Collection

When collecting email evidence for use in litigation, whether it’s criminal or civil in nature, it is imperative that emails be obtained in a lawful, repeatable and defensible manner. If they are not, they may not be admissible in court. Obtaining Emails for Criminal Investigations There are three legal methods…

Digital Forensic Process—Analysis

By John Ahearne, Forensic Analyst This article is part of a series that delves into each step of the digital forensic process. If you missed one of the previous articles, you can read them at the links below: Introduction Identification Preservation/Collection Analysis of Digital Evidence Forensic digital analysis is the…

DVR Examiner User Certification

User Certification Course 3 Day Course December 5-7, 2017 9:00–5:00 DriveSavers, Inc. 400 Bel Marin Keys Blvd. Novato, CA 94949 What is DVR Examiner? DVR Examiner is a software solution for acquiring video and metadata from CCTV DVRs in a forensically sound manner. DVR Examiner eliminates time consuming export processes,…

Legal Technology Moves Into “IoT” Territory

By Bob Mehr, Sr. Legal Services Advisor Technology is changing today’s legal landscape as courts grapple with a wave of electronic evidence coming from places and things that connect to the Internet. This new evidence is from sources we never imagined would be admissible, including smartphones, doorbells, virtual assistants and…

Petya/ExPetr was Data Killer, Not Ransomware

By Michael Hall, Chief Information Security Officer The malware attack that started in Eastern Europe in late June and quickly spread around the globe looks like it was not a ransom attack at all, but an all-out effort to destroy data, according to a security company that examined the program’s…

Back To Top
Search