Blog
Electronic Waste and Recycling – What Your Old Devices Can Say About You
by Natalie Miller, 2019 With new models of phones and computers being released every year, wanting the latest and greatest is never a bad thing, but what about your old devices? The truth is that old devices can still hold all of the data you put on them or that they...
The Case of The Client Who Wanted … to be Wanted
The Case of The Client Who Wanted … to be Wanted copyright Steve Burgess, 2018 It was nearly Christmas, but the morning sun was pouring in through the windows of my Central Coast office, casting shoe-shaped shadows on the West side of my desk. Perhaps I should have...
Burgess Forensics Newsletter Vol. 5 Issue 1: FitBit Fun Forensics & Foes 08.08.2018
Fitbit, Fun, Forensics, and Foes Have you tracked your 10,000 steps today? Has anyone else tracked them? Fitness trackers are big business, helping people get and stay fit, and helping them share their progress with friends – and sometimes with strangers. The...
The Rise of Cybercrime and How to Prevent It
The Rise of Cybercrime and How to Prevent It (guest article contributed by Josh Wardini, of Webmastersjury.org) As people are leaning more and more towards the digital world, cybercrime is becoming an issue that cannot be ignored. Although many individuals and...
Fitbit, Fun, Forensics, and Foes
Fitbit, Fun, Forensics, and Foes by Steve Burgess, 2018 Have you tracked your 10,000 steps today? Has anyone else tracked them? Fitness trackers are big business, helping people get and stay fit, and helping them share their progress with friends - and sometimes with...
The Case of the Deadbeat Beauty
Not everything always works out in Forensicland. Sometimes we strike out. In more ways than one. I was gazing out the tall windows of my office at the blue, blue Santa Barbara sky, with nary a cloud in sight. It was my 50-something birthday. The bills were ignored. It...
How to Avoid Being Hacked, Part 2 – Two-Factor Authentication
Multi-factor authentication (MFA) makes it much harder for a hacker to get access to your online stuff, and the most common form of consumer MFA is two-factor authentication (2FA). A very common form of 2FA is the debit card. One factor is the card itself, which...
How to Avoid Being Hacked, Part 1 – Email
How to Avoid Being Hacked, Part 1 - Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online data is...

Keyword Searches
Computer Forensics Expert Steve Burgess explains keyword searches - what they are, how to design an effective search, and differences between electronic data discovery (EDD) and computer forensics.
Data Recovery Myths and Misconceptions
In the very early 80's, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data recovery...