Computer and Mobile Forensics Expert Witness
Trace Digital Forensics, LLC
Bakersfield, California 93314
► Contact Expert Witnesses for These Areas of Expertise
Steven Alexander has examined computers and mobile devices in response to civil and criminal proceedings, computer misuse investigations, security incidents, and e-discovery requests. He has over twenty years of experience in information technology and has worked as a programmer, network engineer, IT director, and IT security director. He has multiple publications and has presented at several conferences and workshops. He was a charter member of the (California) Central Valley High Technology Crime Investigation Association.
B.S.
Areas of Expertise
- Cell Phone
- Computer Crime
- Computer Forensics
- Computer Security
- Cybersecurity
- Data Communication
- Data Recovery
- Digital Forensics
- Electronics
- Information Security
- Information Technology
- Mobile Devices
- Network Forensics
Articles Published by Trace Digital Forensics, LLC
What Is Computer Hacking?
With the recent Van Buren decision, the Supreme Court limited the scope of the Computer Fraud and Abuse Act and brought it more in line with what security experts would understand to be "hacking". But, what does that mean?
Read Article
Understanding NCMEC CyberTipline Reports
Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing and Exploited Children (NCMEC). Both prosecutors and defense attorneys should be familiar with these reports and the information they can contain.
Read Article
Computer Forensics and Sentencing Criteria in Child Pornography Cases
In child pornography cases, attorneys often rely on computer forensic examiners to look for evidence that a suspect or defendant possessed or shared contraband material. The sentencing criteria in these cases can be complex so it is important that attorneys convey to the examiner what to look for and how to report it.
Read Article
Identifying a Person Using an IP Address
Cases such as copyright violations, computer hacking, and distribution of child pornography often involve using an individual's IP address to identify them. But, what is an IP address and how reliable are they at identifying individuals?
Read Article
Understanding Deleted Files and What They Mean
Attorneys who need to read and understand reports by computer forensics professionals and/or who need to present recovered files as evidence should understand how files are stored on computers and mobile devices, what happens when they are deleted, how they can be recovered, and know the limits on file recovery.
Read Article