In this increasingly digital world, computers and mobile phones allow us to complete a range of processes wherever we are in the world, such as checking our bank balance, uploading photographs and chatting with our friends. Unfortunately, there are some individuals who illegally take advantage of this technology, using it to aid them in a … Continue reading New Era of Computer Forensics to Data Recovery Easily
Let’s put this simply to begin: you don’t want your children to search the deep web or dive in the dark net. These would be, generally speaking, bad things. In recent years, though, it’s gotten progressively easier to hide on the dark web. The code for The Onion Router (TOR) is getting a revamp in 2017, … Continue reading Mamas, don’t let your babies grow up to be criminals
Sometimes I get asked what software I use most in computer forensics. I promise I’m not a paid spokesperson here, but I’m a big fan of AccessData’s Forensic Toolkit (FTK). I’ve been using different versions since about 2001, and I consider it the primary workhorse in my forensic tool arsenal. The current version is 6.1, … Continue reading Why I like Forensic ToolKit (FTK)
On January 26, 2017, I testified in Federal court as an expert witness for the defense in a case. The testimony was regarding The Onion Router (TOR), Dark Net, and Playpen. The case involved Network Investigative Technique (NIT); the FBI had engaged in their Operation Pacifier, wherein, a Search and Seizure Warranted allowed FBI to seize … Continue reading Do users have a reasonable expectation of privacy on TOR?
I frequently get asked to find Spyware on Android phone devices. While I’m not normally one to turn down business, these cell phone forensic searches are expensive — they start at $2,500 per phone plus an eight percent sales tax — and oftentimes, they don’t turn up much. People are usually not spying on you … Continue reading Why should you know about Spyware on Android devices?