Cybercrime is the crime committed by using the computer on the internet. The Internet is being utilized for committing a serious and heinous crime. The scope is very vast because these crimes are committed at the large scale to discourage the military of a country and at the same time, these crimes are able to … Continue reading How to Benefit From Cyber Forensic Services?
In this increasingly digital world, computers and mobile phones allow us to complete a range of processes wherever we are in the world, such as checking our bank balance, uploading photographs and chatting with our friends. Unfortunately, there are some individuals who illegally take advantage of this technology, using it to aid them in a … Continue reading New Era of Computer Forensics to Data Recovery Easily
Let’s put this simply to begin: you don’t want your children to search the deep web or dive in the dark net. These would be, generally speaking, bad things. In recent years, though, it’s gotten progressively easier to hide on the dark web. The code for The Onion Router (TOR) is getting a revamp in 2017, … Continue reading Mamas, don’t let your babies grow up to be criminals
Sometimes I get asked what software I use most in computer forensics. I promise I’m not a paid spokesperson here, but I’m a big fan of AccessData’s Forensic Toolkit (FTK). I’ve been using different versions since about 2001, and I consider it the primary workhorse in my forensic tool arsenal. The current version is 6.1, … Continue reading Why I like Forensic ToolKit (FTK)
On January 26, 2017, I testified in Federal court as an expert witness for the defense in a case. The testimony was regarding The Onion Router (TOR), Dark Net, and Playpen. The case involved Network Investigative Technique (NIT); the FBI had engaged in their Operation Pacifier, wherein, a Search and Seizure Warranted allowed FBI to seize … Continue reading Do users have a reasonable expectation of privacy on TOR?