On November 24, the County of Delaware, Pennsylvania discovered a disruption to portions of its computer network. They commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event.
read more
For law enforcement, the days of simply asking suspects for their log-in credentials and collecting data from their phones are long gone, as are the days of easily bypassing a passcode.
read more
After a partially unanswered Freedom of Information Act request, the American Civil Liberties Union (ACLU) is suing the FBI to learn more about the federal agency’s Electronic Device Analysis Unit.
read more
The software company SolarWinds unwittingly allowed hackers’ code into thousands of federal computers. A cybersecurity system called in-toto, which the government paid to develop but never required, might have protected against this.
read more
Fakery certainly isn’t a new concept, but in the past few years, the phenomenon of the deepfake has taken the practice of disinformation to a whole new—and often scary—level.
read more
When lawful or consent-based access has been secured, if you’re confronted with devices using file-based encryption and you really need that data, there are workflows that allow your encrypted-device experts to take their best swing accessing the device.
read more
The purpose-built facility is the first of its kind in Australia and enables officers to securely conduct investigations into sophisticated technology-enabled crime.
read more
In spite of modern difficulties, there are successful best practices and technologies for law enforcement agencies to deploy in terms of lawfully collecting digital intelligence (DI) from desktop and laptop computers.
read more
The newly created role of Commissioner is to support and promote the adoption of lawful, effective and ethical practices in relation to biometric data in a policing and criminal justice context.
read more
Wounded, ill or injured veterans are being trained and hired as computer forensic analysts to assist HSI in those investigations through the HERO Corps Program.
read more