On November 24, the County of Delaware, Pennsylvania discovered a disruption to portions of its computer network. They commenced an immediate investigation that included taking certain systems offline and working with computer forensic specialists to determine the nature and scope of the event.
read more
For law enforcement, the days of simply asking suspects for their log-in credentials and collecting data from their phones are long gone, as are the days of easily bypassing a passcode.
read more
After a partially unanswered Freedom of Information Act request, the American Civil Liberties Union (ACLU) is suing the FBI to learn more about the federal agency’s Electronic Device Analysis Unit.
read more
The software company SolarWinds unwittingly allowed hackers’ code into thousands of federal computers. A cybersecurity system called in-toto, which the government paid to develop but never required, might have protected against this.
read more
Fakery certainly isn’t a new concept, but in the past few years, the phenomenon of the deepfake has taken the practice of disinformation to a whole new—and often scary—level.
read more
When lawful or consent-based access has been secured, if you’re confronted with devices using file-based encryption and you really need that data, there are workflows that allow your encrypted-device experts to take their best swing accessing the device.
read more
The purpose-built facility is the first of its kind in Australia and enables officers to securely conduct investigations into sophisticated technology-enabled crime.
read more
In spite of modern difficulties, there are successful best practices and technologies for law enforcement agencies to deploy in terms of lawfully collecting digital intelligence (DI) from desktop and laptop computers.
read more
The newly created role of Commissioner is to support and promote the adoption of lawful, effective and ethical practices in relation to biometric data in a policing and criminal justice context.
read more
Wounded, ill or injured veterans are being trained and hired as computer forensic analysts to assist HSI in those investigations through the HERO Corps Program.
read more
Delp has worked on video tampering as part of a larger research into media forensics, focusing on sophisticated techniques based on artificial intelligence and machine learning to create an algorithm that detects deepfakes.
read more
Version 7.0 expands the ability to perform full file system extraction without the need to install a jailbreak, adding support for recent versions of iOS including iOS 14 through 14.3 on all devices including the current iPhone 12 range.
read more
Scientists have spent the last few months creating a novel facial reconstruction of a mysterious mummy, now skeletonized, from tomb KV 55 in the Valley of the Kings.
read more
By using the UK as a case study, the paper reveals the explicit connection between governmental policy announcements and cyber-crime campaigns.
read more
The interns will have law enforcement powers while on duty under the supervision of a law enforcement officer. They will help law enforcement recover and review evidence from digital devices for investigations and prosecutions in Vigo County.
read more