Digital Forensics

The U.S. Department of Justice has issued a search warrant for internet records possessed by web hosting service DreamHost regarding a 2017 Inauguration Day protest website, after about 200 were arrested in relation to the Jan. 20 event. DreamHost...
Associate Editor
|
12:44pm
8.16.2017
When drug users go online for the first time to buy opioids, they aren't looking for the widest selection or the best prices for their illicit purchases, a new study suggests. Researchers found that first-time drug buyers who visited one marketplace...
by Ohio State University
9:21am
8.16.2017
Advertisement
A 26-year-old man is in custody in California in a "sextortion" case, after he was hunted by federal authorities for allegedly making cyber threats to girls, producing child pornography and threatening to use explosive devices at Indiana schools,...
by Will Gretsky and Emily Shapiro, ABC News
12:39pm
8.8.2017
The U.S. Army banned the use of drones made by the Chinese company DJI last week, apparently in response to the load of hackable data the machines collect and store. This morning, a University of New Haven team demonstrates exactly how such common...
Senior Science Writer
|
12:14pm
8.7.2017
Police in New York state may soon have a high-tech way of catching texting drivers: a device known as a textalyzer that allows an officer to quickly check if a cellphone has been in use before a crash.
by David Klepper, Associated Press
8:55am
7.27.2017
Advertisement
Authorities from the U.S. and Europe announced Thursday that they had taken down illegal dark web marketplaces AlphaBay and Hansa, but not before using the latter site as bait to collect information on users attempting to buy and sell drugs, fake...
Associate Editor
|
12:32pm
7.25.2017
The explosion of smartphones and apps, and the growing size of computer hard drives has created a glut of evidence for investigators in recent years. But all of that data is swamping the computer forensic units at the Maryland State Police and other...
by Amanda Iacone, WTOP
11:15am
7.18.2017
Recent reports that the smart home device and voice recognition assistant Alexa called 911 during a domestic abuse incident, whether accurate or not, have generated some interest in the potential for smart devices to intervene in domestic violence...
Associate Editor
|
12:58pm
7.14.2017
Advertisement
The Australian government on Friday proposed a new cybersecurity law to force global technology companies such as Facebook and Google to help police by unscrambling encrypted messages sent by suspected extremists and other criminals.
by Rod McGuirk, Associated Press
9:22am
7.14.2017
A team of international investigators brought to Mexico to unravel one of the nation’s gravest human rights atrocities was targeted with sophisticated surveillance technology sold to the Mexican government to spy on criminals and terrorists,...
by Azam Ahmed, New York Times
10:33am
7.10.2017
Advertisement
Advertisement
A website that hosted an "Abduction 101" forum linked to a 28-year-old suspect in the kidnapping of a Chinese scholar at the University of Illinois bills itself as the most popular sexual fetish networking site on the internet—and it has faced...
by Michael Tarm, Associated Press
10:49am
7.3.2017
Federal agents persuaded a judge to issue a warrant for a Microsoft email account they suspected was used for drug trafficking. Microsoft said the emails were on a server in Ireland and beyond the warrant's reach. A federal appeals court agreed....
by Mark Sherman, Associated Press
9:32am
7.3.2017
Advertisement
The hashtags, pictures and quickly tossed off 140-character missives of Twitter could alert police to breaking crises, like riots, before even 911 can raise the alert, according to a new study. A complex machine-learning algorithm picks up...
Senior Science Writer
|
12:42pm
6.27.2017
The University of New Haven has set up what it envisions to be the major hub to connect cyber forensics teams the world over: the Artifact Genome Project. Artifacts are traces of digital history that could tell investigators a story of crime.
Senior Science Writer
|
12:37pm
6.20.2017
For those selling counterfeit versions of luxury brand name goods, their dream counterfeit domain name is just a few clicks away. A recent research report delves into the prevalence and nature of fraudulent domains and how easy it can be to obtain...
Associate Editor
|
1:34pm
6.16.2017
Advertisement
The grave of an 8-year-old Ohio boy who killed himself in January after his mother said he was bullied at school was opened to remove a computer tablet for prosecutors investigating his suicide, authorities said Wednesday.
by Lisa Cornwell, Associated Press
10:06am
6.8.2017
An international team of researchers has uncovered the mechanism that allowed Volkswagen to circumvent U.S. and European emission tests over at least six years before the Environmental Protection Agency put the company on notice in 2015 for...
by University of California-San Diego
9:29am
5.24.2017
Some archivists are experimenting with a new computer called FRED, or Forensic Evidence Recovery Device. It's similar to what police use when handling digital evidence in suspected crimes. Archivists, like police, must ensure that nothing is altered...
by Blair Sanderson, CBC News
11:26am
5.22.2017
Advertisement
Former U.S. Rep. Anthony Weiner, whose penchant for sexting strangers ended his political career and led to an investigation that upended the presidential race, pleaded guilty Friday to criminal charges in connection with his online communications...
by Larry Neumeister and Tom Hays, Associated Press
12:18pm
5.19.2017
Attorneys squared off in a New Jersey court Friday over access to an ex-Rutgers football player's cellphone, as the judge weighed a motion that could affect more than a dozen other cases connected to the string of alleged armed robberies.
by Craig McCarthy, NJ.com
9:44am
5.17.2017
Advertisement
Advertisement
Using data from personal devices to solve crimes and help protect the public is both an area of great debate and rapid advances. Even if such data can help solve crimes, should it be made available for that purpose? How much of a modern citizen’s “...
by Brian A. Jackson
11:25am
5.11.2017
A child webcam sex abuse bust in April revealed one of the darkest corners of the internet, where pedophiles in the U.S., Canada, Europe and Australia pay facilitators on the other side of the world to sexually abuse children, even babies, directing...
by Martha Mendoza and Jim Gomez, Associated Press
12:28pm
5.9.2017
Advertisement
The U.S. Department of Justice has begun a criminal investigation into Uber Technologies Inc's use of a software tool called "Greyball" that helped its drivers evade local transportation regulators, sources say.
by Dan Levine and Joseph Menn, Reuters
12:30pm
5.5.2017
Family members of San Bernardino terror attack victims sued Facebook, Google and Twitter, accusing the companies of providing platforms that help the Islamic State group spread propaganda, recruit followers and raise money.
by Associated Press
11:24am
5.5.2017
The creator and head administrator of a dark web child pornography site known as “Playpen” has been sentenced to 30 years in prison, after being found guilty in September 2016 on multiple child pornography and exploitation charges.
Associate Editor
|
12:39pm
5.2.2017
Advertisement
Inmates at a federal prison in New Jersey have been swapping child pornography while behind bars, using smuggled cellphones, data cards and the dark web, authorities said Wednesday. Videos and photos were downloaded and stored on a "cloud" that the...
by Tracy Connor, NBC News
12:41pm
4.28.2017
As far as witnesses go, the 21st century is producing some interesting ones. First, recordings from an Amazon Echo were used in an Arkansas murder case, and now, police in Connecticut have used a woman’s Fitbit data to disprove her husband’s version...
11:26am
4.26.2017
An Ohio man pleaded guilty to circulating a “kill list” of U.S. military members—calling for jihadi violence on American soil. Terrence J. McNeil, 24, will face 15-20 years in federal prison for reposting the solicitations of violence on Tumblr.
Senior Science Writer
|
12:26pm
4.20.2017
Advertisement
Banks occupy a unique position when it comes to intercepting crimes, such as drug and human trafficking. In the past few years, artificial intelligence has emerged as a solution to help banks zero in on transactions that herald criminal activity.
Associate Editor
|
12:25pm
4.13.2017
A Pennsylvania man who assumed the identity of a baby who died in Texas in 1972 has been arrested on charges of Social Security fraud and aggravated identity theft after the baby's aunt discovered the ruse on Ancestry.com.
by Joe Mandak, Associated Press
9:10am
4.13.2017
Advertisement
Advertisement
In the debut of our new cybercrime column, we will be looking at the Michaud case—an interesting example of a part of the web many have never heard of, and how law enforcement entities are dealing with criminals who dwell in the internet’s deepest...
Associate Editor
|
10:06am
3.27.2017
A Maryland man has been indicted in Texas on a hate-crime charge after a Twitter message containing a strobing GIF induced a seizure in a Newsweek reporter who has epilepsy. A grand jury described a tweet and GIF in the case as a “deadly weapon.”
by CBS/AP
11:38am
3.23.2017
Advertisement
A U.S. appeals court has rejected a fired police sergeant's stance that forcing him to unlock his encrypted computer files in a child porn investigation would violate his constitutional rights. The former officer has been jailed for 18 months for...
by Maryclaire Dale, Associated Press
9:26am
3.23.2017
A pilot program called E-Responder, which de-escalates youths’ virtual vendettas before they turn into real-life violence, will now expand to an additional 18 sites across New York City. Last year, the Crime Commission trained 26 anti-violence...
12:16pm
3.21.2017
Google says it will fight a search warrant seeking information about anyone who searched the name of a financial crime victim on the search engine in December and early January. Police in Edina, Minnesota, told the judge they found that a fake photo...
by Debra Cassens Weiss, ABA Journal
9:22am
3.21.2017
Advertisement
A new set of filters improving the ability to comb through terabytes of data and hundreds of thousands of hours of video is now under development by computer scientists, and may help law enforcement identify child pornography more efficiently.
Senior Science Writer
|
12:00pm
3.16.2017
Facebook is in the process of implementing new suicide prevention tools, including streamlined reporting on its Facebook Live application, in the wake of two suicides livestreamed from the platform earlier this year.
Associate Editor
|
12:36pm
3.2.2017
The Supreme Court must decide whether a law banning sex offenders from Facebook, meant to prevent communications between sex offenders and minors via social media, is so broad that it violates the Constitution's free-speech protections.
by Emery P. Dalesio. Associated Press
9:14am
2.27.2017
Advertisement
The Amazon Echo voice-responsive device in the home where a body was found floating in a hot tub may be a potential witness to the homicide. But Amazon has filed a motion to dismiss a warrant for the device's recordings, citing the First Amendment.
Senior Science Writer
|
12:13pm
2.24.2017
Emails stored on servers beyond U.S. borders are still subject to searches domestically, according to a recent court decision. The federal magistrate sided with the FBI against Google, who had only partially complied with two search warrants in an...
Senior Science Writer
|
12:27pm
2.15.2017
Advertisement
Advertisement