Advertisement
Network Forensics
Subscribe to Network Forensics

The Lead

The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigatio

Digital Forensics Can Use Facebook to Solve Cases

December 4, 2014 9:44 am | by Brett Harrison and Chad McDonnell, Baseline | News | Comments

The theft of trade secrets in U.S. businesses is increasing rapidly and is expected to double within the next decade, according to a recent report. These incidents and other suspicious behavior are the catalyst for lengthy, expensive forensic investigations. Digital forensic investigators will seek evidence from a wide array of devices and data sources, including mobile devices.

12-year-old's Online Life Leads to Abduction

November 21, 2014 11:00 am | by Sean Gallagher, Ars Technica | News | Comments

On November 10, a 12-year-old girl left her home in the Baltimore suburb of Nottingham at 7:30am...

Open Whisper Systems Helps WhatsApp Achieve End-to-end Encryption

November 18, 2014 12:22 pm | by Zeljka Zorz, Help Net Security | News | Comments

The immensely popular Whatsapp instant messenger has the potential to become an even more...

ISIS Keeps Getting Better at Avoiding US Surveillance

November 18, 2014 12:14 pm | by Pierluigi Paganini | Blogs | Comments

ISIS members have proven exceptionally difficult to track due a proper use of technology tools,...

View Sample

SUBSCRIBE TO FREE DFI News EMAIL NEWSLETTER

In its statement on Monday night, Anonymous explained that through the Klan's Twitter account, it obtained large amounts of information on multiple white supremacists, and "members of Anonymous who seized the account are continuing to debate if the identi

Anonymous Statement: KKK is a Terrorist Group, KKK Responds Poorly

November 18, 2014 11:48 am | by Violet Blue | Blogs | Comments

In its statement on Monday night, Anonymous explained that through the Klan's Twitter account, it obtained large amounts of information on multiple white supremacists, and "members of Anonymous who seized the account are continuing to debate if the identities of the people associated with the Klan's account should be released to the public."

Investigators recently set out to consider whether homicides involving social networking sites were unique and worthy of labels such as 'Facebook Murder', and to explore the ways in which perpetrators had used such sites in the homicides they had committe

Is there such a thing as 'Facebook Murder'?

November 14, 2014 11:37 am | by Wiley | News | Comments

Investigators recently set out to consider whether homicides involving social networking sites were unique and worthy of labels such as "Facebook Murder," and to explore the ways in which perpetrators had used such sites in the homicides they had committed.

Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.

UK Spy Chief Says Terrorists Grow Networks with Social Media

November 4, 2014 10:22 am | by Guy Faulconbridge, Reuters | News | Comments

Twitter and Facebook are so important to militant groups that the U.S. technology giants should give security services greater access to allow Western governments to foil attacks, the head of Britain's eavesdropping agency said.      

Advertisement

How to Collect Internet Evidence

October 22, 2014 8:00 pm | Articles | Comments

The courts have generally accepted evidence collected from the Internet as long as its authenticity can be established. Commonly accepted digital forensic methodologies can all be used to identify a three-pronged approach to Internet forensics.

Investigator Turns Eyewitness

October 20, 2014 8:21 pm | by Benjamin Wright | Articles | Comments

In today’s world of social media, investigators are taking on a new role; they are becoming a form of eyewitness. As the eyewitness, an investigator observes evidence that might not be visible to any other available investigator. The investigator is wise to create a record of what he or she sees at any particular point in time, including print outs of screenshots.  

Social Media No Help in Bank's Cyber Crime Fight

October 15, 2014 10:47 am | by Steve Slater, Reuters | News | Comments

Banks are fighting an uphill battle to protect themselves and their client accounts from cyber attacks, and the sometimes careless use of social media by customers and staff isn't making the fight any easier.           

Snapsaved.com Claims Hackers Stole Snapchat Images

October 14, 2014 10:25 am | by Reuters | News | Comments

Snapsaved.com, a website which allows users to save images sent via Snapchat, claims that hackers had breached its servers and made off with some 500 megabytes of photographs.                     

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.

Another Game Developer Flees Her Home Following Gamergate Death Threats

October 14, 2014 9:32 am | by Lisa Vaas | Blogs | Comments

US-based game developer Brianna Wu was driven from her home over the weekend after a troll posted her address online and threatened to rape, kill and mutilate her. This situation came about because of the Gamergate controversy.       

Advertisement
Dogs have been trained to pick up the scent for laptops, digital cameras and   those easy-to-conceal USB drives. Devices such as these are often used to   stash illegal materials like child pornography, which the FBI says is growing   fast.

Police Dog Can Smell a Hidden USB Drive

September 24, 2014 10:56 am | by Kristen Schweizer, Bloomberg | News | Comments

Dogs have been trained to pick up the scent for laptops, digital cameras and those easy-to-conceal USB drives. Devices such as these are often used to stash illegal materials like child pornography, which the FBI says is growing fast.     

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.

Australian Spies Track Terror Threats on Social Media

September 22, 2014 10:12 am | by Philip Dorling, The Sydney Morning Herald | News | Comments

Australia's peak intelligence agency is stepping up its analysis of terrorist threats, including scouring social media to track extremist propaganda and recruitment efforts.                      

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said he was watching the media-savvy group's cyber capabilities.

NSA Monitoring Tech-savvy Islamic State

September 17, 2014 11:41 am | by Donna Chiacu, Reuters | News | Comments

As U.S. military leaders outlined their strategy before Congress to fight Islamic State militants on the battlefield, the National Security Agency chief said on Tuesday he was watching the media-savvy group's cyber capabilities.      

Digital Clues Leading the Hunt for ISIS Killer

August 22, 2014 9:52 am | by Jill Lawless, Associated Press | News | Comments

The Islamic militant in a video showing the death of American journalist James Foley took great care to disguise his identity, dressing head-to-toe in black, with a mask leaving only his eyes visible. But police and intelligence services in Britain and the United States have a plethora of clues as they scramble to identify him, from image analysis and voice-recognition software to social media postings and testimony from former captives.

In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.

Good Bot, Bad Bot? 23M Twitter Accounts are Automated

August 14, 2014 10:13 am | by Lisa Vaas | Blogs | Comments

In its latest quarterly filing to the Securities and Exchange Commission (SEC), Twitter broke down its user base, saying that up to 8.5 percent of its monthly active users — about 23 million — are automatons.           

Advertisement

Stalking Predators Online Stresses Cyber Cops

July 28, 2014 11:11 am | by Maya Lau, The Times | News | Comments

To string along suspected sex offenders, Bryan Montgomery carries out intimate conversations with them — sometimes lasting a year — while posing as a juvenile on social media. The job brings psychological stress, which Montgomery acknowledges. 

Russia Caught Editing Wikipedia Entry about MH17

July 21, 2014 10:31 am | by Kadhim Shubber, Wired UK | News | Comments

Thanks to a Twitter bot that monitors Wikipedia edits made from Russian government IP addresses, someone from the All-Russia State Television and Radio Broadcasting Company (VGTRK) has been caught editing a Russian-language Wikipedia reference to MH17 in an article on aviation disasters.

The Dangers of Social Media in the Military

July 21, 2014 9:59 am | by Lance Cpl. Tyler Giguere, DVIDS | News | Comments

Common tactics of social media extortionists include relating to a service member’s interests and posting pictures of attractive females to lure them into chats. What may seem like a normal person wanting to video chat or meet with a Marine, can actually be an extortionist trying to deceive him for his money or information.

Police Dog Sniffs Out Child Porn Hard Drives

July 8, 2014 9:54 am | by Katie Mulvaney, Providence Journal | News | Comments

Rhode Island state police, through an Internet task force, are taking a new approach to finding those that traffic in child pornography. The recent arrival of golden Labrador Thoreau makes Rhode Island the second state in the nation to have a police dog trained to sniff out hard drives, thumb drives and other technological gadgets that could contain child pornography.

When Does Virtual Crime Become An Actual Crime?

July 2, 2014 8:18 am | News | Comments

In his mind and online persona, Gilberto Valle left little doubt about the depths of his depravation: In communications over the Internet, he imagined subjecting women he knew to sex-related torture and, in some cases, murder and cannibalism. However, the judge concluded that Mr. Valle’s Internet plotting had been “fantasy role play” and was not evidence of an actual crime.

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.

Burglar Fails to Log Off Facebook

June 27, 2014 1:17 pm | by Marino Eccher, Pioneer Press | News | Comments

A South St. Paul burglar effectively updated his status to "busted" when he logged into Facebook on a computer in the home he is accused of breaking into, prosecutors say.                       

Complaints originating from social media make up "at least half" of calls passed on to front-line officers

Social Media Calls Passed to Front-line Police in UK

June 24, 2014 12:43 pm | by Keith Moore, BBC | News | Comments

Complaints originating from social media make up "at least half" of calls passed on to front-line officers, a senior officer has told the BBC.                               

Investigators, lawyers and forensic analysts who handle child-pornography cases

Haunted Digital Investigations

June 19, 2014 12:40 pm | by Jason Nark, Philadelphia Daily News | News | Comments

No matter what they do to decompress, the investigators, lawyers and forensic analysts who handle child-pornography cases say they can't outrun the first image they saw on the job, let alone the thousands of other horrors their eyes and ears have witnessed.

Network investigations can be far more difficult than a typical computer examination

Network Investigations

June 19, 2014 12:16 pm | by Gary C. Kessler and Matt Fasulo | Articles | Comments

Network investigations can be far more difficult than a typical computer examination, even for an experienced digital forensics examiner, because there are many more events to assemble in order to understand the case and the tools do not do as much work for the examiner as traditional computer forensics tools.

Vegas Police Killer's Video and Social Media Investigated

June 11, 2014 11:52 am | by Michelle Rindels and Justin Pritchard, Associated Press | News | Comments

Investigators in Las Vegas are studying YouTube videos and a range of other social media posts by Jerad Miller, as they try to untangle what led him and his 22-year-old wife to gun down two police officers and a civilian before taking their own lives.

Getting Smart about Fighting Cyber Crime

June 11, 2014 11:46 am | by Caitlin Dawson, Simon Fraser Univ. | News | Comments

When Ashleigh Girodat collects her BA in criminology in June she will have already made her mark in the fight against cyber crime. As part of a research team at SFU’s International Cybercrime Research Centre, Girodat analyses data from a web crawler that scans the open web for child-exploitation content.

Facebook Stupidity Leads to Largest Gang Bust in NYC History

June 9, 2014 10:27 am | by Lisa Vaas | Blogs | Comments

It was a long trail of quite helpful Facebook postings about crimes that lead New York City police to what authorities are calling "the largest gang takedown in New York City's history."                  

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading