×

Warning

JUser: :_load: Unable to load user with ID: 1546
JUser: :_load: Unable to load user with ID: 1536
JUser: :_load: Unable to load user with ID: 1535
JUser: :_load: Unable to load user with ID: 1515
JUser: :_load: Unable to load user with ID: 1507
JUser: :_load: Unable to load user with ID: 1506
JUser: :_load: Unable to load user with ID: 1503
JUser: :_load: Unable to load user with ID: 1488
JUser: :_load: Unable to load user with ID: 1487
JUser: :_load: Unable to load user with ID: 1486
JUser: :_load: Unable to load user with ID: 1483
JUser: :_load: Unable to load user with ID: 1473
Cases & Arrests

Cases & Arrests (12)

"Without digital forensics, it would be hard to get a conclusion in a lot of cases," said Walsh, who noted the very nature of modern communications makes the work of the FBI more challenging. "Suspects aren't talking on the phone anymore and our technical techniques are not working as well because so much more is encrypted. I pull in the NJRCFL very early in my investigative strategy."

Read more https://www.bignewsnetwork.com/news/262057346/3-supporters-of-islamic-state-nailed-in-us-by-digital-evidence

 McClaren, 34, was also found to be in possession of thousands of indecent images of children when his laptop and mobile were seized and examined by police.

Read more

A teenager computer genius who made more than £400,000 by selling stolen personal data and his services as a hacker was jailed for 20 months today.

Elliott Gunton, 19, who did not have a proper job, used his skills to make the fortune in cryptocurrency from his family home in Norwich, Norfolk.

Read more https://www.dailymail.co.uk/news/article-7364717/Norwich-computer-genius-19-jailed-20-months-making-400-000-hacking.html

Police at the scene noticed that the digital display built into the dashboard of Emery’s vehicle showed her phone lost its connection to the vehicle. Forensic analysis of the phone and car showed that 60 seconds before the crash, she sent a text message, then she tried to call “919,″ according to court documents.

Read more https://www.pennlive.com/news/2019/08/police-say-a-lancaster-womans-texting-cause-her-to-fatally-hit-bicyclist.html

Glen Dale police Chief Edward Vogler said they’re still working to run forensic diagnostics on Maroney’s phone to show past phone calls, voicemails and text messages.

“It’s a new phone and the equipment we have isn’t capable of doing that,” Vogler said. “We’re in the process of finding someone with the equipment capable of doing that.”

Read more http://www.theintelligencer.net/news/top-headlines/2019/08/police-sen-mike-maroneys-cell-phone-linked-to-accused-glen-dale-prostitute/

Ghassan Al-Naami faces charges of possession and transmission of child pornography. A number of his computers and electronic devices were also seized and analyzed.

Read more https://edmontonsun.com/news/crime/edmonton-pediatrician-facing-child-pornography-charges/wcm/af5bc9e8-151d-4f8a-8742-6ec3205921c3

In a memorandum filed ahead of a detention hearing, rescheduled from Thursday to Aug. 22, the U.S. Attorney's Office in Seattle said servers found in Thompson's bedroom contained data stolen from more than 30 unnamed companies, educational institutions and other entities.

Read more https://www.cbsnews.com/news/capital-one-data-breach-suspect-paige-a-thompson-may-have-hacked-more-than-30-other-organizations/

An HSI computer forensics analyst forensically examined the digital evidence and discovered thousands of images of child pornography, including the images that depict Hassan, whose face is visible in some of the images, sexually abusing Jane Doe 2 and Jane Doe 3.  The analyst also recovered online chats in which Hassan repeatedly discussed his abuse of Jane Doe 1, Jane Doe 2, Jane Doe 3, and others, and repeatedly sent the images he produced documenting the sexual abuse of Jane Doe 2 and Jane Doe 3 to other uses of the file-sharing program.  In other chats, Hassan provided tips to others about how to meet and abuse minors in the Philippines.

Read more https://www.ice.gov/news/releases/former-foreign-service-officer-sentenced-40-years-federal-prison-production-and

Last October, if you happened to be near the scene where some right-wing Proud Boys got into a fight with Antifa activists on New York City's Upper East Side, the Manhattan District Attorney's office may have collected your phone number and location at the time— without your knowledge .

Two members of the Proud Boys are on trial and several others have already pleaded guilty to rioting and disorderly conduct charges in connection with the fight. During the trial last week, an investigator with the DA's office testified that they had gotten what's called a "reverse location" search warrant demanding that Google cough up location information on people who had Android phones or used Google Maps near the scene. This warrant included many people who have no connection to the case—the technological equivalent of doing a house-to-house search for evidence connected to a crime in that neighborhood.

Read more https://reason.com/2019/08/13/if-youre-near-the-scene-of-a-crime-authorities-can-demand-that-google-hand-over-your-data/

The Missouri State Highway Patrol’s Division of Drug and Crime Control announced the arrest of 33-year-old James C. Hughes, of St. Robert, on Wednesday. Hughes was arrested in connection with promoting and possessing child pornography, following an investigation by members of the Division of Drug and Crime Control’s Digital Forensics Investigative Unit with assistance from the St. Robert Police Department and the South Central Missouri Computer Crimes Task Force.

Investigators on Wednesday executed a search warrant at Hughes’ residence on Top Drive in St. Robert where investigators seized child pornography and computer equipment, the release from the Missouri State Highway Patrol Division of Drug and Crime Control says.

 

Read more https://www.therolladailynews.com/news/20190808/st-robert-man-arrested-on-charges-of-promoting-and-possession-of-child-pornography