"Without digital forensics, it would be hard to get a conclusion in a lot of cases," said Walsh, who noted the very nature of modern communications makes the work of the FBI more challenging. "Suspects aren't talking on the phone anymore and our technical techniques are not working as well because so much more is encrypted. I pull in the NJRCFL very early in my investigative strategy."
A teenager computer genius who made more than £400,000 by selling stolen personal data and his services as a hacker was jailed for 20 months today.
Elliott Gunton, 19, who did not have a proper job, used his skills to make the fortune in cryptocurrency from his family home in Norwich, Norfolk.
Police at the scene noticed that the digital display built into the dashboard of Emery’s vehicle showed her phone lost its connection to the vehicle. Forensic analysis of the phone and car showed that 60 seconds before the crash, she sent a text message, then she tried to call “919,″ according to court documents.
Glen Dale police Chief Edward Vogler said they’re still working to run forensic diagnostics on Maroney’s phone to show past phone calls, voicemails and text messages.
“It’s a new phone and the equipment we have isn’t capable of doing that,” Vogler said. “We’re in the process of finding someone with the equipment capable of doing that.”
Ghassan Al-Naami faces charges of possession and transmission of child pornography. A number of his computers and electronic devices were also seized and analyzed.
Read more https://edmontonsun.com/news/crime/edmonton-pediatrician-facing-child-pornography-charges/wcm/af5bc9e8-151d-4f8a-8742-6ec3205921c3
In a memorandum filed ahead of a detention hearing, rescheduled from Thursday to Aug. 22, the U.S. Attorney's Office in Seattle said servers found in Thompson's bedroom contained data stolen from more than 30 unnamed companies, educational institutions and other entities.
An HSI computer forensics analyst forensically examined the digital evidence and discovered thousands of images of child pornography, including the images that depict Hassan, whose face is visible in some of the images, sexually abusing Jane Doe 2 and Jane Doe 3. The analyst also recovered online chats in which Hassan repeatedly discussed his abuse of Jane Doe 1, Jane Doe 2, Jane Doe 3, and others, and repeatedly sent the images he produced documenting the sexual abuse of Jane Doe 2 and Jane Doe 3 to other uses of the file-sharing program. In other chats, Hassan provided tips to others about how to meet and abuse minors in the Philippines.
Read more https://www.ice.gov/news/releases/former-foreign-service-officer-sentenced-40-years-federal-prison-production-and
Last October, if you happened to be near the scene where some right-wing Proud Boys got into a fight with Antifa activists on New York City's Upper East Side, the Manhattan District Attorney's office may have collected your phone number and location at the time— without your knowledge .
Two members of the Proud Boys are on trial and several others have already pleaded guilty to rioting and disorderly conduct charges in connection with the fight. During the trial last week, an investigator with the DA's office testified that they had gotten what's called a "reverse location" search warrant demanding that Google cough up location information on people who had Android phones or used Google Maps near the scene. This warrant included many people who have no connection to the case—the technological equivalent of doing a house-to-house search for evidence connected to a crime in that neighborhood.
The Missouri State Highway Patrol’s Division of Drug and Crime Control announced the arrest of 33-year-old James C. Hughes, of St. Robert, on Wednesday. Hughes was arrested in connection with promoting and possessing child pornography, following an investigation by members of the Division of Drug and Crime Control’s Digital Forensics Investigative Unit with assistance from the St. Robert Police Department and the South Central Missouri Computer Crimes Task Force.
Investigators on Wednesday executed a search warrant at Hughes’ residence on Top Drive in St. Robert where investigators seized child pornography and computer equipment, the release from the Missouri State Highway Patrol Division of Drug and Crime Control says.
Technology and connected devices touch nearly every facet of modern life, and they often hold key evidence in criminal investigations. “Every single case now involves some sort of digital evidence,” said FBI Supervisory Special Agent Steven Newman, director of the New Jersey Regional Computer Forensics Laboratory (NJRCFL).
Digital evidence can be on any device and can follow subjects almost anywhere they traverse in the cyber world. As such, digital evidence is key in Internet-enabled crimes, but it is also critical in cases that range from terrorism to fraud.
In May 2018, three New Jersey men were sentenced to prison for conspiring to provide material support to the Islamic State of Iraq and al-Sham (ISIS), which is designated by the United States as a foreign terrorist organization. The FBI became aware of the men’s activities through a tip from an informant, according to Special Agent Suzanne Walsh with the FBI’s Newark Field Office.
It has been coming for some time, but now the major breach of a biometric database has actually been reported—facial recognition records, fingerprints, log data and personal information has all been found on "a publicly accessible database." The damage is not yet clear, but the report claims that actual fingerprints and facial recognition records for millions of people have been exposed.
The issue with biometric data being stored in this way is that, unlike usernames and passwords, it cannot be changed. Once it’s compromised, it’s compromised. And for that reason this breach report will sound all kinds of alarms.