IoT: The Investigator’s Goldmine

The world of IoT (Internet of Things) is growing at an exponential rate. Coffee machines, thermostats, AC vents, door locks…everything you touch has been or can be converted to Bluetooth or Wi-Fi.  This can make a digital investigation difficult because forensically imaging IoT devices, with their growing varieties and formats, … Read More

State Sponsored Cybercrime: The Continuing Threat

United Nation experts investigating violations of international sanctions on North Korea were recently hit by a “sustained” cyberattack. The hackers were able to infiltrate the computer of one of the experts on the 1718 committee and compromise the secrecy of their ongoing investigation. It was unclear who exactly was responsible … Read More

Tor: The Roots

Tor, the onion router, was developed by the U.S. Naval Research Lab and DARPA; version 2 was released to the public in 2004 after which the Electronic Frontier Foundation, a nonprofit centered on defending digital privacy rights, began funding the developers to continue their work on Tor. Two years later, … Read More

The Cardinal Ruling

Although stealing signs has been commonplace in major league baseball for decades, the type of theft that occurred beginning January 2012 from the Houston Astros computer network was unprecedented in professional sports. The case began with the Federal Bureau of Investigation investigating allegations that a member of the St. Louis … Read More

Ransomware on the Rise

Cyber criminals are coming for your data and money. The FBI reported an increase in cyber attacks, specifically ransomware. Hospitals, school districts, state and local governments, small businesses, large businesses, academic institutions, and law enforcement are all among the top targets for these attacks. Organizations face the possibility of immense … Read More

Yahoo Yet Again

Yahoo recently disclosed a new security breach on December 14, potentially affecting more than one billion accounts. The breach first began back in 2013 and is believed to be separate from the similarly massive cybersecurity incident Yahoo announced back in September. Data stolen may include user names, email addresses and … Read More

Solicitation of a Minor

One of our forensic expert Nick’s toughest cases to date involves the sexual abuse of a minor. It serves as a warning to parents to keep a close eye on the people your children associate with, as well as a lesson on how to preserve evidence in any form of … Read More

Self Sabotage

Cases involving estranged or divorced spouses are always delicate. The situation only escalates when one of the parties worries the other is spying on them to gain leverage. Our forensic expert Brett handled a case involving a client who was convinced their estranged spouse put spyware on their mobile devices. … Read More

Do’s, Don’ts & Common Sense of Cyber Security

In the face of unrelenting reports detailing computer hacking and cybersecurity incidents, many allow the overwhelming nature of it all to lead to inaction.  Luckily, many solutions exist that can make your organization, computers and network more secure.  In order to de-mystify the realm of cybersecurity, we’re providing some basic … Read More

Payload Paranoia

Divorces rarely go smoothly. Whether a divorce is due to an unfaithful spouse or any other dramatic reason, trust issues are fairly common and defendable. Even mild paranoia is to be expected in cases when a spouse uncovers a terrible lie. However, paranoia that you have been hacked and someone … Read More