Cell phone forensic analysis has become an increasingly important tool in criminal investigations. With the widespread use of cell phones, these devices often contain valuable information that can be critical to a criminal investigation. In this blog post, we will discuss the basics of cell phone forensic analysis and how it is used in criminal […]
Spyware/Malware and the Fourth Amendment: How The Government Wants to Spy on Your Online Activities
The Fourth Amendment of the United States Constitution guarantees the right to privacy and protects against unreasonable searches and seizures by the government. However, in recent years, there has been a debate over the legality of law enforcement activities such as remotely installing spyware or malware on to computers without a warrant or consent. The […]
The Cat-and-Mouse Game of Digital Privacy: How Law Enforcement Can Access Your WhatsApp Communications
In recent years, messaging apps such as WhatsApp have become increasingly popular due to their end-to-end encryption and promise of privacy. However, law enforcement agencies have developed methods to penetrate these supposedly secure messaging apps and access their contents in criminal investigations. One method used by law enforcement to access encrypted messaging app communications is […]
The Forensic Science of IMSI/TMSI catchers: Stingray, Gossamer, FishHawk, Porpoise, and others
“Just because you’re paranoid doesn’t mean that there isn’t somebody watching you” That is a truism in this day and age. There has been much publicity about the Edward Snowden revelations and NSA’s PRISM and the Boundless Information programs. It has invited a lot of useful and needed public and private debate in the role […]