Increasingly, chains of evidence include software steps. It’s not just the RIAA suing people – and getting it wrong – based on automatic systems to detect and identify file sharers. It’s forensic programs used to collect and analyze data from computers and smart phones. It’s audit logs saved and stored by ISPs and websites. It’s location data from cell phones. It’s e-mails and IMs and comments posted to social networking sites. It’s tallies from digital voting machines. It’s images and meta-data from surveillance cameras. The list goes on and on. We in the security field know the risks associated with trusting digital data, but this evidence is routinely assumed by courts to be accurate…
Digital Forensics News Round-Up, February 21 2024 #digitalforensics #dfir
How MSAB Is Managing The Digital Forensics Challenges Of Frontline Policing
Podcast Ep. 80 Recap: Empowering Law Enforcement With Nick Harvey From Cellebrite
Important: No API Key Entered.
Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.