Bitcoin Forensics – A Journey into the Dark Web

There has been a lot of buzz around Tor, Bitcoin, and the so-called “dark web” (or “deep web”) since the FBI shut down the underground website “Silk Road” on Oct 1st.

As many of you already know, Tor is a … Read more

Geo-tag Forensics

Introduction

A geo-tagged image is an image which holds geographical identification metadata. This data consists of latitude and longitude co-ordinates (sometimes altitude also). Though there are some extremely powerful tools available for extracting geo-tag information from geo-tagged images but the … Read more

Mobile Device Geotags & Armed Forces

In recent years it has been noticeable that the amount of people carrying a smart phone has increased exponentially. This is down to their low price and availability; even children as young as 12 have a smart phone. However, most … Read more

Android Forensics

 Smartphones are changing the IT and Communication landscape vastly.  A Smartphone can do almost every good thing a computer can do. Today most of the corporate employee access and manage their official emails through the e-mail client installed on their

Read more

Mobile Phone Forensic Challenges

Introduction

A great number of the mobile phones used worldwide every second require special knowledge and skills from forensic experts.  More often it is not enough to be an experienced expert in computer forensics to understand all the peculiarities and … Read more

iPhone Tracking – from a forensic point of view

– Introduction –

iPhoneTracking is sexy!!! Every mobile forensic suite, at least the ones dealing with iPhones, are providing it proudly. iPhoneTracking also has been a hot topic in the media all around the globe. People stated, that there is … Read more

Evaluating Mobile Telephone Connection Behaviour – Part 2

The Basics of Evaluating Connection Records

by Sam Raincock, IT and telecommunications expert witness

Connection RecordsWithin the UK, details of past telephone connections are stored by the network providers. The minimum storage is advised by the Data Retention (EC
Read more

Geotags: Friend or Foe?

by David Benford
Director, Blackstage Forensics

I recently wrote a research paper, “Geotag Data: The Modification of Evidence on the Apple iPhone”, based around the possibility of modifying geotag evidence on the Apple iPhone. A test was performed as part
Read more

Challenges of Smart Phone Forensics

by Rob Adams ACE, CDIA+
SALIX

Mobile devices have become an essential component of our daily lives. These devices keep us connected and act as so much more than the cell phones and portable music players of the 1990’s. It
Read more

Recording Telephone Calls

First published March 2009

by Greg Smith
Mobile Telephone Evidence & Forensics
trewmte.blogspot.com

A question that often gets asked is “Can I record a telephone call?” and the answer to that is that you can (according to publicly available material),
Read more

Mobile Phone and GPS Forensics – Some Thoughts

First published February 2009

by Greg Smith
Mobile Telephone Evidence & Forensics
trewmte.blogspot.com

Mobile telephones are the predominate wireless telecommunications device throughout the world and most certainly in the UK they predominate other technologies, where ownership has reached well over
Read more

Malicious Phone Call Legislation in the UK

First published February 2009

by Greg Smith
Mobile Telephone Evidence & Forensics
trewmte.blogspot.com

It is being noted that there is an exponential growth in harassing and intimidating calls from financial companies, card companies and from outsource debt collection firms chasing
Read more

SonyEricsson Hidden Evidence

First published February 2009

by Greg Smith
Mobile Telephone Evidence & Forensics
trewmte.blogspot.com

I have discovered that it is possible when manually examining some SonyEricssons (such as “K” range etc) that after a user has deleted the Last Number Dialled
Read more
Share to...