Investigations

/Investigations

Is Your Mobile Device Lost, Locked or Damaged?

  Forensic investigators should routinely determine if backup files exist during their initial case assessment.  A backup file is a like a snapshot of the devices memory in time.  It is an excellent alternative to a lost or locked device or when other forensic procedures cannot recover the data.  A backup may be found in the cloud or may be stored on a computer or mobile device.  It would require the user’s credentials or a forensic acquisition of the device it was stored in.  Attempts to restore a backup without the proper training could result in the contamination and permanent loss of data.  A backup file is also a good alternative when faced with a locked device with an unknown pass code. However, advances in technology allow examiners to overcome more locked devices than ever before.  Because of the rapid pace of technology, the forensic community lags behind.  New tools are created regularly so reviewing the latest forensic capabilities periodically is recommended. Damaged devices can often be accessed after making only minor repairs, more often than not.  For example, the simple and inexpensive process of replacing a broken screen may be the only thing preventing the examiner from accessing the device.  Water damage can also be easily mitigated, but requires the investigator to follow a recently updated standard procedure.  Depending on the device and the current state of the devices power certain actions should be taken.  See the iPhone Collection Flowchart and the Android Collection Flowchart.

ICYMI: CT Man Jailed for 17 Years, Exonerated Thanks to Digital Evidence

A New Haven, CT man who served 17 years in prison for murder and robbery was freed back on April 25, 2018 after he was exonerated by cellphone records. Read Article The digital evidence is out there to save more lives, but defense teams may not be as educated as the prosecution, who have access to state labs, as to what to look for, where to look for, and how to obtain all the necessary digital evidence needed to prevent or exonerate wrongful convictions. For further information see: Digital Evidence Case Assessment Method Digital Evidence Innocence Initiative

NEW!!! Digital Evidence Case Assessment Method (DECAM) White Paper

FROM COLLECTION TO THE COURTROOM: DIGITAL EVIDENCE A NEW Standardized Method for Investigators and Attorneys IRIS LLC is proud to announce the creation of the first standardized Digital Evidence Case Assessment Method (DECAM) for indigent defense organizations.  Developed for the defense community to reduce pre-trial incarceration and prevent future wrongful convictions in cases involving digital evidence. Click here to read the New DECAM White Paper  

2019-09-19T15:19:49-04:00May 20th, 2019|Categories: Cell Phone Forensics, Computer Forensics, Investigations, Location Data, Social Media, Standards-Best Practices, Training, Uncategorized|Comments Off on NEW!!! Digital Evidence Case Assessment Method (DECAM) White Paper

Updated Standards and Best Practice Guides in IRIS Digital Evidence Toolbox

When digital evidence is encountered during an investigation, many questions arise: What is the best method to preserve the evidence? How should the evidence be handled? How should valuable or potentially relevant data contained be preserved? The key to answering these questions begins with a firm understanding of the characteristics of digital evidence. Updated standards can be found in our Digital Evidence Toolbox at http://www.irisinvestigations.com/iris-digital-evidence-toolbox/

2019-09-19T16:11:54-04:00July 25th, 2018|Categories: Cell Phone Forensics, Computer Forensics, Crime Scene Examination, Investigations, Standards-Best Practices|Comments Off on Updated Standards and Best Practice Guides in IRIS Digital Evidence Toolbox

Advanced Cell Site Analysis Using Per Call Measurement Data

Location data from cellular service provider records can be key evidence in a case. Cell-site information from call detail records can place a person in a general are but are not very accurate. Cellular service providers have more accurate location data known as Per Call Measurement Data (PCMD). See Full Article> Advanced Cell-Site Analysis Using PCMD

2019-09-19T16:13:36-04:00July 10th, 2018|Categories: Cell Phone Forensics, Investigations, Location Data|Tags: , , , , , , |Comments Off on Advanced Cell Site Analysis Using Per Call Measurement Data

Case Study: Early Assessment and the use of Cell Site Records

Previously overlooked cell site records containing location data were used to exonerate a man after 17 years in jail. In 2000, teenager Vernon Horn was convicted for a January 1999 robbery and murder at a New Haven neighborhood convenience store. Seventeen years later, cell-site records were used to set aside the conviction. Read the Full Article> Case Study: Early Assessment and the use of Cell Site Records

2019-05-07T15:58:49-04:00July 3rd, 2018|Categories: Cell Phone Forensics, Investigations, Location Data|Tags: , , |Comments Off on Case Study: Early Assessment and the use of Cell Site Records

Supreme Court protects digital privacy of cellphone location records

(Photo: Michael Owens, USA Today) The Supreme Court ruled Friday that the government cannot monitor people's movements for weeks or months by tracking the location of their mobile phones without a warrant. In a ruling that could have broad implications for privacy rights in the digital age, justices on both sides of the ideological spectrum said rapid advances in technology make decades-old rules on data privacy inadequate. Read the Full Article>

2019-05-07T17:00:01-04:00June 22nd, 2018|Categories: Cell Phone Forensics, Digital Privacy, Investigations|Comments Off on Supreme Court protects digital privacy of cellphone location records

Best Practices for Preserving Social Media Evidence

In our earlier post on this topic, Best Practices for Searching Social Media for Evidence, we described a universal approach for searching the internet to locate and identify social media evidence. In this article we will discuss the best practices for preserving social media evidence, the rules of evidence that apply and steps that can be taken to overcome anticipated admissibility issues. Read the Full Article>

2019-05-07T17:04:23-04:00June 11th, 2018|Categories: Investigations, Social Media|Tags: , , , , , |Comments Off on Best Practices for Preserving Social Media Evidence

Bridgeport Man Found Not Guilty of Stratford Rape

  A Bridgeport man, who spent nine and a half months in prison after a woman claimed he raped her in a Stratford motel, was found not guilty of the charges. Mr. Joseph’s defense team reported that the cell phone evidence recovered by IRIS LLC was a crucial part of the defense. When IRIS LLC initially received Mr. Joseph's phone it was heavily damaged and not operational, but we were able to repair the phone so that the text message evidence could be successfully extracted and provided to the defense team. Read the Full Article>

2019-05-07T17:11:59-04:00May 21st, 2018|Categories: Cell Phone Forensics, Investigations|Tags: , , , |Comments Off on Bridgeport Man Found Not Guilty of Stratford Rape

Michael Skakel Wins At Connecticut Supreme Court, Conviction Vacated

The duty of the defense is to independently investigate and interview alibi witnesses is fundamental, but not always a given.  It takes a professional energetic and sometimes tenacious investigation by the defense team to be effective.  In our investigation we found that locating the alibi witness was routine procedure that should have been done, but was not. READ THE FULL HARTFORD COURANT ARTICLE HERE

2019-06-28T18:12:16-04:00May 4th, 2018|Categories: Crime Scene Examination, Investigations|Comments Off on Michael Skakel Wins At Connecticut Supreme Court, Conviction Vacated

The Best Data Security and Identity Theft Prevention Methods for 2018

Learn how to take a proactive approach to data security and prevent becoming a victim in the first place. READ THE ARTICLE: The best data security and id theft protection for 2018

Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

A county employee in North Carolina on Monday opened their inbox and clicked on a phishing email, inadvertently pulling up an attachment containing spyware and appearing to expose the county's computer system to hackers overseas.  The hackers, believed to be operating from Iran or Ukraine, asked the county for $23,000 to unfreeze the system, Mecklenburg County officials said. They gave the county an email address and instructions on how to pay the ransom.  They also gave the county a deadline — 1 p.m. Wednesday. READ THE FULL CHICAGO TRIBUNE ARTICLE HERE>

2019-09-19T14:15:27-04:00December 11th, 2017|Categories: Computer Forensics, Investigations|Tags: , , , |Comments Off on Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

Best Practices for Searching Social Media for Evidence

Researching the online publicly available presence of potential parties, witnesses, the scene, even your own client should be a routine practice.  It should follow the best practices, begin as soon as possible, be fully documented and be regularly monitored. Read the full article here>

2019-09-19T14:06:29-04:00December 5th, 2017|Categories: Computer Forensics, Investigations|Tags: , , |Comments Off on Best Practices for Searching Social Media for Evidence

Professional Bail Bonds LLC, CT Bail Bonds

Professional Bail Bonds LLC is the only fully licensed surety firm in Connecticut capable of providing the services of qualified, experienced cross trained criminal defense investigators. " We believe in the right to bail and the right to be represented by an attorney. " We recognize the sensitive nature of the criminal justice process at this stage and the need to have your client http://www.professionalbailbondsllc.com

2019-06-28T13:23:16-04:00November 6th, 2013|Categories: Bail Bonds, Investigations|0 Comments