Investigations

Home » Investigations

Updated Standards and Best Practice Guides in IRIS Digital Evidence Toolbox

When digital evidence is encountered during an investigation, many questions arise: What is the best method to preserve the evidence? How should the evidence be handled? How should valuable or potentially relevant data contained be preserved? The key to answering these questions begins with a firm understanding of the characteristics of digital evidence. Organizations comprised of digital forensics experts such as National Institute of Standards and Technology (NIST), the National Institute of Justice (NIJ), and Scientific Working Group for Digital Evidence (SWGDE) have published guides for ensuring quality and consistency within the forensic community. IRIS LLC has updated our Digital Evidence Toolbox with the newest Standards and Best Practices from SWGDE along with other free tools and resources for the legal professional.

2018-07-26T09:51:41+00:00July 25th, 2018|Categories: Cell Phone Forensics, Computer Forensics, Crime Scene Examination, Investigations, Standards-Best Practices|Comments Off on Updated Standards and Best Practice Guides in IRIS Digital Evidence Toolbox

Advanced Cell Site Analysis Using Per Call Measurement Data

Location data from cellular service provider records can be key evidence in a case.  In this article we discuss how a mobile device works on a cellular network, the types of location data that can be obtained from the cellular service provider, and links to the latest subpoena guide and retention schedules for the major service providers. Read Full Article Here>

2018-08-02T14:51:04+00:00July 10th, 2018|Categories: Cell Phone Forensics, Investigations, Location Data|Tags: , , , , , , |Comments Off on Advanced Cell Site Analysis Using Per Call Measurement Data

Case Study: Early Assessment and the use of Cell Site Records

Previously overlooked cell site records containing location data were used to exonerate a man after 17 years in jail. In 2000, teenager Vernon Horn was convicted for a January 1999 robbery and murder at a New Haven neighborhood convenience store.  17 years later cell site records were used to set aside the conviction. Read the Full Article Here>

2018-07-03T14:51:49+00:00July 3rd, 2018|Categories: Cell Phone Forensics, Investigations, Location Data|Tags: , , |Comments Off on Case Study: Early Assessment and the use of Cell Site Records

Supreme Court protects digital privacy of cellphone location records

(Photo: Michael Owens, USA Today) In a ruling that could have broad implications for privacy rights in the digital age, justices on both sides of the ideological spectrum said rapid advances in technology make decades-old rules on data privacy inadequate. It was another in a series of digital privacy verdicts issued by the Supreme Court, following rulings in recent years that police cannot use GPS equipment to track vehicles or search cellphones without a warrant.  See full USA Today article>

2018-07-03T14:03:42+00:00June 22nd, 2018|Categories: Cell Phone Forensics, Digital Privacy, Investigations|Comments Off on Supreme Court protects digital privacy of cellphone location records

Best Practices for Preserving Social Media Evidence

In our earlier post on this topic, Best Practices for Searching Social Media for Evidence, we described a universal approach for searching the internet to locate and identify social media evidence.  In this article we discuss the best practices for preserving the evidence found, the rules of evidence that apply and steps that can be taken to overcome anticipated admissibility issues. Read the full article> See our Digital Evidence Toolbox for additional tools    

2018-06-11T12:57:03+00:00June 11th, 2018|Categories: Investigations, Social Media|Tags: , , , , , |Comments Off on Best Practices for Preserving Social Media Evidence

Bridgeport Man Found Not Guilty of Stratford Rape

  A Bridgeport man, who spent nine and a half months in prison after a woman claimed he raped her in a Stratford motel, was found not guilty of the charges. Mr. Joseph’s defense team reported that the cell phone evidence recovered by IRIS LLC was a crucial part of the defense. When IRIS LLC initially received Mr. Joseph's phone it was heavily damaged and not operational, but we were able to repair the phone so that the text message evidence could be successfully extracted and provided to the defense team. See Full Article>

2018-06-14T16:37:24+00:00May 21st, 2018|Categories: Cell Phone Forensics, Investigations|Tags: , , , |Comments Off on Bridgeport Man Found Not Guilty of Stratford Rape

Due Diligence in Skakel Case

New Investigation Yields Critical Evidence: In our assessment of the credibility of the State's star witness, Gregory Coleman, it was a simple matter of conducting due diligence.  As was our investigation into an alibi witness, Dennis Ossorio. Unfortunately, the basic investigative steps were not followed until our involvement a decade later.  The failure to conduct due diligence can affect anyone from all walks of life. "The right to a fair trial is one of the cornerstones of a just society." See full Hartford Courant article

2018-05-08T13:23:28+00:00May 8th, 2018|Categories: Investigations|Tags: , , , , |Comments Off on Due Diligence in Skakel Case

Michael Skakel Wins At Connecticut Supreme Court, Conviction Vacated

The duty of the defense to independently investigate and interview alibi witnesses is fundamental, but not always a given.  It takes a professional energetic and sometimes tenacious investigation by the defense team to be effective.  In our investigation locating the alibi witness was routine procedure that should have been done by the previous defense team, but was not. See full Hartford Courant article

2018-06-14T16:36:05+00:00May 4th, 2018|Categories: Crime Scene Examination, Investigations|Comments Off on Michael Skakel Wins At Connecticut Supreme Court, Conviction Vacated

The Best Data Security and Identity Theft Prevention Methods for 2018

Be proactive and know what the crooks need to rip you off.  Identify vulnerable points and take measures to protect yourself against identity theft.  An ounce of prevention is worth a pound of cure.  You lock your door, why not your mail box?  But why stop there? What about your email box and all the devices and vulnerable points in-between. Read Full Article>

Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

“3 things you can do to prevent a ransomware attack” 1.  Never open any attachment from ANY e-mail unless you are 100% sure it is legitimate and from a source that you trust (there are examples where an e-mail may come from someone you trust but that does not mean that they don’t have the virus and the attacker is using their PC to spread the malicious code). PLEASE always ensure the attachment is NOT a ZIP, EXE or other executable code.  There are some instances where a .doc is followed by a .zip (BE CAREFUL).  There are very common ones which are from USPS, UPS, FedEx, Etc… all stating to have your package tracking information. 2.  Don’t search websites or visit links that you are not familiar with. We have seen where clients have clicked on a picture in Facebook and received a virus. 3.  VERY IMPORTANT. Always make sure you have a good backup of your server and data. This is however not the magic answer because if your server gets hit with Ransomware it may also encrypt your backup drive thus rendering it useless.  The SOLUTION to this issue is to always ensure that you have a backup drive that you take off-site for the recovery of your data. You are the only one who can ensure that if you are hit with Ransomware that you have the proper backup off-site and that the backup is current.  We hope you never have to deal with Ransomware, but if you are prepared the damage can be very minimal without paying the requested ransom. Have questions or need help, our team at I.R.I.S. LLC consists of experienced, computer forensic IT experts that can assist [...]

2018-04-17T12:40:45+00:00December 11th, 2017|Categories: Computer Forensics, Investigations|Tags: , , , |Comments Off on Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

Best Practices for Searching Social Media for Evidence

“While it’s sometimes easy to find a person’s social media page by their name, finding a page which a user has created under a different name or alias - making sure you have the correct page as well as assuring that you have captured all the data in accordance with the best practices can be a challenging task.” The approach involves a two step process of first conducting the searches and second preserving the evidence using a forensic approach that captures all the data.  The purpose of this article is to provide a consistent, comprehensive approach for searching the internet while following the best practices and ethical standards. See Full Article: Best Practices for Searching Social Media for Evidence

2018-04-17T12:44:16+00:00December 5th, 2017|Categories: Computer Forensics, Investigations|Tags: , , |Comments Off on Best Practices for Searching Social Media for Evidence

Can Police Track You Through Your Cellphone Without A Warrant?

The U.S. Supreme Court confronts the digital age again on Wednesday when it hears oral arguments in a case that promises to have major repercussions for law enforcement and personal privacy. At issue is whether police have to get a search warrant in order to obtain cellphone location information that is routinely collected and stored by wireless providers. See full article>

2018-04-17T12:47:04+00:00November 28th, 2017|Categories: Cell Phone Forensics, Investigations|Comments Off on Can Police Track You Through Your Cellphone Without A Warrant?

Chain of Custody: How to Ensure Digital Evidence Stands Up In Court

Digital evidence is evidence. It can have real impact on legal proceedings. So just as with physical evidence, it’s essential that law enforcement maintain a clear, documented chain of custody, just as it would for any other physical evidence. From the moment evidence is obtained, a trail must document how it has been handled, by whom, and for what purpose. Read More>

2018-04-17T12:47:37+00:00November 21st, 2017|Categories: Cell Phone Forensics, Computer Forensics, Investigations|Comments Off on Chain of Custody: How to Ensure Digital Evidence Stands Up In Court

Professional Bail Bonds LLC, CT Bail Bonds

Professional Bail Bonds LLC is the only fully licensed surety firm in Connecticut capable of providing the services of qualified, experienced cross trained criminal defense investigators. " We believe in the right to bail and the right to be represented by an attorney. " We recognize the sensitive nature of the criminal justice process at this stage and the need to have your client’s release process handled discretely, by experienced professionals. Professional Bail Bonds has been active in the Connecticut bail bond and criminal defense investigation industries for over ten years. In this time we have had the privilege of working with many of the most highly respected lawyers in Connecticut. We recognize the benefit of being able to provide the combined services of an experienced criminal defense Investigator and a qualified, experienced surety agent. " We believe in the right to a fair and speedy trial- that every person is innocent until proven guilty beyond a reasonable doubt." A board certified, licensed criminal defense investigator, licensed Surety Bail Bond Agent and Connecticut Notary Public oversees all of the client relationships so you can feel confident that you are doing business with an experienced, professional and reputable organization.   Professional Bail Bonds LLC, CT Bail Bonds.

2018-04-17T13:35:22+00:00November 6th, 2013|Categories: Bail Bonds, Investigations|0 Comments