IrisAdmin1

/Iris

About Iris

This author has not yet filled in any details.
So far Iris has created 7 blog entries.

Advanced Cell Site Analysis Using Per Call Measurement Data

Location data from cellular service provider records can be key evidence in a case. Cell-site information from call detail records can place a person in a general are but are not very accurate. Cellular service providers have more accurate location data known as Per Call Measurement Data (PCMD). See Full Article> Advanced Cell-Site Analysis Using PCMD

2019-09-19T16:13:36-04:00July 10th, 2018|Categories: Cell Phone Forensics, Investigations, Location Data|Tags: , , , , , , |Comments Off on Advanced Cell Site Analysis Using Per Call Measurement Data

The Best Data Security and Identity Theft Prevention Methods for 2018

Learn how to take a proactive approach to data security and prevent becoming a victim in the first place. READ THE ARTICLE: The best data security and id theft protection for 2018

Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

A county employee in North Carolina on Monday opened their inbox and clicked on a phishing email, inadvertently pulling up an attachment containing spyware and appearing to expose the county's computer system to hackers overseas.  The hackers, believed to be operating from Iran or Ukraine, asked the county for $23,000 to unfreeze the system, Mecklenburg County officials said. They gave the county an email address and instructions on how to pay the ransom.  They also gave the county a deadline — 1 p.m. Wednesday. READ THE FULL CHICAGO TRIBUNE ARTICLE HERE>

2019-09-19T14:15:27-04:00December 11th, 2017|Categories: Computer Forensics, Investigations|Tags: , , , |Comments Off on Hackers sought a $23,000 ransom after freezing a N.C. county’s website. They’re not getting it.

Best Practices for Searching Social Media for Evidence

Researching the online publicly available presence of potential parties, witnesses, the scene, even your own client should be a routine practice.  It should follow the best practices, begin as soon as possible, be fully documented and be regularly monitored. Read the full article here>

2019-09-19T14:06:29-04:00December 5th, 2017|Categories: Computer Forensics, Investigations|Tags: , , |Comments Off on Best Practices for Searching Social Media for Evidence

Can Police Track You Through Your Cellphone Without A Warrant?

The U.S. Supreme Court confronts the digital age again on Wednesday when it hears oral arguments in a case that promises to have major repercussions for law enforcement and personal privacy. At issue is whether police have to get a search warrant in order to obtain cellphone location information that is routinely collected and stored by wireless providers. Full Article: Can Police Track You Through Your Cellphone Without a Warrant?by Nina Totenberg

2019-10-03T13:58:48-04:00November 28th, 2017|Categories: Cell Phone Forensics, Investigations|Comments Off on Can Police Track You Through Your Cellphone Without A Warrant?