Bitcoin Forensics Part II: The Secret Web Strikes Back

In last week’s post, we talked about Bitcoin, Tor and some of the hidden websites only accessible via Tor, such as Silk Road, which was shut down by the FBI on October 1st. Well, just...

Read more >

Bitcoin Forensics – A Journey into the Dark Web

There has been a lot of buzz around Tor, Bitcoin, and the so-called “dark web” (or “deep web”) since the FBI shut down the underground website “Silk Road” on Oct 1st. As many of you...

Read more >

iOS artifacts – See what you might be missing!

Lance posted a great article on iOS forensics last week detailing common steps and details of an examination of an iOS device, and how IEF can be used once you have that physical image or...

Read more >

Investigating iOS Phone Images, File Dumps & Backups

As of January 2013, Apple announced it had sold over 500 million iOS devices. While iOS seems to be the leading operating system for tablets worldwide, Android continues to be the leading operating system for...

Read more >

IEF Wins Computer Forensic Software Tool of the Year

Sometimes when I reflect back to what IEF did back in its very early stages (and what it looked like! Long-time users will remember how ugly it was at the beginning, and I believe Matt...

Read more >

Recovering Facebook Artifacts

Last week I posted a blog asking “How Important are Facebook Artifacts” to your case. The post discusses the kinds of artifacts you are likely to encounter when examining evidence looking for Facebook activity or...

Read more >