Google Tracking Location, Prosecutors Dropping Cases, and Facial Recognition

Google Tracking Location, Prosecutors Dropping Cases, and Facial Recognition

The last couple of weeks have been eventful for news related to the world of digital evidence. Police are arresting innocent people based on Google location data, prosecutors are dismissing cases instead of turning over data, and DHS is going to start scanning your face at airports. Read the digital forensic implications here.

Read More

Introducing Cell Tower Forensics

Introducing Cell Tower Forensics

We are excited to add a new service to our offerings: Cell Tower Forensics. This means we can take usage records from the carriers (Verizon, AT&T, T-Mobile, etc.) and determine locations of phones, paths of travel, the most common phone numbers called or texted, and much more. This information can be useful to see if a phone was at or near a particular location at a given time, or if it is common for the person to be at that location every day.

Read More

Do-It-Yourself Text Message Preservation

Do-It-Yourself Text Message Preservation

More and more apps advertise the ability to download, export, or otherwise save text messages. Some, like evichat, even advertise this ability directly to lawyers. While these low-cost alternatives may save you some money in the short term, they come with their own set of problems. Know what you are getting yourself into before you resort to an app to take the place of a digital forensics expert.

Read More

Introducing Cloud Forensic Capabilities

Introducing Cloud Forensic Capabilities

More and more of our data is moving to the cloud. From photo storage on Google, Apple, or Amazon, to entire offices moving to Microsoft with Office 365 – the cloud has become a wealth of information for digital investigations. This is why Chase Technology Consulting now has the capability to download and examine cloud data in a forensically safe manner.

Read More

Ask The Expert – How Common are Fake Accounts Online?

Ask The Expert – How Common are Fake Accounts Online?

With the ease of creating accounts online, the problem in the legal field becomes: how do we know who sent a particular message/email/photo, etc.? A message may come from John Doe’s Facebook page, but does that page really belong to John Doe? Did John set it up or did someone else? If John set it up, was he even the one logged in when the message was sent?

Read More

iOS 11.4.1 Restricted Mode and Digital Forensics

iOS 11.4.1 Restricted Mode and Digital Forensics

With iOS 11.4.1 (released July, 2018) comes a new feature call “USB Restricted Mode.” With this update, this mode is enabled by default, even though it appears off (see picture). It locks down the lightning port after one hour of no password being entered on the device. This new mode could impact mobile phone forensics.

Read More

Want to Know what Facebook Knows About You? Download Your Data

Want to Know what Facebook Knows About You? Download Your Data

In the last week there has been much reporting about the amount of data Facebook stores about its users. From Facebook keeping phone call and text message meta data of Android users, to Cambridge Analytica using Facebook data to profile and micro-target users for political purposes, it is clear that Facebook tracks a lot of user activity. You can get a copy of your Facebook data and see how much Facebook really knows. 

Read More