Prudent Design Principles for Digital Tampering Experiments

Mark: Okay. Good afternoon. Welcome to the next full paper session. We have three papers for you in this session on forensic methods. So, Janine will start shortly with a paper on evidence tampering, we have a paper on … Read more The post… Continue reading Prudent Design Principles for Digital Tampering Experiments

E-Discovery Business Takes New Approach to Collecting and Preparing Digital Evidence to Spur Growth

Unique Wire assists service providers, corporations, law firms, and law enforcement agencies with identifying and understanding Digital Intelligence.

Unique Wire, a digital forensics and e-discovery business focused on helping service providers, cor… Continue reading E-Discovery Business Takes New Approach to Collecting and Preparing Digital Evidence to Spur Growth

OpenText’s Chuck Dodson on Digital Evidence Management and Information Sharing

Christa Miller: “Digital evidence is piling up quickly for law enforcement across the globe. In today’s challenging world of evidence management, investigators and detectives often have to access multiple systems to collect evidence… Continue reading OpenText’s Chuck Dodson on Digital Evidence Management and Information Sharing

Theory and Practice of the Use of Digital Evidence in Polish Criminal Court Proceedings

Hello, my name is Piotr Lewulis and I am Assistant Professor at the Faculty of Law and Administration at the University of Warsaw and in today’s short presentation I will talk briefly about how the theory of digital evidence collides … Rea… Continue reading Theory and Practice of the Use of Digital Evidence in Polish Criminal Court Proceedings

What we know (and don’t know) about a rash of Middle East mystery hacks

A spate of apparent security breaches has intensified what was already a tense geopolitical situation among the Persian Gulf states. Over the last two weeks, the following incidents have allegedly occurred: a Qatari government media outlet was supposedly hacked to plant bogus quotes attributed to current Qatari Emir Sheikh Tamim; damaging emails belonging to UAE’s ambassador to the U.S. Yousef Al-Otaiba were leaked, and someone hacked the Twitter account of Bahrain’s Foreign Minister Khalid Al Khalifa to post propaganda associated with a Shiite militant group. Evidence is lacking for some of those claims, and the degree to which the events are related is not clear, but hackers are taking the blame, and the allegations alone have been enough to amplify tensions. All three storylines have been prominent in regional press outlets and are now being used as supporting evidence for the breakdown of relations between Qatar and the other Gulf Cooperation Council (GCC) nations. […]

The post What we know (and don’t know) about a rash of Middle East mystery hacks appeared first on Cyberscoop.

Continue reading What we know (and don’t know) about a rash of Middle East mystery hacks