Identifying the method which an attacker used to harvest important account credentials, while the security logs are deleted

Is there a way to spot the method which an attacker used to do all of the necessary credential dumping, or stealing/forging tickets/using pass-the-hash/ticket techniques, if we don’t have access to the DC security log files, but only from … Continue reading Identifying the method which an attacker used to harvest important account credentials, while the security logs are deleted

Can voice analysis be used to determine if voice samples converted in two different ways are from the same person?

Suppose we have two voice samples, A and B, which are converted from the same person’s voice into different voices respectively by a voice changer. In addition, let us assume that the voice conversion causes severe loss of the original voi… Continue reading Can voice analysis be used to determine if voice samples converted in two different ways are from the same person?

Comparative soil analysis could drastically reduce crime search areas

We’ve all seen episodes of CSI where the distinctive dirt on a suspect’s shoes or car is only found in one specific location. While that scenario is a bit far-fetched, new research shows that forensic soil analysis could be used to eliminate large geog… Continue reading Comparative soil analysis could drastically reduce crime search areas

Risks of Evidentiary Software

Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example).

Bugs and vulnerabilities can lead to inaccurate evidence, but the proprietary nature of software makes it hard for defendants to examine it.

The software engineers proposed a three-part test. First, the court should have access to the “Known Error Log,” which should be part of any professionally developed software project. Next the court should consider whether the evidence being presented could be materially affected by a software error. Ladkin and his co-authors noted that a chain of emails back and forth are unlikely to have such an error, but the …

Continue reading Risks of Evidentiary Software