Flashpoint, a business intelligence agency specialising in the deep and dark web, recently published a report on the economy of criminal networks online. The report looks not only at where criminals go to communicate on the internet, but also how their communications are structured, and the ways in which online communication has changed the criminal landscape.
Far from the kind of jack-of-all-trades portrayed in TV dramas, today’s cybercriminals structure their operations much like a business, each person having their own specialisms and reporting to the people above them. This helps to ensure that every member of the network takes on tasks that don’t overwhelm them, and often also ensures that the level of communication is kept to a minimum. Each party is only in contact with the level directly above, thus decreasing the likelihood of breaking up the entire network if a single individual’s identity is uncovered by law enforcement.
Read the full article on ForensicFocus
The other day I interviewed John Patzakis, Executive Chairman at X1 Discovery, about an article he’s written about a new amendment to Federal Rule of Evidence 902.
Subsection (14) will come into play this December, and will mean that all electronic data will be required to be “self-authenticating”.
A nice cheerful topic to start us off on a Monday morning.
I wrote a thing for Forensic Focus about how it’s quite difficult to investigate the live streaming of child sexual abuse online, but how we should do it anyway.
I am a private investigator. By definition, that means I investigate things that are… well, private. I snoop around in people’s business to find out what’s going on, and then I present the evidence back to the client.
I am also a privacy advocate.
Somehow I always end up testing forensics software while I’m in Spain. Last time this involved me attempting to discuss digital forensics concepts with the guy in the tech shop at the end of my friend’s street, using my very rusty Spanish but somehow managing to get by.
This time it was slightly easier, because it didn’t involve external hardware and the tool worked exactly how it was meant to.
A couple of weeks ago (when I was blogging about my mind being confused because I was working on New York Time), I did the FTK Advanced Live Online Training course.
It’s run by Syntricate, which is the training body of AccessData, although they offer courses from most of the well-known digital forensics companies.