Social networking and cloud storage sites are full of useable information. They can establish who knew what about an incident or issue in question, and when they knew about it. They can help attorneys determine links between people and information, and they can go beyond a company's data archives to provide more context to a case. However, social networking sites also carry risks. It is easy for subjects under investigation to change or even remove their status updates, images and video, messages and other electronically stored information. The proliferation of cloud computing means that company data may have more custodians and be harder to preserve. In this white paper, learn more about ethical information gathering, preservation methodologies, and reporting on complex cases.
The collection, timely analysis and use of open source intelligence (OSINT) can be of immense value to an analyst. Open source information may be indistinguishable from classified information, but based on its source, may not be evaluated as trustworthy. OSINT is inherently challenging, in fact, because the very qualities that make it valuable to operations can reduce its credibility, too. In this white paper, learn how to improve quality, ease of use, and cost savings in OSINT collection.
“Dead” forensics – and even “live” forensics – only capture part of the story of a suspect's activities. Artifacts related to the Internet, social networking sites, online searches, and webmail uncover what the suspect did at just a specific point in time, while live forensics capture what's occurring in the computer's memory (but not on the suspect's online sites) while it is running. To get a full picture, online evidence is necessary. In fact, the documentation of internet-based evidence is the logical extension of digital forensic examinations.
© Copyright 2007-2013–
Vere Software. All rights reserved.
4790 Caughlin Pkwy, Suite 323,
Reno, Nevada, 89519-0907