The digital breadcrumbs in the Parkland, FL shooting: Were they followed?

  As more details emerge from the horrible mass shooting in Parkland, Florida on February 14, 2018, one item of interest is a YouTube comment left on a channel created by a man named Ben Bennight of Mississippi. Mr. Bennight noticed a disturbing comment left by someone with the YouTube account name of “Nikolas Cruz”

How to Prevent your Computer from Being Used by Cybercriminals

  Cyber attacks and warfare are among the greatest threats to the United States. The federal government and private industry spend billions of dollars every year in people and technology to defend critical systems and data. Our cyber defenders must stop the threat every time an intrusion attempt is made, but our adversaries only have

Finding Deleted URLs in Mozilla Firefox places.sqlite File

Issue: URLs visible within the places.sqlite database file when viewing the file in hex view that are not visible when viewing the file in SQLite Manager or FTK’s viewer.  The URLs seen in hex view are relevant to the investigation. Test Information: Path for Mozilla information (Windows XP):  C:\Documents and Settings\%user%\Application Data\Mozilla\Firefox\Profiles\%uniquevalue%.default\ OS:  Windows XP SP 3, 32

Understanding Peer to Peer Investigations in Child Exploitation Cases

Peer-to-Peer (P2P) file sharing is one of the fastest and easiest ways for individuals around the world to obtain and trade images and videos of child sexual exploitation.  As of October 2007, the Wyoming Internet Crimes Against Children (ICAC) Task Force has captured 377,044 unique computers sharing image and movie files containing child sexual