The Forensicon Blotter is a collection of events, videos and news summaries of interest ranging from Cybercrime, Corporate Fraud, Hacker Investigations, eDiscovery to Computer Forensics.

Judge: Sniffing Open Wi-Fi Networks is not Wiretapping

Chief Judge James Holderman, of the U.S. Northern District of Illinois, recently issued a ruling that exempts Innovatio’s packet sniffing from unencrypted networks as not considered wiretapping. This decision runs counter to prior decisions including the recent California judicial decision regarding the Google Street View case, where the judge suggested that communications over Wi-Fi were[…Read More]

Lost or Stolen iPhone? Tips from a Computer Forensics Expert

Losing an iPhone can be a stressful experience for anyone who depends on their phone for ongoing work and personal communications. The loss of irreplaceable photos that haven’t been backed up as well as music and other multimedia content can pose much pain for devoted iPhone users. There are a few things a user should[…Read More]

Chicago Alderman’s Office Computers Stolen

News reports today indicate that Chicago Alderman Rick Muñoz of the 22nd Ward’s offices was burglarized sometime on July 18th or July 19th, 2012. A number of computers and other equipment were discovered missing when staff returned to the office. The Chicago Sun-Times also reports that the Alderman believes his data is secure since the[…Read More]

Yahoo! Security Breach of Accounts and Passwords

It was recently revealed that users of Yahoo’s Voice product were compromised by a hacker group named “D33D Company” whose website is hosted in the Ukraine. More than 400,000 Yahoo account usernames and passwords were posted on a website in a reported effort to draw attention to the alleged lack of security at Yahoo. The[…Read More] User Accounts Compromised by Hackers, the popular business networking website recently became the latest victim of a cyber attack by rogue hackers. News sources report that millions of passwords were stolen this past month. Anyone who used the same password on as they did with their online banking password is urged to take immediate steps to check their[…Read More]

Cell Phone Tracking

That cell phone you are carrying around on you just may be tracking your every move and whereabouts. Most people today utilize cell phones to connect with their friends, navigate to their destination, or find out what is happening near them. The United States Supreme Court ruled earlier this year that attaching a GPS transmitter[…Read More]

Illinois House OK’s Citizen’s Right to Record Police While on Duty

Recently, the Illinois House approved House Bill 3944 which amends the Illinois Eavesdropping Act. Currently, a citizen can be charged with a felony if he or she record the audio of a police office acting in the line of duty without their knowledge. Cell phones and smart phones today allow for the capture of video[…Read More]

City of Chicago Website Hacked During NATO Protests

Members of “AntiS3curityOPS” claimed credit for the recent hacking of the City of Chicago’s website this past Sunday. The hack attempt allegedly had been in the planning phase for weeks, but only was executed following protesters reporting Chicago Police Department officers allegedly using physically violent tactics against protest participants. The group claims to be affiliated[…Read More]

Safe Harbor in The Cloud?

In a recent court decision [PDF] (docket), also known as “EMI v. MP3Tunes” may change the strength of Safe Harbor laws under the DMCA [PDF] for online (“cloud”) storage services–such as Grooveshark, Amazon CloudDrive, and even Google’s new Google Music. While not a cut and dry victory for either side, the recent decision by a[…Read More]

One in 10 Secondhand Hard Drives Contain Data

Recent research performed for Britain’s Information Commissioner’s Office (ICO) by NCC Group found that 11 percent of secondhand drives contain data from the original owner that is recoverable. The lack of data wiping isn’t always the end user’s fault. Often times customers send old hard drives in to computer manufacturers and trust that their personal[…Read More]