Schedule a Demo

Combating ransomware attacks with dark web investigations

Ransomware attacks are on the rise, but sophisticated dark web forensics and tools are helping investigators to transform the dark web from a murky and lawless online environment, into a treasure trove of evidence and information. In the 1900s, organised crime was personified by Al Capone, Frank Costello and John Gotti — infamous names that are still known today, even though they operated in a limited geographical area.

All Posts

Combating ransomware attacks with dark web investigations

Ransomware attacks are on the rise, but sophisticated dark web forensics and tools are helping investigators to transform the dark web from a murky and lawless online environment, into a treasure trove of evidence and information. In the 1900s, organised

How Optical Character Recognition (OCR) Revolutionizes eDiscovery and Online Investigations

Businesses generate documentation and data at a rapid pace, both on and offline. Industries like banking and the financial sector regularly manage thousands of different types of documents. Keeping up with this cumulative documentation can be difficult an

What Is Chain Of Custody?

Chain of custody, in a legal context, can refer to both physical and electronic evidence. With the huge increase in the leverage of the latter within litigation cases, today, chain of custody is a key requirement of any eDiscovery process.

What Is A Legal Hold?

Unlike some other eDiscovery processes, a legal hold reaches far beyond your legal department and can potentially impact personnel across your whole business.

What Is Optical Character Recognition (OCR)?

Optical character recognition (OCR) offers organizations the opportunity to get a much better digital handle on the information they store.

5 Social Media Investigation Tools That’ll Save You Time & Reduce Frustration

Social media offers investigators incredible opportunities to collect evidence. There are plenty of examples on the Internet of supposedly injured individuals posting runs and rides on Strava and incriminating car crash footage making its way onto YouTube

Cybercrime Update: CatPhishing

Ways to Protect Yourself Online from "Crooked Sweethearts" Catphishing (or “Catfishing”) is a “romance scam” and form of fraud, highly popularised by the use of social media networks, online chat forums and documentary-turned television series by the same

The Eerie Evolution of Deepfake Videos – Can Your Collection Methods Keep Pace?

Not long ago, deepfake videos – videos that portray something in a very convincing way but are actually entirely false - were something that largely existed in Hollywood – the product of special effects studios and experts trained to make the fictional se

How to Capture Evidence on Facebook – Before it Disappears

On January 7th, 2025, Meta announced they will be making major changes to content moderation policies on all their owned platforms, including Facebook: ending third-party fact-checking in the US in lieu of a new "Community Notes" feature, lifting restrict

The Power of Precedent in a Digital Age

Those who practice law understand and appreciate the power of precedent. As technology evolves, and as our digital world continually expands, the law is evolving with it. Courts across the country are continuing to examine social media as evidence the sta

    The Facebook OSINT/SOCMINT Investigation Guide

    Facebook's large user base and immense data collection make it a goldmine for Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT) investigations.

    The Discord OSINT/SOCMINT Investigation Guide

    Discord is a treasure trove of real-time, contextually rich digital interactions, offering OSINT investigators unprecedented access to diverse community conversations, user networks, andthe various digital file types shared through its interconnected server ecosystem. These insights can be pivotal for open-source intelligence (OSINT) investigations.