Create an account Home  ·  Topics  ·  Downloads  ·  Your Account  ·  Submit News  ·  Top 10  
Modules
· Home
· Content
· FAQ
· Forensic Downloads
· Forensics Feedback
· Forums
· Members List
· Statistics
· Surveys
· Top 10
· Topics
· Training Reviews
· Web Links
· Your Account

Our Membership

Latest: royJfischer
New Today: 1
New Yesterday: 0
Overall: 29307

Computer Forensics
This is a free and open peer to peer medium for digital and computer forensics professionals and students. Please help us maintain it by contributing and perhaps linking to us from your own website.

Recent Posts

 Loss internet connection
 Hash calculation between image and original file
 Final Year Project
 Android devices with PIN screen lock and without USBdebb. on
 Can file creation and modifications on pendrives be found?

Computer Forensics World Forums


Pages Served
We received
50427561
page views since August 2004

Security Sources

FTC
OnGuard Online
ISO 17799 ISO 27001
ISO 27000 Toolkit
ISO 27001 & 27000
Cryptography
Security Policies

Computer Forensics World: Forums

Computer Forensics World :: View topic - Investigation Process
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

Investigation Process

 
Post new topic   Reply to topic    Computer Forensics World Forum Index -> Legal Issues
View previous topic :: View next topic  
Author Message
MerriamWeb
Newbie
Newbie


Joined: May 08, 2015
Posts: 1

PostPosted: Fri May 08, 2015 11:55 pm    Post subject: Investigation Process Reply with quote

I was detained last month and my computers seized. Homeland Security held me for 8 hours. Suspected crime: Possession, distribution, and reciept of child pornography.

After 8 hours they released me and returned ALL my equipment returned back to me. The forensic specialist who examined my stuff told me on two occassions that he couldn't find ANYTHING. He also said that he couldn't even find regular pornography.

On my way out, the forensics specialist just looked me in eye and said "By the skin of your teeth."

The probable cause is that they saw that someone using my wifi IP address was recieving child pornography to a computer not found in my home. I tried to argue that I have wireless internet and that someone could have been using it.

Here's my question: Would the officers have returned the equipment if they found nothing? Because according to my research, they are not allowed to do that. But I could be wrong.

Second Question: How could someone have used my wifi if there was a password on it? It was a weak password mind you. The password WAS my phone number.
Back to top
View user's profile
athulin
Newbie
Newbie


Joined: Oct 19, 2007
Posts: 238

PostPosted: Sat May 09, 2015 3:42 pm    Post subject: Re: Investigation Process Reply with quote

MerriamWeb wrote:
Second Question: How could someone have used my wifi if there was a password on it? It was a weak password mind you. The password WAS my phone number.


But how was it configured? And what equipment does it use? And how have you been keeping it up-to-date with patches and updates, particularly in the light of the vulnerabilities found over the past couple of years?

(Added: I don't expect a reply -- if you really want an answer, ask someone who specializes in wifi security and penetration testing.)

There are dozens of ways someone can break into a wifi network in general. Some are related to weak passwords, some are related to weak cryptography, some are related to bugs in related software, for example the web application through which the wifi router is configured.

Which of these apply to your particular network -- no idea.
Back to top
View user's profile
Display posts from previous:   
Post new topic   Reply to topic    Computer Forensics World Forum Index -> Legal Issues All times are GMT + 10 Hours
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Powered by phpBB 2.0.10 © 2001 phpBB Group
phpBB port v2.1 based on Tom Nitzschner's phpbb2.0.6 upgraded to phpBB 2.0.4 standalone was developed and tested by:
ArtificialIntel, ChatServ, mikem,
sixonetonoffun and Paul Laudanski (aka Zhen-Xjell).

Version 2.1 by Nuke Cops 2003 http://www.nukecops.com

Forums ©

 

TMs property of their respective owner. Comments property of posters. 2007 Computer Forensics Science World.
Digital forensic computing news syndication: Computer Forensics Training News or UM Text
Software is copyrighted phpnuke.org (c)2003, and is free under licence agreement. All Rights Are Reserved.