Your Host
Sharon D. Nelson

Sharon D. Nelson is president of the digital forensics, information technology, and information security firm Sensei Enterprises. In addition...

John W. Simek

John W. Simek is vice president of the digital forensics and security firm Sensei Enterprises. He is a nationally...

Following the terrorist attacks in Paris, French officials used metadata from a phone they found in a trashcan to gather information that made it possible to raid ISIS safe houses within a week. During these raids they were able to kill the suspected mastermind behind the operation, who was believed to be planning more attacks. Using a combination of cyber forensics and traditional police work, the French identified and successfully raided the purported hideout of the suspected ringleader. Considering our advanced technology, many are left questioning how this happened in the first place? And looking forward, can governments really prevent future acts of terrorism by building backdoors into encryption?

In this episode of Digital Detectives, Sharon Nelson and John Simek discuss the digital forensics of the Paris attacks and the aftermath, including a surfacing argument about cryptic communication, the response from French, British, and American governments, and how Anonymous, the hacker group, has gotten involved. Beginning with a chronology of events, Sharon walks through the events of last Friday. Citing a BBC article published after the Paris attacks, the hosts analyze how the investigation involved traditional and technological means to gather information about the armed attackers and their whereabouts. In addition to fingerprints and DNA, the investigators used witness video footage, mobile phone triangulation, wifi networks, and IP addresses to correlate intelligence and quickly move in on the suspects. John explains how a comment made by Belgium’s Interior Minister about PlayStation 4 network encryption was misinterpreted and carried away by news media, engaging governments in discussions about legislation that could allow encryption backdoors. Is encryption really the problem and is more government control the solution?

Stay until the end of the podcast to hear about Anonymous’s war on ISIS and the hypocritical nature of ISIS’s use of social media.

Full Transcript

 View Transcript

Brought to You by
Episode Details
Published: November 20, 2015
Podcast: Digital Detectives
Category: Legal Technology
This Podcast
Digital Detectives
Digital Detectives

Sharon D. Nelson and John W. Simek invite experts to discuss computer forensics as well as information security issues.

  iTunes   Google Play
More Episodes
Kaspersky Lab: Friend or Foe?

David Ries talks about whether Kaspersky Lab is safe for lawyers to use, diving into where the controversy started and what the results have...

A Breach of Trust: The Aftermath of the Equifax Hack

This legal technology podcast covers the Equifax breach including who was affected, the resulting lawsuits, and whether or not the hack was preventable.

How Lawyers Should Use Spreadsheets

Ben Kusmin talks about the proper handling and format of spreadsheets.

Crisis Management After a Data Breach

In this legal technology podcast, Brian Wommack talks about the correct way to handle a data breach.

Cybersecurity 2.0: Creating Order from the Regulatory Landscape to Build a Strategic Advantage

Denver Edwards discusses cybersecurity, including the National Institute of Standards and Technology’s (NIST) cybersecurity framework.

Ethical Issues with Confidential Data

In this legal podcast, Jim McCauley talks about ethical issues lawyers face and how the Virginia Bar is helping to educate lawyers on how...