Getting an Edge on Online Threat Actors
Johnmichael O’Hare Law enforcement agencies must contend with the proverbial double-edged sword when they attempt to chase down crime in the online world. On one side, threat actors leave a trail of information through Internet activity, social media posts and cell phone use which investigators can track. But, on the other side, those same actors – if sufficiently knowledgeable – can use born on the Web techniques to conceal their activities and evade detection. The same dichotomy also surfaces when…