±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 6
New Yesterday: 4
Overall: 26261
Visitors: 59

±Forensics Europe Expo


±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 399

New Article: Collecting And Preserving Electronic Media

Thursday, May 05, 2005 (12:11:13)

Collecting And Preserving Electronic Media

by Joan E. Feldman, President
Computer Forensics Inc.â„¢

Criminal IT: The crime you can still get away with

Thursday, May 05, 2005 (06:40:22)
In the field of computer crime, there is one glaring problem: the law. Until relatively recently, there was no law to criminalise what might be recognised as obvious 'mischiefs' performed against computers; there was no legal framework to make hacking, viruses, denial of service or the theft of intellectual property positively illegal. That these were unwelcome activities was obvious but finding a law within which such actions could be prosecuted and punished was simply not possible...

More (Silicon.com)

Experts in distributed computing see potential for computer forensics

Wednesday, May 04, 2005 (05:52:10)
Golden Richard III, a professor of computer science at New Orleans University and a digital forensics expert, has been experimenting with using distributed computing to recover lost computer files. By harnessing the number-crunching power of several computers to work on a single chore, he has been able to crack cases that once took 45 minutes in only eight seconds. Mr. Richard said that distributed computing is especially time-saving when searching a hard drive for a single name or word. It also helps computer forensic specialists find photos that have been cropped or resized. Distributed computing in the service of solving steganographic codes—images concealed in other images—is also very helpful, said Mr. Richard...

More (Red Herring)

Cyberchase: Experts discuss benefits, risks

Tuesday, May 03, 2005 (05:47:45)
Like Hansel and Gretel [Brill explained] people leave crumbs as they wander cyberspace or work on their computer desktops. Following those crumbs, forensic scientists at Kroll have been able to trace Saddam Hussein's stolen billions; understand the implosion of Enron; and track down terrorists. Thieves can also find those crumbs, which account for the vast number of identity-theft cases in recent months, where hundreds of thousands of identities have been snatched. "We leave behind a trail of crumbs, whether we like it or not," Brill said. "It is an issue that we cannot afford to ignore as individuals, corporations or a society..."

More (The Advocate)

Computer aces sleuth for FBI

Monday, May 02, 2005 (07:56:12)
Sept. 11 turned Sung-Ki Lim and Sang Jun from geeks to G-men. Well, they're still geeks, but instead of pursuing an MBA or traveling far and wide as systems analysts, the two men are putting their technical skills to work for the FBI. As computer crime increases and as terrorists increasingly use digital technology to plot their activities, law enforcement finds that it needs to recruit from the same fields that high-tech headhunters have been plowing for years...

More (SFGate.com)