±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 12
Overall: 26990
Visitors: 68

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 418

UK police tackle mounting internet caseload

Saturday, April 23, 2005 (07:42:03)
British police are refining their crackdown on internet p----philes as a swelling caseload of offences involving the downloading of images of child abuse pushes computer forensics teams to their limits. According to police sources over 300 people a month are still being referred to special police units. This is despite the success of 'Operation Ore' which led to the names of 7,272 suspects being passed to forces in the UK after US police broke up a p----phile website operation...

More (The Register)

Data Recovery: What to do when back-ups break down

Friday, April 22, 2005 (06:39:31)
Businesses are so reliant on their data that only the very naive do not make regular back-ups. And if lack of business sense prevents some companies from running sensible housekeeping routines, new and stringent legislation now requires businesses to keep data available for the purpose of audit trails and data protection compliance. Traditionally, back-up and data archives were the preserve of the finance director, who needed a record of data to complete year-end figures for the Inland Revenue. However, post-Enron and WorldCom, corporate governance has extended to keeping an audit trail of all transactions for regulated industries, and to maintaining records of business-critical documents for others...

More (ComputerWeekly.com)

Leave it to the expert

Thursday, April 21, 2005 (06:23:29)
Cyber crime investigation is not merely one of finding out how a computer system was hacked. It is sometimes also about how a system has been used to facilitate a conventional crime, such as a homicide or an extortion. There are any number of criminal investigations these days that call for an analysis of e-mail traffic between members of a criminal gang or between an aggressor and a victim...

More (The Hindu Business Line)

Messages Can Reveal Sender’s Real Agenda

Wednesday, April 20, 2005 (15:22:39)
E-mails are becoming a major part of investigative trails, whether they involve criminal activity, civil lawsuits, regulatory examinations or internal malfeasance within a company. Often more conversational and informal than paper documents, they can reveal the intent or motive of an individual under investigation – providing a critical piece of evidence needed to prove a crime was committed. They are routinely requested in lawsuits, particularly those filed by the Securities and Exchange Commission and other regulatory agencies. They also may be part of a company’s internal investigation into sexual harassment and other claims. Yet many executives and employees continue to use e-mails freely and carelessly, often unaware of how devastating they could be...

More (LA Business Journal)

Interview with Brian Carrier, author of “File System Forensic Analysis"

Tuesday, April 19, 2005 (05:02:20)
Brian Carrier specializes in digital forensics and is the writer and maintainer of The Sleuth Kit and Autopsy, which are open source forensics tools. In this interview with IT-Observer he discusses digital forensics topics as well as his book...

More (IT Observer)