±Partners and Sponsors

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 0
New Yesterday: 13
Overall: 26773
Visitors: 70

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Subscribe to blog

Subscribe to tweets

Page 440

Investigator serves search warrants to America Online

Monday, October 11, 2004 (05:21:47)
It takes a full-time Loudoun County deputy sheriff to handle all the search warrants served on America Online in Ashburn. The warrants are used to solve local, state and national crimes.

More (The Connection Newspapers)

Technology helps police in CP operation

Monday, October 11, 2004 (05:16:42)
Australian Customs officials say the latest technologies are assisting them in detecting the importation of CP. A man will appear in court this morning after customs officers at Melbourne Airport seized computer disks from his luggage on his arrival from Amsterdam last month.

More (ABC News)

Lab cleared to examine digital evidence

Wednesday, October 06, 2004 (06:25:15)
New Hampshire’s state forensic laboratory has become the third in the United States to receive national accreditation for examining digital evidence, including images stored on computer hard-drives. The accreditation was awarded by the American Society of Crime Laboratory Directors, which spent a week in Concord interviewing staff and checking lab policies and procedures...

More (Nashua Telegraph)

New downloads

Monday, October 04, 2004 (19:53:10)
The following files have been added to the downloads area:

The Sleuth Kit Version 1.72 (source code)
Autopsy Forensic Browser Version 2.03 (source code)
PDA Forensic Tools:An Overview and Analysis
ACPO Good Practice Guide for Computer based Electronic Evidence
Hi-Tech Crime 2004 - the impact on UK business

The downloads area can be accessed here

Helping investigators gather crime evidence from PDAs

Monday, October 04, 2004 (10:00:18)
Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user's password and gain access to the contents of the device.

More (EurekAlert)