±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 1
New Yesterday: 4
Overall: 28823
Visitors: 46

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 241

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Mobile threat to company data exposed by security experts

Monday, September 13, 2004 (08:35:38)
Companies must be more vigilant about employees using mobile devices – such as iPod music players and personal digital assistants (PDAs) – at work, security experts warned today.

A computer forensics study into the latest Mini iPod, conducted by corporate investigators The Risk Advisory Group (TRAG), shows that mobile devices can be used to easily download vast amounts of confidential company information...

More (Personnel Today)

Peterson Testimony Turns to Computer Data

Thursday, September 09, 2004 (06:47:58)
Testimony in Scott Peterson's murder trial returned to what investigators found in his computers as prosecutors try to prove Peterson researched the San Francisco Bay before dumping his pregnant wife's body there...

More (Sun Herald)

New download: A National Research and Development Agenda (ISTS)

Monday, September 06, 2004 (11:10:31)
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this document we present the top band of critical problem areas encountered during cyber attack investigations that may be addressed through research and development. Solving the needs outlined in this work would significantly increase law enforcement's ability to investigate and prosecute cyber attack cases. We offer this agenda to serve as a resource for decision makers, developers, and researchers, in government, industry, and academic institutions across the country.

View download page

E-crime and computer evidence conference (ECCE) 2005

Sunday, September 05, 2004 (14:38:55)
ECCE 2005 will consider aspects of digital evidence in all types of criminal activity, including timelines, methods of evidence deposition, use of computers for court presentation, system vulnerabilities, crime prevention etc.

ECCE 2005 is an international conference and will be held at the Colombus Hotel, Monaco on the 29th and 30th of March 2005. Registration is now open and the first set of abstracts have been accepted and made available online.

ECCE website

NSRL and Recent Cryptographic News

Sunday, September 05, 2004 (14:22:31)
The NSRL staff have received questions about the announcement of a SHA-0 collision at the CRYPTO 2004 conference, as well as other collisions. NIST staff from the Computer Security Division were in attendance, and the statements here are meant to reflect the ramifications of the announcement on the NSRL, not on general cryptography nor on hashing applications elsewhere. One of the NIST attendees has communicated to the NSRL project that "nothing presented at Crypto 2004 indicated that SHA-1 has been broken."

Read full statement (NSRL)

Arcadia PD has own computer forensics specialist

Sunday, September 05, 2004 (14:16:27)
Detective Scott Elenberger started the Arcadia Police Department's computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he's retrieving digital evidence that's helping the District Attorney's Office file charges against suspected criminals...

More (PasadenaStarNews.com)

Paper: Steganography for the Computer Forensics Examiner

Saturday, September 04, 2004 (16:55:40)
"An Overview of Steganography for the Computer Forensics Examiner" by Gary C. Kessler

Abstract

Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented.

Read the full paper

Ashcroft wins Internet wiretap system

Saturday, September 04, 2004 (14:28:56)
U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.

At issue is the 1994 Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates surveillance backdoors in U.S. telephone networks, allowing the FBI to start listening in on a target's phone calls within minutes of receiving court approval. Last March, the Department of Justice, the FBI and the U.S. Drug Enforcement Administration jointly petitioned the Federal Communications Commission (FCC) for a ruling that cable modem companies and other broadband providers are also covered by the law.

More (SecurityFocus)

PivX Solutions Announces Computer Forensics Partnership Agreement

Tuesday, August 31, 2004 (16:30:10)
PivX Solutions, Inc. has announced a partner agreement to expand the company's nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.

Last Call for DIGEV 2004 Web Conference Registrations

Monday, August 30, 2004 (07:53:32)
Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can't make the date all presentations will be archived for future viewing.

They've secured a world-leading speaker line-up...I guess it's easier to secure such a distinguished line-up when you're asking the speakers to only take 60 minutes out of their schedule, not 5 days!!!

http://www.digev2004.com