±Forensic Focus Partners

Become an advertising partner

±Your Account


Nickname
Password


Forgotten password/username?


Membership:
New Today: 3
New Yesterday: 8
Overall: 28970
Visitors: 96

±Follow Forensic Focus

Join our LinkedIn group

Subscribe to news

Subscribe to forums

Page 241

Search on This Topic: News

[ Go to Home | Select a New Topic ]

New downloads

Monday, October 04, 2004 (19:53:10)
The following files have been added to the downloads area:

The Sleuth Kit Version 1.72 (source code)
Autopsy Forensic Browser Version 2.03 (source code)
PDA Forensic Tools:An Overview and Analysis
ACPO Good Practice Guide for Computer based Electronic Evidence
Hi-Tech Crime 2004 - the impact on UK business

The downloads area can be accessed here

Helping investigators gather crime evidence from PDAs

Monday, October 04, 2004 (10:00:18)
Researchers from the National Institute of Standards and Technology recently examined a number of software tools designed to acquire information from operating systems used in most PDAs: Palm OS, Microsoft Pocket PC and Linux. The researchers examined the tools in a range of situations commonly encountered during a forensic examination of PDAs. For example, the researchers wanted to determine if tools could find information, including deleted information, associated with applications such as calendars, contacts and task lists. The tools also were examined to see if someone could obtain the user's password and gain access to the contents of the device.

More (EurekAlert)

Police get help to cope - horrific scenes make counseling necessary

Monday, October 04, 2004 (09:56:19)
Modern policing puts an emphasis on mental health, said J. Mark Hall, a psychologist with a private practice in Glastonbury. He works with troopers from the state police computer crimes unit. Those officers spend their days trying to lure pedophiles through Internet chat room conversations. Hall’s job is to check up on the troopers and talk about how the work affects them.

More (News Times)

Washington/Seattle University program trains cybercrime fighters

Monday, October 04, 2004 (09:48:46)
The UW, Highline Community College (HCC) and Seattle University are teaming up to offer a joint computer forensics program, aided by a $270,000 grant from the National Science Foundation.

After completing the 12 to 18 month program, students will earn a certificate in the newly emerging field of computer forensics.

More (The Daily)

The Role of Computer Forensics in Stopping Executive Fraud (Sample Chapter)

Saturday, October 02, 2004 (19:03:07)
"Virtual evidence is an important part of nearly every modern corporate crime investigation, and proper handling of that evidence can mean the difference between a conviction and a criminal walking free. In this chapter, you'll learn how to properly investigate computer evidence in a corporate environment."

More (informit.com)

Feds invite comment on Internet wiretaps

Thursday, September 30, 2004 (09:44:42)
The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.

More (Security Focus)

SC Magazine Forensic Tools Group Test

Thursday, September 30, 2004 (08:57:00)
A group test of the major players in the forensic acquisition/analysis market:

http://scmagazine.com

Seminar on criminal investigations in Goa, October 9th

Wednesday, September 29, 2004 (05:39:56)
A two-day seminar on ‘Crime investigation - modern techniques’ will be inaugurated at the Goa International Centre, on October 9. The inaugural session of the seminar will have a plenary lecture on ‘Computer crimes and cyber forensics’ delivered by the DIG (CID), Mr Muktesh Chander.

More (Navhind Times)

Forensics gains credibility at Purdue

Wednesday, September 29, 2004 (05:35:14)
Chris Marsico, a graduate student, is using this semester to focus on the forensic possibilities of devices like iPODs. Just this summer, a group of car thieves in the UK was arrested, due in part to evidence discovered on an iPOD.

"You have to be prepared for anything; criminals are crafty," Marsico said.

After graduation in May, Marisco hopes to work for the FBI. But for now, his concern is developing a standard practice regarding how digital evidence may be used in court.

More (The Exponent)

Digital Investigation - Issue 3

Sunday, September 19, 2004 (09:30:06)
From Matthew Smaldon at Elsevier:

"I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this issue free of charge, available to download now.

These are:

Reporting security breaches: A risk to be avoided or responsibility to be embraced? Editor in chief, Eoghan Casey, debates whether companies should or shouldn't report incidents to the police. If faced with more corporate reporting could law enforcement cope?

Tool Review: Forensic analysis of windows hosts using UNIX-based tools Most examiners only use UNIX-based forensic tools when investigating a UNIX system. However, such tools are excellent for examining Windows hosts. Cory Altheide writes a 16 page technical report on how to use Linux as a platform for forensic analysis and all the advantages it can bring to an investigation.

Download these articles at http://www.digitalinvestigation.net"