±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 4 Overall: 29218
New Yesterday: 10 Visitors: 73

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

Subscribe to news

Subscribe to forums

Page 241

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Computer forensics aids schoolyard fight investigators

Wednesday, December 01, 2004 (08:26:20)
A second teen has been charged in a schoolyard fight that was videotaped, set to music and sold to high school students in an edited form. With the help of Beaverton computer forensics company NTI Breakwater, police were able to remove an overlay of rap music and restore the original audio track and edited segments to the recording, allowing investigators to hear what was said in the Junction City High School parking lot the evening of Oct. 21.

More (The Register-Guard)

Version 0.69 of the Honeywall CDROM released

Monday, November 22, 2004 (11:05:21)
The Honeynet Project has announced the release of version 0.69 of the Honeywall CDROM. Some key features of this new version include

- - Whitelisting: The ability to identify IP's and networks you
want to allow inbound and outbound of your honeynet, but do not want to log or alert on.
- - Blacklisting: The ability to identify IP's and networks you
want to deny inbound and outbound of your honeynet and do not
want to log or alert on.
- - Traffic Summary: Improved traffic summary reporting, with
the addition of Snort alerts, Snort-Inline alerts, and
Suspicious traffic.

More (The Honeynet Project)

Detection of 'counterfeit reality' becoming a new specialty

Friday, November 19, 2004 (07:09:59)
During the past decade, the DNA technology used to solve crimes and settle paternity suits has become a big business. The federal government alone spent $232 million this past fiscal year promoting the use of a technology that barely existed 20 years ago. Now two information-technology experts with Florida ties are predicting the use of digital forensics to police -- what they call "counterfeit reality'' -- will soon join DNA science as a growth industry.

A coming explosion of counterfeit reality -- the use of computers and digitally based media to produce fake images, video, documents or sounds -- will drive a multibillion-dollar business of detecting what is real and what is not, say Daryl Plummer and Frank Kenney, analysts with Gartner Inc., a market-research firm based in Stamford, Conn.

More (Duluth News Tribune)

Top cops of London, Delhi meet

Friday, November 19, 2004 (06:36:22)
Top officials of London Police yesterday met their counterparts in New Delhi to discuss areas of mutual interest, including cyber crime and computer forensics. Commissioner of London Metropolitan Police John Stevens and Deputy High Commissioner of Britain Mark Runacres, accompanied by senior police officials, held talks with Delhi Police Commissioner K K Paul and his senior colleagues at the police headquarters.

More (Team India)

Method Provides Double Computer Crime-Solving Evidence

Wednesday, November 17, 2004 (14:54:57)
Like an episode of "CSI: Computers," a UF researcher has developed a technique that gives digital detectives twice the forensic evidence they now have to catch all kinds of hackers, from curious teenagers to disgruntled employees to agents of foreign governments.

Writing in the current issue of the International Journal of Digital Evidence, UF doctoral student Mark Foster proposes a new and improved method of computer crime solving, called “process forensics.”

“If a guy walks into a bank and robs it, leaving footprints behind or his fingerprints on the counter, the forensic analyst would come in and find those traces of what happened,” said Foster. In the same way, process forensics merges two existing types of digital evidence – intrusion-detection and checkpointing technology – to give an investigator the most possible information to crack a case, said Foster, a computer science and engineering student conducting the research for his dissertation with UF professor of computer science Joseph Wilson, who co-wrote the paper.

More (Newswise)

Final version of NIST's "Guidelines on PDA Forensics" complete

Tuesday, November 16, 2004 (14:53:30)
Special Publication 800-72, entitled Guidelines on PDA Forensics, was developed to help organizations evolve appropriate policies and procedures for dealing with PDA forensics and to provide forensic specialists with a background on the technology, tools, and principles involved. The intended audience ranges from response team members handling a computer security incident, to organizational security officials investigating an employee-related situation, to forensic examiners involved in criminal investigations.

More (IWS)

The lighter side of data recovery

Sunday, November 14, 2004 (08:30:02)
An executive who froze his broken hard disk thinking it would be fixed has topped a list of the weirdest computer mishaps.

Although computer malfunctions remain the most common cause of file loss, data recovery experts say human behaviour still is to blame in many cases.

More (BBC)

New opensource computer forensics tool - Vital Data FoRK based on PSK

Tuesday, November 09, 2004 (14:16:26)
The team at Vital Data have finished beta testing their FoRK CD and have uploaded version 1.0.0 for all members to download. It is available at forensicIT.com.au in the General Utilities - GNU / Linux - Downloads section.

It is based on the Knoppix 3.6 LiveCD, with some customisations and additions. Bugs identified during the testing were only minor, such as identification of hard drives transposing makes with model numbers, etc. These have all been corrected. We encourage everyone to download the CD, as it is an extremely useful tool to have, and we would appreciate all the testing and feedback we can get.

Stopping Computer Crime

Tuesday, November 09, 2004 (11:19:31)
Stopping computer crime requires two basic things: You need to let criminals know it won't be tolerated by reporting and prosecuting, and tell the world what these crimes are and how folks can avoid being a victim. It's not enough to know you're under attack, or that you think you're in compliance with relevant laws—you must collect the evidence supporting your assumptions.

More (MCPmag.com)

Meticulous cybersleuth takes on high-tech cases

Monday, November 08, 2004 (13:48:42)
Just call William Simon the Sherlock Holmes of computers. The cyberspace sleuth would love the comparison. In fact, he named his business, Abberline Investigations, after his distant cousin Frederick Abberline, a Victorian-era Scotland Yard investigator.

The licensed private investigator, with more than two decades of experience in computer forensics, is the go-to guy when companies need to analyze and retrieve information stored on a computer in such a way that the information can be used as evidence in a court of law.

More (HoustonChronicle.com)