±Forensic Focus Partners
|New Today: 0||Overall: 32340|
|New Yesterday: 0||Visitors: 127|
Back to top Skip to content Skip to menu
More (RIAA p2p file share defeat)
Page 242Back to top Back to main Skip to menu
Monday, March 27, 2006 (11:00:18)He is alone in front of his computer, and with the click of a button, his crime is erased -- or so the technically savvy criminal may think. And to extract the evidence from computer hard drives, cell phones, personal digital assistants and iPods, law enforcement agencies are turning to federal, state and private computer forensics experts to delve into the digital data's depths...
Saturday, March 25, 2006 (21:58:22)As part of their investigation into illegal music downloading, the RIAA demanded full access to a suspect's computer, which the accused felt was a violation of her privacy. The judge agreed with her and is letting her hire her own forensics expert, and bill the RIAA for any expenses...
More (RIAA p2p file share defeat)
Wednesday, March 22, 2006 (10:47:45)The attraction of computer-based crime is obvious. Twenty years ago corporate spies would find it difficult to steal the entire contents of a filing cabinet, but today they can take far more by slipping a disc into their pocket or e-mailing data to an online electronic swag bag. It is much easier to steal, leak, manipulate or destroy electronic data. But just as in the physical world, cyber-criminals leave their electronic fingerprints all over a digital crime scene...
Monday, March 20, 2006 (11:30:54)When a computer, cell phone, e-mail or other high-tech device holds the key to a crime, cyber sleuths are called to dissect the digital evidence. In south Alabama, it's Gus Dimitrelos, who is based in a Spanish Fort police office at a sprawling new retail district off Interstate 10. Besides a Secret Service lab in Birmingham for prosecutors' use, two more regional computer forensic evidence labs will open in Montgomery and Huntsville - an expanding project, with federal funds, to move the state's investigative operations into the cyber age...
Thursday, March 16, 2006 (12:02:58)As an information technology specialist, Troy Wallwork has seen the secrets inside plenty of computers, from financial records to love letters. But when a recent search of one customer's PC turned up what looked like CP, he didn't know what to do. On the one hand, his company's reputation depends on preserving clients' privacy. On the other, he said the pictures he found were just too graphic to ignore, so he called the police...
Wednesday, March 15, 2006 (08:48:41)Michael Cantara gets a knot in his stomach when he thinks about the backlog of computers that have yet to be analyzed as evidence in CP cases. Cantara, commissioner of the Department of Public Safety, asked lawmakers Monday to give him two more investigators to address the 60-case backlog...
Wednesday, March 15, 2006 (08:45:19)A regional conference on the theme Credit Card Frauds opened in Skopje on Tuesday. SECI's Task Force on Combating Financial and Computer Crime organized the event. The conference brought representatives of 12 member-states of the SECI Regional Center for Combating Transborder Crime...
Tuesday, March 14, 2006 (12:57:41)...when the tape proved too fuzzy to use, investigators turned to one of the most sophisticated forensic labs in the country to help solve the case -- at the Target Corp. The retailer's technicians cleaned up the tape and helped identify the suspect, leading to his arrest and conviction. It was one of the first cases in Target's surprising, and rapidly expanding, role as national crime fighter...