±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 5 Overall: 29013
New Yesterday: 8 Visitors: 78

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

Subscribe to news

Subscribe to forums

Page 242

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Feds invite comment on Internet wiretaps

Thursday, September 30, 2004 (09:44:42)
The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.

More (Security Focus)

SC Magazine Forensic Tools Group Test

Thursday, September 30, 2004 (08:57:00)
A group test of the major players in the forensic acquisition/analysis market:

http://scmagazine.com

Seminar on criminal investigations in Goa, October 9th

Wednesday, September 29, 2004 (05:39:56)
A two-day seminar on ‘Crime investigation - modern techniques’ will be inaugurated at the Goa International Centre, on October 9. The inaugural session of the seminar will have a plenary lecture on ‘Computer crimes and cyber forensics’ delivered by the DIG (CID), Mr Muktesh Chander.

More (Navhind Times)

Forensics gains credibility at Purdue

Wednesday, September 29, 2004 (05:35:14)
Chris Marsico, a graduate student, is using this semester to focus on the forensic possibilities of devices like iPODs. Just this summer, a group of car thieves in the UK was arrested, due in part to evidence discovered on an iPOD.

"You have to be prepared for anything; criminals are crafty," Marsico said.

After graduation in May, Marisco hopes to work for the FBI. But for now, his concern is developing a standard practice regarding how digital evidence may be used in court.

More (The Exponent)

Digital Investigation - Issue 3

Sunday, September 19, 2004 (09:30:06)
From Matthew Smaldon at Elsevier:

"I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this issue free of charge, available to download now.

These are:

Reporting security breaches: A risk to be avoided or responsibility to be embraced? Editor in chief, Eoghan Casey, debates whether companies should or shouldn't report incidents to the police. If faced with more corporate reporting could law enforcement cope?

Tool Review: Forensic analysis of windows hosts using UNIX-based tools Most examiners only use UNIX-based forensic tools when investigating a UNIX system. However, such tools are excellent for examining Windows hosts. Cory Altheide writes a 16 page technical report on how to use Linux as a platform for forensic analysis and all the advantages it can bring to an investigation.

Download these articles at http://www.digitalinvestigation.net"

Mobile threat to company data exposed by security experts

Monday, September 13, 2004 (08:35:38)
Companies must be more vigilant about employees using mobile devices – such as iPod music players and personal digital assistants (PDAs) – at work, security experts warned today.

A computer forensics study into the latest Mini iPod, conducted by corporate investigators The Risk Advisory Group (TRAG), shows that mobile devices can be used to easily download vast amounts of confidential company information...

More (Personnel Today)

Peterson Testimony Turns to Computer Data

Thursday, September 09, 2004 (06:47:58)
Testimony in Scott Peterson's murder trial returned to what investigators found in his computers as prosecutors try to prove Peterson researched the San Francisco Bay before dumping his pregnant wife's body there...

More (Sun Herald)

New download: A National Research and Development Agenda (ISTS)

Monday, September 06, 2004 (11:10:31)
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this document we present the top band of critical problem areas encountered during cyber attack investigations that may be addressed through research and development. Solving the needs outlined in this work would significantly increase law enforcement's ability to investigate and prosecute cyber attack cases. We offer this agenda to serve as a resource for decision makers, developers, and researchers, in government, industry, and academic institutions across the country.

View download page

E-crime and computer evidence conference (ECCE) 2005

Sunday, September 05, 2004 (14:38:55)
ECCE 2005 will consider aspects of digital evidence in all types of criminal activity, including timelines, methods of evidence deposition, use of computers for court presentation, system vulnerabilities, crime prevention etc.

ECCE 2005 is an international conference and will be held at the Colombus Hotel, Monaco on the 29th and 30th of March 2005. Registration is now open and the first set of abstracts have been accepted and made available online.

ECCE website