±Forensic Focus Partners
|New Today: 0||Overall: 33324|
|New Yesterday: 0||Visitors: 150|
Back to top Skip to content Skip to menu
More (Computer Weekly)
Page 295Back to top Back to main Skip to menu
Tuesday, March 22, 2005 (17:43:33)The police have long complained that organisations that are the victims of computer crime are reluctant to come forward for fear an investigation will cripple their business as the police seize servers and PCs as evidence. On the other hand, businesses have repeatedly complained that the police lack the skills and resources to properly investigate cybercrime...
Tuesday, March 22, 2005 (13:24:48)A new paper, "Computer Forensics â€“ A Business Tool", by Andy Fox of Audax Digital Forensics is now online and can be read at
Tuesday, March 22, 2005 (11:36:30)Blue lights flashed inside the Menlo Park office suite, a signal to the "propeller heads'' -- highly trained forensic computer examiners -- that fellow FBI agents had arrived with another cyber-mystery for them to solve. This one was buried somewhere in the pair of Compaq hard drives they had seized in January from Victor Conte Jr. The agents handed over the drives wrapped in opaque pink plastic bags and filled out the case files with what they were seeking: any evidence that the Balco mastermind illegally leaked the grand jury testimony of Barry Bonds and others to the media...
Monday, March 21, 2005 (10:28:44)Electronic crime detection experts are working with police and forensic detectives in a Scottish university to establish new techniques to detect cyber crime, especially CP. "Anybody using a computer leaves a trail, and it's very hard to cover that trail completely," says Ian Ferguson of Strathclyde University's Computer and Information Science department. "We call it 'leaving footprints in the digital flowerbed' and the detective work comes in finding the individual signatures - like phrases, structures of sentences, habits of using capitals in certain places. "In e-mail stalking cases these begin to form a pattern, and that pattern is invariably repeated somewhere...
Sunday, March 20, 2005 (12:38:28)The FBI's Regional Computer Forensics Laboratory (RCFL) initiative has been chosen as one of the "Top 50" programs in the 2005 Innovations in American Government Awards competition. The RCFL Program is a national network of one-stop, full-service digital evidence laboratories. The FBI provides start-up and operational funding, training, personnel and equipment, while local area law enforcement agencies assign personnel to work as Examiners...
Friday, March 18, 2005 (19:25:15)Police in London say they have foiled one of the biggest attempted bank thefts in Britain. The plan was to steal Â£220m ($423m) from the London offices of the Japanese bank Sumitomo Mitsui. Computer experts are believed to have tried to transfer the money electronically after hacking into the bank's systems. A man has been arrested by police in Israel after the plot was uncovered by the National Hi-Tech Crime Unit...
Friday, March 18, 2005 (19:21:25)Five European governments are setting up a hi-tech team to monitor how terrorists and criminals use the net. The group will make recommendations on shutting down websites that break terrorism laws. The plans for the initiative came out of a meeting of the G5 interior ministers in Spain that discussed ways to tackle these threats...
Friday, March 18, 2005 (13:24:18)Forensics was a word repeated throughout this week's SecureWorld conference. Experts mentioned the media firestorm that has enveloped ChoicePoint and other companies where hackers were able to steal mountains of consumer data that could eventually be used for identity theft and other cybercrimes. The bad news is that every business can be hacked no matter how seriously executives take security, experts said. The good news is that companies can keep their reputations intact by responding the right way to a cyberheist. And that's where forensics is vital. It's all about knowing what not to touch and who to call the moment you think you've been hacked...
Thursday, March 17, 2005 (14:18:44)During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless, there remains an important distinction between a preview operation and lab work: by its nature, the preview is very likely to contaminate original evidence...
Thursday, March 17, 2005 (09:38:01)Proposals to create a professional institution that would set minimum standards of professionalism for IT security specialists have won backing from the government and leading businesses. The form the institute will take has yet to be decided. One of the options under consideration is the creation of a new body from the Institute for Communications Arbitration and Forensics, with assistance from the British Computer Society and other IT security bodies...
More (Computer Weekly)