±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 34714
New Yesterday: 0 Visitors: 220

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Webinars

Page 299

Computer Evidence: Collection & Preservation

Saturday, October 22, 2005 (12:39:00)
Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because these two phases of computer forensics are the most critical to evidence acceptance, but are not thoroughly covered in text or courses. Throughout the book, a constant eye is kept on evidence dynamics and the impact investigators can have on data integrity while collecting evidence.

More (HNS)

Secret tracking codes in laser printers cracked

Friday, October 21, 2005 (14:02:59)
The pages that are printed by your colour laser printer may include tiny dots, almost invisible to the naked eye. The dots form a code that can be read by the US Secret Service, ostensibly to track down counterfeiters. Now, for the first time, the code has been cracked. The Secret Service has admitted before that the tracking information is part of a deal struck with selected colour laser printer manufacturers – including Xerox, Canon and many others. If a colour laser printer is used to forge a document and agents get sight of the document, the codes can be read. However, the full nature of the private information encoded in each document was not previously known...

More (Out-Law.com)

Cybercrooks lure citizens into international crime

Thursday, October 20, 2005 (16:39:56)
Consumer-level financial fraud has been around since thieves first thought to filch blank checks from mailboxes. The Internet has taken it to a new level, not yet fully understood by the general public. By many measures, 2005 is shaping up as a watershed year for e-commerce — and cybercrime...

More (USATODAY.com)

Cyber crime and the Indian Police force

Wednesday, October 19, 2005 (13:34:29)
I am often quizzed by friends on how savvy the Indian Police are in handling cyber crime. Although it is a few years since I left the force, I have been closely following trends of cyber investigation and Court decisions. I am generally pleased with what I have seen or heard. A few victim organisations have actually told me that they have been happy with the style of approach of cyber crime cells in receiving complaints and disposing of them in the manner prescribed by law. This satisfactory situation is the outcome of a heavy emphasis on training by the police leadership and the involvement of private industry and bodies such as the Nasscom in providing the necessary inputs...

More

Computer forensics rises up the legal agenda

Tuesday, October 18, 2005 (15:18:55)
The legal profession is responding to the increasing importance of digital evidence in legal cases by extending its professional development training to include computer forensics. In the first of a series of presentations to 23 Essex Street, information forensics specialists Andy Clark and Nick Spenceley, directors of Inforenz, spoke about The Hidden Life of Documents. They demonstrated how rigorous forensic investigation can reveal unexpected information about computer files such as how, when and by whom they are created. They were also able to show how such data has provided key evidence for both prosecution and defence in a wide variety of criminal cases. The Inforenz talk was followed by a presentation by barristers from 23 Essex Street about the legal issues surrounding the use of digital evidence.

Specialist police units tackle computer crime

Sunday, October 16, 2005 (16:45:59)
In April 2001, the government established a National Hi-Tech Crime Unit (NHTCU) to combat the growth of computer crime and solve serious crime. Some 43 local Hi-Tech Crime Units (HTCUs) were also set up to tackle similar offences at a regional level. But according to detective chief superintendent Sharon Lemon, head of the NHTCU, more needs to be done to educate the 140,000 police officers in England and Wales about how technology can provide digital clues to solve crimes...

More (computing)

TSK 2.03 and Autopsy 2.06 now available

Friday, October 14, 2005 (13:51:04)
From the TSK/Autopsy announcement list:

TSK 2.03 and Autopsy 2.06 are now available. They are mostly feature upgrades (there is 1 important bug fix in TSK for AMD64 users though!). The biggest new feature is Unicode support (which was kindly funded by I.D.E.A.L. Technology) for all file systems. Autopsy also now supports Unicode and has new a new CSS HTML design. All AMD64 users should upgrade because the previous versions of MD5 and SHA1 produced incorrect values.


http://www.sleuthkit.org/sleuthkit/

MD5: 79821dedfcefba9f0e9e873edcb8aaa5

http://www.sleuthkit.org/autopsy/
MD5: 4acb0b5854939748d9c5f58bd28ac2a5

Submissions Being Accepted for Timothy Fidel Award for Excellence

Thursday, October 13, 2005 (12:31:50)
Building on the success of the inaugural Timothy Fidel Memorial Award, Guidance Software along with AccessData, today announced the Timothy Fidel Memorial Award Committee. The Committee was created as the decision making body for the award which is given in memoriam of Special Agent Tim Fidel, who was a pioneer and tireless advocate of cyber forensics...

FBI Shows Off Cyber Crime Lab In KC

Wednesday, October 12, 2005 (19:48:02)
Several attorneys general from the Midwest got a closer look at how to fight cyber crime Monday. The group visited the FBI's regional computer forensics lab in Kansas City to learn more about their software...

More (KMBC-TV)

Juris e-prudence

Tuesday, October 11, 2005 (17:00:05)
The 'paper trail' no longer consists of paper. More than 90 percent of all business documents are now created digitally, and computer forensic techniques allow recovery of evidence invisible to most computer users. So if you think your organization is prepared to face a lawsuit, you may want to think again. If you have not yet got the message about e-mail retention delivered by a Florida state judge to Morgan Stanley back in May, then be afraid. Be very afraid...

More (CIO)