±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36618
New Yesterday: 10 Visitors: 139

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 344

Special agent uses teen talk and computer forensics

Monday, March 06, 2006 (13:44:20)
Most weekdays, and some weekends and nights, find Special Agent James May sitting in front of a PC in his Detroit office, waiting for some cyberjohn to hit on him. Well, not him exactly, but one of his many teenage girl personas. Helping him on the technical side of his job are more than 800 classroom hours in computer forensics and Internet crimes. He's also a certified computer forensic examiner by Eastern Michigan University, where he teaches a computer crimes course...

More (LSJ.com)
  • Posted by: jamie
  • Topic: News
  • Score: 3 / 5
  • (1123 reads)

Chasing cyber-crime, one byte at a time

Friday, March 03, 2006 (20:29:24)
Tom Heflin is the resident surveillance technician and computer forensics expert for the Augusta County Sheriff's office, the department's first line of defense against computer-based crimes. His primary job: Cracking open hard drives and electronic media seized by deputies to find the nearly invisible cyber-crimes locked inside...

More (The News Leader)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (881 reads)

Battling the High Tech Crime Wave in Oregon

Thursday, March 02, 2006 (16:29:18)
If your vision of a high tech criminal is a lone hacker sitting in a college dorm, think again. In just a few short years, cyber crime has evolved from the domain of individuals seeking notoriety to sophisticated organized crime syndicates. Portland is not immune to this trend. In fact, according to the Federal Trade Commission, Oregon ranks ninth in the nation as an identity theft hot spot...

More (OregonLive.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (709 reads)

John the Ripper 1.7

Wednesday, March 01, 2006 (16:56:05)
Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what's new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and how one can choose strong passphrases (forget passwords) that are harder to break...

More (Security Focus)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1483 reads)

Navigating The Forensic Data Minefield

Wednesday, March 01, 2006 (16:13:50)
In today’s electronic environment, many high-profile cases have been solved through forensic searches of computerised media, and experienced electronic discovery professionals are now in great demand. Investigative teams should, however, remember to use electronic discovery in the context of an overall document search, focusing on subject matter and investigative targets rather than purely on the discovery methodology. If improperly employed, electronic discovery procedures can create difficulties, overwhelming investigators with truckloads of irrelevant data that may hamstring an investigation...

More (CIO Asia)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (943 reads)

NSA searches for advanced data mining tech

Tuesday, February 28, 2006 (17:14:55)
The National Security Agency (NSA) visited Silicon Valley this month on the hunt for private sector technology to beef up its already formidable snooping and signals intelligence portfolio. Data mining technologies to search for connections between seemingly unrelated snippets of information was top of the NSA's shopping list, according to venture capitalists who held meetings with agency officials...

More (The Register)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1068 reads)

Cybercrime Summit, Feb 27 - Mar 3, 2006

Friday, February 24, 2006 (23:44:08)
Originally known as the Southeast Cyber Crime Summit, the new and improved CyberCrime Summit starts its fourth year in existence. This is due to the growth and realization that the summit reaches beyond the Southeastern U.S. The CyberCrime Summit attracts attendees from all over the world. Last year in addition to the U.S. and many Northern European attendees, some of the farthest attendees came from Italy, and Colombia, South America.

Registration: $249.00

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1077 reads)

UK rapped on data retention law

Friday, February 24, 2006 (17:22:05)
Britain's net industry has named the UK presidency of the EU as its villain of the year. The Internet Service Providers' Association (Ispa) singled out the UK for its role in pushing for Europe-wide data retention laws. The laws, requiring telecom operators to store phone and internet data to help fight terrorism, received its final go-ahead earlier this week...

More (BBC)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2502 reads)

Data Retention Directive endorsed by Ministers

Friday, February 24, 2006 (00:18:59)
The controversial Data Retention Directive received its final seal of approval on Tuesday, when Ministers at the Justice and Home Affairs Council adopted the Directive with a qualified majority. Irish and Slovak Ministers voted against the measure. In general terms, the Directive aims to harmonise Member States' provisions relating to the retention of communications data, in order to ensure that the data, which can identify the caller, the time and the means of communication, is available for the purpose of the investigation, detection and prosecution of serious crime. The Directive is not concerned with the content of the communications...

More (Out-Law.com)

Nowhere to hide

Thursday, February 23, 2006 (21:17:39)
Be careful what you try to deny is the message from Ed Wilding, particularly if files retrieved from electronic devices have your name all over them. The forensic investigation of data held on computers, laptops, cellular telephones, PDAs and other data processing and storage devices is a valuable resource in litigation and for dispute resolution...

More (Legal IT)