±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 2 Overall: 32225
New Yesterday: 3 Visitors: 85

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars





Nick Furneaux, MD CSITech & Director, Bright Forensics

Friday February 17, 2012 (00:08:49)   (889 Reads)
Nick Furneaux
Nick, can you tell us something about your background and why you decided to work in this particular field?

I’ve worked in IT for almost 20 years and around 10 years ago was involved in writing Intranet and Internet based systems for highly secure environments in the UK. That led on to needing to understand the complexities of security, then securing their systems, then investigating when things went wrong. I found that I loved the investigative side and turned to Computer Forensics full time about 6 years ago.

What does your current role involve? Can you describe a typical day?

I am fortunate that my work is varied and fascinating. One day I may be doing a standard disk-based investigation, the next day researching the data stream in a protocol, next teaching RAM analysis and the following night I’m in a covert van with an antenna pointed at someone’s router.   more ...


Jan Collie, The Digital Detective

Thursday February 16, 2012 (23:57:40)   (1105 Reads)
Jan Collie
Jan, how did you get started in computer forensics?

I decided to specialise in forensics after meeting a bunch of lads from the Hi-Tech Crime Unit at a conference in London in about 2002. For a start, they had all this groovy kit on their stand, which induced serious Gadget Envy. But when they described what they actually did, I was totally sold. I'd spent a long time in undercover investigations, so the idea of snooping around systems for dodgy deeds really appealed to me. I also jump at any chance to get my screwdrivers out and take stuff apart. It was a dream combination.

Can you tell us something about the type of work you do now?

I mostly do Corporate and Legal investigations. Largely, these involve fraud, IP theft and staff computer misuse though I have also turned up evidence of drug dealing and software piracy.   more ...


Professor Tony Sammes, Cranfield University

Thursday February 16, 2012 (23:50:57)   (1293 Reads)
Professor Sammes, can you tell us something about your background and your current role?

I have not always been in the academic world. I started out in the military, serving for some 29 years in the British Army. I first became involved with programming computers in the early 60s when machine code was still the main language and we were looking at how these new devices might be used for military command, control and communications.

By the greatest of good fortune, I was posted to Lincoln Laboratory at MIT in 70/71 and there I was tasked with developing the software that would bring the laboratory onto Arpanet as network node number 10. We had no appreciation then that this was just the beginning of what was to become the Internet.   more ...



Simon Biles, Thinking Security

Thursday February 16, 2012 (20:53:46)   (1342 Reads)
Simon Biles
Simon Biles, together with his wife, runs an Information Security Consultancy - Thinking Security - from near Oxford in the UK. He is currently consulting with HM Revenue and Customs on Security Architecture. He is also studying for an MSc from Cranfield in Forensic Computing and is an Associate Lecturer with the Open University on their Information Security Management postgraduate course. He posts as "Azrael" on the Forensic Focus forums (in case you were wondering).

Simon, can you tell us something about your background?

Underneath it all I'm a UNIX SysAdmin to the core! I started using Linux at University because I was too lazy to walk to the CS or AI labs to work on the real UNIX machines (Suns and SGIs), so I installed it on my own PC in halls, I then discovered that I could do dial up and connect to the University network and it all grew from there.   more ...


Gene Spafford, CERIAS

Thursday February 16, 2012 (20:41:11)   (1063 Reads)
Gene Spafford
Gene, can you tell us a little bit about your background and how you came to work at CERIAS?

My academic PhD was work in reliable operating systems. I then did a post-doc in software testing, which I viewed as a follow-on to my work in reliability. During all that time I worked part-time as a system administrator and consultant. I was interested in computer & network security, but was told that it was not an area for an academic career unless I wanted to work in formal methods or cryptography.

I joined the faculty at Purdue in 1987. In 1988, the Morris Worm and some computer viruses became news. So did some of Cliff Stoll's exploits. I found myself playing a role in all of those, as one of the few academics who was actually working hands-on with systems. So, I began to explore topics in applied computer security for my "day job" -- including forensics. (I actually helped solve a computer crime (of sorts) back in 1983, so I've been involved in the area for longer than my time at Purdue.)   more ...