Crime fighters solve crimes by examining cell phones

Modern detectives are now using cell phone forensics to capture more and more criminals. Forensics, the science of preserving, extracting and examining data, has long been confined to computers. Now, with the help of cell phone seizure kits like the … Read more

Speak up to beat cybercriminals

The police have long complained that organisations that are the victims of computer crime are reluctant to come forward for fear an investigation will cripple their business as the police seize servers and PCs as evidence. On the other hand, … Read more

FBI’s new computer forensics lab already has full load

Blue lights flashed inside the Menlo Park office suite, a signal to the “propeller heads” – highly trained forensic computer examiners – that fellow FBI agents had arrived with another cyber-mystery for them to solve. This one was buried somewhere … Read more

Experts evolve new techniques to solve cyber crime

Electronic crime detection experts are working with police and forensic detectives in a Scottish university to establish new techniques to detect cyber crime, especially CP. “Anybody using a computer leaves a trail, and it’s very hard to cover that trail … Read more

FBI Computer Forensics Laboratory in “TOP 50” awards

The FBI’s Regional Computer Forensics Laboratory (RCFL) initiative has been chosen as one of the “Top 50” programs in the 2005 Innovations in American Government Awards competition. The RCFL Program is a national network of one-stop, full-service digital evidence laboratories. … Read more

UK police foil massive “online” bank theft

Police in London say they have foiled one of the biggest attempted bank thefts in Britain. The plan was to steal £220m ($423m) from the London offices of the Japanese bank Sumitomo Mitsui. Computer experts are believed to have tried … Read more

Web to have ‘terror watch’ team

Five European governments are setting up a hi-tech team to monitor how terrorists and criminals use the net. The group will make recommendations on shutting down websites that break terrorism laws. The plans for the initiative came out of a … Read more

Live each day like you’re going to be hacked

Forensics was a word repeated throughout this week’s SecureWorld conference. Experts mentioned the media firestorm that has enveloped ChoicePoint and other companies where hackers were able to steal mountains of consumer data that could eventually be used for identity theft … Read more

A Method for Forensic Previews

During any computer forensics operation, the state of the target machine must be left as undisturbed as possible. This underlying principle applies to all forensics activities, ranging from the field preview to the full blown examination in a lab. Nevertheless, … Read more

Video Forensics: Catching the Crooks on Camera

Watching movies and your favorite episode of CSI (Crime Scene Investigation), you would think that recorded video is always crystal clear, easily showing a suspect’s face or his license plate, but this is far from reality. In fact, the recorded … Read more

Computer sleuths bring crime to light

When Coreen Kulvich and Meredith Tanner explore hard drives and Zip disks, they’re hunting more than just bytes of data. They’re looking for convictions. Kulvich, 29, and Tanner, 28, make up the Dakota County Sheriff Department’s small but increasingly vital … Read more

Australian ISP raided for BitTorrent links

An Australian ISP was raided 10th March under court orders for alleged copyright infringement in the first crackdown on the illicit use of BitTorrent technology. Perth-based ISP People Telecom (formerly known as Swiftel Communications), which is listed on the Australian … Read more

Cases confirm computer privacy is illusion

Want to communicate your thoughts privately or anonymously? Step away from the computer. Say it with flowers. Or a whisper. Or at least a pen. If you won’t do it for yourself, do it for your lawyer – the one … Read more

Share to...