Latest Forum Posts

Recent Posts

Computer cop receives award

The New Britain police department’s computer crime expert was stumped. The state police’s lab couldn’t help. Even the FBI didn’t have the answer. But Lt. James Wardwell kept searching, trying to find some way to infiltrate a stack of erased… Read more

NZ IT practices inadequate for forensic evidence

The second annual New Zealand Computer Crime and Security Survey has revealed New Zealand organisations are ill-equipped to preserve computer forensic evidence. The University of Otago conducted survey – which aims to raise the level of security awareness and determine… Read more

Court systems ill-equipped to understand e-crime

Computer forensics investigator Bryan Sartin says court systems are ill-equipped to understand e-crime, even at a basic level. Here he describes a recent case of a hacker who stole customer information from a retail system. The case didn’t play out… Read more

Mobile Phone Forensic Course Available From Guidance Software

Guidance Software, Inc. today announced the availability of its introductory level mobile phone forensic course. The hands-on course introduces investigators to Neutrino™, the company’s mobile phone acquisition tool, and demonstrates how the product is used to perform comprehensive analysis and… Read more

Bloggers Held Under New Thailand Computer Crime Law

If you thought Germany’s new computer crime laws were strict, try posting an offensive comment on the Web in Thailand. According to the independent newspaper Prachatai, at least one person is being detained in the Bangkok Remand Prison for crimes… Read more

Understanding IM as Evidence

Instant messaging is an increasingly popular medium that’s sometimes an important link in the prosecution’s case. As with every new communication tool, it brings new challenges for criminal procedure. This multilayered technology provides the convenience of e-mail coupled with the… Read more

Justice in the Wild Wild Web

The Internet can often seem like a threatening place where users are susceptible to fraud, identity theft and sexual predators, but law enforcement at all levels of government have been attempting to change that perception. “At the turn of the… Read more

Digital detectives discern Photoshop fakery

Spotting inconsistencies in pictures is a major aspect for computer forensics. “One helpful aspect of digital files is that they leave records, whether you know it or not,” says Nasir Memon, a computer science professor at Polytechnic University in New… Read more

Mobile Forensics World 2008 Conference Announced

Mobile Forensics World 2008 Conference May 8-10, 2008Chicago, Illinois, USA An event for Federal, State and Local LE Forensic Specialists, Corporate and Private Forensic Examiners, Industry Leaders, and Academic Researchers of Mobile Forensics Contact Rick @ rick@MobileForensicsWorld.com for details.… Read more

IPhone Tantalizes, Frustrates Forensics Experts

Technophiles may love the iPhone, but you criminals? Watch out. The iPhone may reveal more about your misdeeds than you realize. Derrick Donnelly, chief technology officer of Blackbag Technologies, a Silicon Valley-based company specializing in Apple forensic solutions, is tempted… Read more

Online Utica College

(Sponsored Review) Utica College, based in Central New York in the United States, provides regionally accredited Bachelor’s and Master’s Degree programs in economic crime investigation, anti-fraud and computer crime control. An independent, private institution founded in 1946 by Syracuse University,… Read more

Unit solves crimes electronically

Detective Jonathan Kennedy of the Prince William County Police Department’s Computer Forensics Unit said it’s satisfying to find something that helps put bad guys away. “You do get a little rush when you find what you’re looking for on whatever… Read more

Publication of Hachoir project version 1.0

Hachoir is a framework for binary file manipulation: file format recognition, metadata extraction, searching files in any binary stream (forensics), viewing file content with human representation, etc. It’s composed of many components…Programs:· hachoir-metadata: fault tolerant metadata extraction;· hachoir-subfile: search subfiles… Read more

CSFA Test Vouchers

CyberSecurity Institute will be giving away five vouchers for the CyberSecurity Forensic Analyst certification. The vouchers will be good through 2008. http://www.cybersecurityforensicanalyst.com/Interested persons need to send the following information to CSFA@cybersecurityinstitute.biz: NameMailing addressAgency/companyYears forensic analysis experience Regards, Steve Hailey… Read more

Letting EDD Evidence Speak for Itself

By now, you undoubtedly have mastered the new electronic data discovery amendments to the Federal Rules of Civil Procedure. You keep up with the rapidly evolving case law. You probably even know the difference between a computer forensic expert and… Read more