Latest Forum Posts
The New Britain police department’s computer crime expert was stumped. The state police’s lab couldn’t help. Even the FBI didn’t have the answer. But Lt. James Wardwell kept searching, trying to find some way to infiltrate a stack of erased… Read more
NZ IT practices inadequate for forensic evidence
The second annual New Zealand Computer Crime and Security Survey has revealed New Zealand organisations are ill-equipped to preserve computer forensic evidence. The University of Otago conducted survey – which aims to raise the level of security awareness and determine… Read more
Court systems ill-equipped to understand e-crime
Computer forensics investigator Bryan Sartin says court systems are ill-equipped to understand e-crime, even at a basic level. Here he describes a recent case of a hacker who stole customer information from a retail system. The case didn’t play out… Read more
Mobile Phone Forensic Course Available From Guidance Software
Guidance Software, Inc. today announced the availability of its introductory level mobile phone forensic course. The hands-on course introduces investigators to Neutrino™, the company’s mobile phone acquisition tool, and demonstrates how the product is used to perform comprehensive analysis and… Read more
Bloggers Held Under New Thailand Computer Crime Law
If you thought Germany’s new computer crime laws were strict, try posting an offensive comment on the Web in Thailand. According to the independent newspaper Prachatai, at least one person is being detained in the Bangkok Remand Prison for crimes… Read more
Understanding IM as Evidence
Instant messaging is an increasingly popular medium that’s sometimes an important link in the prosecution’s case. As with every new communication tool, it brings new challenges for criminal procedure. This multilayered technology provides the convenience of e-mail coupled with the… Read more
Justice in the Wild Wild Web
The Internet can often seem like a threatening place where users are susceptible to fraud, identity theft and sexual predators, but law enforcement at all levels of government have been attempting to change that perception. “At the turn of the… Read more
Digital detectives discern Photoshop fakery
Spotting inconsistencies in pictures is a major aspect for computer forensics. “One helpful aspect of digital files is that they leave records, whether you know it or not,” says Nasir Memon, a computer science professor at Polytechnic University in New… Read more
Call for Papers: Small Scale Digital Device Forensics Journal
The SSDD Forensics Journal invites papers for the 2nd issue, which will be published in January 2008. Papers on topics in the areas listed below as well as outstanding papers on other topics related to small scale digital device forensics… Read more
Mobile Forensics World 2008 Conference Announced
Mobile Forensics World 2008 Conference
May 8-10, 2008Chicago, Illinois, USA
An event for Federal, State and Local LE Forensic Specialists, Corporate and Private Forensic Examiners, Industry Leaders, and Academic Researchers of Mobile Forensics
Contact Rick @ rick@MobileForensicsWorld.com for details.… Read more
IPhone Tantalizes, Frustrates Forensics Experts
Technophiles may love the iPhone, but you criminals? Watch out. The iPhone may reveal more about your misdeeds than you realize. Derrick Donnelly, chief technology officer of Blackbag Technologies, a Silicon Valley-based company specializing in Apple forensic solutions, is tempted… Read more
Online Utica College
(Sponsored Review) Utica College, based in Central New York in the United States, provides regionally accredited Bachelor’s and Master’s Degree programs in economic crime investigation, anti-fraud and computer crime control. An independent, private institution founded in 1946 by Syracuse University,… Read more
Unit solves crimes electronically
Detective Jonathan Kennedy of the Prince William County Police Department’s Computer Forensics Unit said it’s satisfying to find something that helps put bad guys away. “You do get a little rush when you find what you’re looking for on whatever… Read more
Publication of Hachoir project version 1.0
Hachoir is a framework for binary file manipulation: file format recognition, metadata extraction, searching files in any binary stream (forensics), viewing file content with human representation, etc. It’s composed of many components…Programs:· hachoir-metadata: fault tolerant metadata extraction;· hachoir-subfile: search subfiles… Read more
CSFA Test Vouchers
CyberSecurity Institute will be giving away five vouchers for the CyberSecurity Forensic Analyst certification. The vouchers will be good through 2008.
http://www.cybersecurityforensicanalyst.com/Interested persons need to send the following information to CSFA@cybersecurityinstitute.biz:
NameMailing addressAgency/companyYears forensic analysis experience
Regards,
Steve Hailey… Read more
Letting EDD Evidence Speak for Itself
By now, you undoubtedly have mastered the new electronic data discovery amendments to the Federal Rules of Civil Procedure. You keep up with the rapidly evolving case law. You probably even know the difference between a computer forensic expert and… Read more