The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.
Latest Forum Posts
A two-day seminar on â€˜Crime investigation – modern techniquesâ€™ will be inaugurated at the Goa International Centre, on October 9. The inaugural session of the seminar will have a plenary lecture on â€˜Computer crimes and cyber forensicsâ€™ delivered by the … Read more
Chris Marsico, a graduate student, is using this semester to focus on the forensic possibilities of devices like iPODs. Just this summer, a group of car thieves in the UK was arrested, due in part to evidence discovered on an … Read more
The Forensic Focus “papers and articles” section
is now online and we’re actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at [email protected], thank you. … Read more
Companies must be more vigilant about employees using mobile devices â€“ such as iPod music players and personal digital assistants (PDAs) â€“ at work, security experts warned today.
A computer forensics study into the latest Mini iPod, conducted by corporate … Read more
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this … Read more
ECCE 2005 will consider aspects of digital evidence in all types of criminal activity, including timelines, methods of evidence deposition, use of computers for court presentation, system vulnerabilities, crime prevention etc.
ECCE 2005 is an international conference and will be … Read more
The NSRL staff have received questions about the announcement of a SHA-0 collision at the CRYPTO 2004 conference, as well as other collisions. NIST staff from the Computer Security Division were in attendance, and the statements here are meant to … Read more
Detective Scott Elenberger started the Arcadia Police Department’s computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he’s retrieving digital evidence that’s … Read more
“An Overview of Steganography for the Computer Forensics Examiner” by Gary C. Kessler
Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. … Read more
U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.
At issue is the 1994 … Read more
PivX Solutions, Inc. has announced a partner agreement to expand the company’s nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.Under the agreement, PivX will be the exclusive provider of computer forensic expert witness and … Read more
Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can’t make the date all presentations will be archived … Read more