Latest Forum Posts

Recent Posts

Computer records play large role in gathering evidence

Investigators are relying on computer records to trace Neil Entwistle’s steps in the days before he allegedly shot his wife, Rachel, and 9-month-old daughter, Lillian Rose. As computers play an ever-greater role in everyday life, they are becoming increasingly important… Read more

China Computer Forensics Conference, 17-18 June 2006

Sprite Guo, a policeman in China, has contacted me with details of the China Computer Forensics Conference 2006 (CCFC 2006), a computer forensics conference that takes place between members of the law enforcement community and computer forensic companies in China.… Read more

Call for Papers – 6th Annual Digital Forensic Research Workshop

The purpose of this workshop is to bring together researchers, practitioners, and educators interested in digital forensics. We welcome the participation of people in industry, government, law enforcement, and academia who are interested in advancing the state of the art… Read more

NSA eavesdropping: How it might work

Even a panel of determined senators couldn’t convince Attorney General Alberto Gonzales to divulge much about how the massive surveillance program conducted by the National Security Agency actually works. Gonzales told a Senate committee on Monday that he was not… Read more

CY4OR Sponsor Wales E Crime Summit 2006

The summit 2006 launched a three year Manifesto to tackle computer crime in Wales; the purpose being to protect businesses against the growing threat to them from electronic and computer based Crime. The conference was attended by the four major… Read more

European experts to analyze electronic evidence in EU Courts

The city of Florence will host next 17th February the meeting of the multidisciplinary researchers that are working together on the European Project about the Admissibility of the Electronic Evidence in EU Courts (A.E.E.C.). This innovative project is financially supported… Read more

Grand Traverse County looks to battle computer crimes

Grand Traverse County wants more training for sheriff’s deputies to combat an “alarming” rise in computer-based crimes. Undersheriff Nathan Alger said the department asked the county board for approximately $10,000 previously earmarked for vehicles to expand the department’s computer forensic… Read more

Vogon – New age sleuths

Since 2002, Vogon International LLC has operated a sophisticated data recovery lab in Norman. The lab, which serves clients throughout the U.S., Canada and South America, uses proprietary software to recover data from computer hard drives and backup tapes. The… Read more

Microsoft security chief attacks government

Ed Gibson, Microsoft UK’s chief security advisor, has hit out at the lack of effective channels for cybercrime reporting and claimed that better desktop-level protection is the key to effective security… More (ZDNet)… Read more

Basis Technology Launches Digital Forensics Initiative

Cambridge, Massachusetts, January 31, 2006—Basis Technology announced today the launch of an initiative to create the next generation of digital forensics products, and the appointment of two renowned experts to lead this effort. Brian Carrier, author of one of the… Read more

Kroll Ontrack Completes Acquisition of Norway’s Ibas Holdings

Kroll Ontrack Inc., the data recovery and legal technologies subsidiary of Kroll Inc., the global risk consulting company, announced today that it has completed the acquisition of Ibas Holdings ASA, a leading Norwegian-based provider of data recovery, data erasure and… Read more

The Role of Computer Forensics in Law Enforcement

Examples of the analysis of computer evidence are abundant today in the popular media, particularly in television shows ranging from the Law & Order franchise to Court TV’s Forensic Files. And, as we have come to expect from television, there… Read more

Police get 25,000 IP addresses in manhunt

AMSTERDAM, NL — Detectives investigating the Louis Sévèke case took possession of data on people who visited the political activist’s website. Family and friends said on Tuesday the police have an estimated 25,000 unique Internet Protocol (IP) addresses. The police… Read more

DHS cybersecurity budget grows to fight computer crime

With computer crimes on the increase, the Homeland Security Department is preparing to beef up its cybersecurity capabilities by increasing the budget of the National Cyber Security Division, home to the U.S. Computer Emergency Readiness Team (US-CERT). At a Jan.… Read more

Sebek 3: tracking the attackers, part one

It has become increasingly important for security professionals to deploy new detection mechanisms to track and capture an attacker’s activities. Third Generation (GenIII) Honeynets provide all the components and tools required to gather this information at the deepest level. Sebek… Read more