Latest Forum Posts
Investigators are relying on computer records to trace Neil Entwistle’s steps in the days before he allegedly shot his wife, Rachel, and 9-month-old daughter, Lillian Rose. As computers play an ever-greater role in everyday life, they are becoming increasingly important… Read more
China Computer Forensics Conference, 17-18 June 2006
Sprite Guo, a policeman in China, has contacted me with details of the China Computer Forensics Conference 2006 (CCFC 2006), a computer forensics conference that takes place between members of the law enforcement community and computer forensic companies in China.… Read more
Texas Treasure owners indicted on interfering with an investigation
The company that runs the Texas Treasure cruise ship has been indicted on charges of interfering with an investigation. According to the indictment, the ship’s chief engineer is accused of lying to Coast Guard inspectors about records that track how… Read more
Call for Papers – 6th Annual Digital Forensic Research Workshop
The purpose of this workshop is to bring together researchers, practitioners, and educators interested in digital forensics. We welcome the participation of people in industry, government, law enforcement, and academia who are interested in advancing the state of the art… Read more
NSA eavesdropping: How it might work
Even a panel of determined senators couldn’t convince Attorney General Alberto Gonzales to divulge much about how the massive surveillance program conducted by the National Security Agency actually works. Gonzales told a Senate committee on Monday that he was not… Read more
CY4OR Sponsor Wales E Crime Summit 2006
The summit 2006 launched a three year Manifesto to tackle computer crime in Wales; the purpose being to protect businesses against the growing threat to them from electronic and computer based Crime. The conference was attended by the four major… Read more
European experts to analyze electronic evidence in EU Courts
The city of Florence will host next 17th February the meeting of the multidisciplinary researchers that are working together on the European Project about the Admissibility of the Electronic Evidence in EU Courts (A.E.E.C.). This innovative project is financially supported… Read more
Grand Traverse County looks to battle computer crimes
Grand Traverse County wants more training for sheriff’s deputies to combat an “alarming” rise in computer-based crimes. Undersheriff Nathan Alger said the department asked the county board for approximately $10,000 previously earmarked for vehicles to expand the department’s computer forensic… Read more
Vogon – New age sleuths
Since 2002, Vogon International LLC has operated a sophisticated data recovery lab in Norman. The lab, which serves clients throughout the U.S., Canada and South America, uses proprietary software to recover data from computer hard drives and backup tapes. The… Read more
Microsoft security chief attacks government
Ed Gibson, Microsoft UK’s chief security advisor, has hit out at the lack of effective channels for cybercrime reporting and claimed that better desktop-level protection is the key to effective security…
More (ZDNet)… Read more
Basis Technology Launches Digital Forensics Initiative
Cambridge, Massachusetts, January 31, 2006—Basis Technology announced today the launch of an initiative to create the next generation of digital forensics products, and the appointment of two renowned experts to lead this effort. Brian Carrier, author of one of the… Read more
Kroll Ontrack Completes Acquisition of Norway’s Ibas Holdings
Kroll Ontrack Inc., the data recovery and legal technologies subsidiary of Kroll Inc., the global risk consulting company, announced today that it has completed the acquisition of Ibas Holdings ASA, a leading Norwegian-based provider of data recovery, data erasure and… Read more
The Role of Computer Forensics in Law Enforcement
Examples of the analysis of computer evidence are abundant today in the popular media, particularly in television shows ranging from the Law & Order franchise to Court TV’s Forensic Files. And, as we have come to expect from television, there… Read more
Police get 25,000 IP addresses in manhunt
AMSTERDAM, NL — Detectives investigating the Louis Sévèke case took possession of data on people who visited the political activist’s website. Family and friends said on Tuesday the police have an estimated 25,000 unique Internet Protocol (IP) addresses. The police… Read more
DHS cybersecurity budget grows to fight computer crime
With computer crimes on the increase, the Homeland Security Department is preparing to beef up its cybersecurity capabilities by increasing the budget of the National Cyber Security Division, home to the U.S. Computer Emergency Readiness Team (US-CERT). At a Jan.… Read more
Sebek 3: tracking the attackers, part one
It has become increasingly important for security professionals to deploy new detection mechanisms to track and capture an attacker’s activities. Third Generation (GenIII) Honeynets provide all the components and tools required to gather this information at the deepest level. Sebek… Read more