Latest Forum Posts

Recent Posts

To catch a (digital) thief?

Those investigating crime have long understood the value of evidence. In its most literal sense, evidence is “that which demonstrates that a fact is so”. By acquiring evidence we build a picture of what happened, how it came to be… Read more

Web Browser Forensics, Part 1

Electronic evidence has often shaped the outcome of high-profile civil law suits and criminal investigations ranging from theft of intellectual property and insider trading that violates SEC regulations to proving employee misconduct resulting in termination of employment under unfavorable circumstances.… Read more

Hi-tech crime costs UK plc £2.4bn

According to a survey for the National Hi-Tech Crime Unit (NHTCU), almost nine out of 10 firms suffered some kind of IT-based crime last year. A major risk was action taken by disgruntled employees, often working with crooks on the… Read more

Step-by-Step Incident Response

When a critical enterprise server is breached, a well thought-out incident response plan will help you contain damage, speed up service restoration, and collect forensic information. If you have reason to believe that a system has been compromised, either by… Read more

Another Look at Log Files

Marcus Ranum architected the first commercial firewall in 1990. He founded Network Flight Recorder Security, the company responsible for the first network forensics tool. And last summer at the Usenix conference, during a course he was teaching on log file… Read more

RCFL network plans expansion in 2005

WASHINGTON, D.C.- The FBI is poised to expand the country’s premier computer forensics laboratory network starting in May, according to Assistant Director Kerry E. Haynes, Operational Technology Division. Additional Regional Computer Forensic Laboratories (RCFLs) are scheduled to open in Portland,… Read more

UK centre to tackle net paedophiles planned

A unit to protect children in the UK from internet paedophiles is being set up by the Home Office. About 100 staff, including police and child welfare experts will join the Centre for Child Protection on the Internet next April.… Read more

Microsoft fighting cybercrime

Microsoft is developing analytical tools to help international law enforcement agencies track and fight cybercrime. Microsoft unveiled the tools development program at the kickoff on Wednesday of three days of technical training for Australian law enforcement agencies. The Forensic Computing… Read more

Aussie Feds target computer forensics

Australia’s hi-tech crime squad has vowed to change the perception of the internet as an anonymous haven to one where users are not as nameless as they might think. At a three-day computer forensics workshop in Canberra Federal Police Australian… Read more

Net fingerprints combat attacks

Eighty large net service firms have switched on software to spot and stop net attacks automatically. The system creates digital fingerprints of ongoing incidents that are sent to every network affected. Firms involved in the smart sensing system believe it… Read more

Jeff Weise’s e-mail trail led authorities to Jourdain

It’s hard to cover your tracks on your computer. Deleted files aren’t immediately deleted. And software programs on most PCs keep all sorts of data trails, recording the Web sites you visit, the pictures you look at, the e-mails you… Read more

Online CP investigation costs UK police £15m

The cost of forensically examining the computers seized during the UK police’s Operation Ore investigation into online CP will total £15m, according to the National Crime Squad (NCS). Operation Ore was launched after the FBI smashed an illegal CP ring… Read more

Expert rejects Lundy evidence

A computer forensics expert who has spent up to 400 hours examining evidence in the Mark Lundy murder case says he has ruled out police claims that Lundy manipulated a computer clock to give himself an alibi. The Crown at… Read more

Can computers survive cross-examination?

Between my fingers typing these words and the Word application which records them there is a huge range of different programs, not all of which I know intimately. If even a simple document such as this is potentially affected by… Read more