Latest Forum Posts

Recent Posts

Digital Investigation – Issue 3

From Matthew Smaldon at Elsevier: “I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this… Read more

Forensic Focus call for papers

The Forensic Focus “papers and articles” section http://www.forensicfocus.com/computer-forensics-papers.php is now online and we’re actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at admin@forensicfocus.com, thank you. Jamie–… Read more

Mobile threat to company data exposed by security experts

Companies must be more vigilant about employees using mobile devices – such as iPod music players and personal digital assistants (PDAs) – at work, security experts warned today. A computer forensics study into the latest Mini iPod, conducted by corporate… Read more

Peterson Testimony Turns to Computer Data

Testimony in Scott Peterson’s murder trial returned to what investigators found in his computers as prosecutors try to prove Peterson researched the San Francisco Bay before dumping his pregnant wife’s body there… More (Sun Herald)… Read more

New download: A National Research and Development Agenda (ISTS)

Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this… Read more

E-crime and computer evidence conference (ECCE) 2005

ECCE 2005 will consider aspects of digital evidence in all types of criminal activity, including timelines, methods of evidence deposition, use of computers for court presentation, system vulnerabilities, crime prevention etc. ECCE 2005 is an international conference and will be… Read more

NSRL and Recent Cryptographic News

The NSRL staff have received questions about the announcement of a SHA-0 collision at the CRYPTO 2004 conference, as well as other collisions. NIST staff from the Computer Security Division were in attendance, and the statements here are meant to… Read more

Arcadia PD has own computer forensics specialist

Detective Scott Elenberger started the Arcadia Police Department’s computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he’s retrieving digital evidence that’s… Read more

Paper: Steganography for the Computer Forensics Examiner

“An Overview of Steganography for the Computer Forensics Examiner” by Gary C. Kessler Abstract Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party.… Read more

Ashcroft wins Internet wiretap system

U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies. At issue is the 1994… Read more

PivX Solutions Announces Computer Forensics Partnership Agreement

PivX Solutions, Inc. has announced a partner agreement to expand the company’s nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.Under the agreement, PivX will be the exclusive provider of computer forensic expert witness and… Read more

Last Call for DIGEV 2004 Web Conference Registrations

Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can’t make the date all presentations will be archived… Read more

Defense loses motion in CP case

Montrose County District Court Judge Dennis Friedrich denied a motion Wednesday from defense attorneys to dismiss 19 misdemeanor child exploitation counts against Park Avenue Dance Works co-operator John Ward. At Wednesday’s hearing, David Penrod, a forensic examiner for Computer Forensic… Read more

Dozens of spammers, scammers arrested

U.S. Attorney General John Ashcroft today will announce the arrests of dozens of people nationwide charged with flooding e-mail inboxes with spam and perpetrating computer fraud and other cyber crimes. Many of the cases have their origin in Pittsburgh, where… Read more

Purdue, Law Enforcement Probe Digital World Of Computer Forensics

Purdue University is teaming with law enforcement officers to improve investigation of the new generation of crimes, including computer-aided terrorism, espionage, bank and business fraud, and identity theft. A collaboration with 20 law enforcement officers from throughout Indiana is part… Read more

Justice issues guidelines for handling digital evidence

The Justice Department’s National Institute of Justice has published the second in a series of guidelines for IT crime investigations. “Forensic Examination of Digital Evidence: A Guide for Law Enforcement” was created at the agency’s request by the National Institute… Read more