The NSRL staff have received questions about the announcement of a SHA-0 collision at the CRYPTO 2004 conference, as well as other collisions. NIST staff from the Computer Security Division were in attendance, and the statements here are meant to … Read more
Virtualized online for the first time in its nearly decade-long history, the National Cybercrime Conference (NCCC) — an annual event hosted by the Massachusetts Attorney General’s Office — brought together a record 133 speakers to deliver a considerable volume of advanced technical and legal topics.
Replay was designed to make the life of investigators easier by providing them with an easy, forensically sound tool to deal with CCTV and video.
Despite pandemic-related disruptions in both research and publishing as we head into the summer, there are still some posts and papers being published. In this round-up, we take a look at three recent articles in digital forensics.
The global COVID-19 pandemic hasn’t slowed either the pace of technological change or its relevance to both criminal and civil investigations.
All occupations face daily challenges. Many of these challenges come from dealing with the public, while some are more problem-solving challenges. In digital forensics, we face challenges on both ends of this spectrum because ultimately our jobs affect lives.
‘17.5 Zettabytes.’ This is the amount of data that the IDC estimates will be generated annually by 2025, and among those numbers, cloud traffic is expected to grow and reach 18.9 Zettabytes by 2021...
Detective Scott Elenberger started the Arcadia Police Department’s computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he’s retrieving digital evidence that’s … Read more
“An Overview of Steganography for the Computer Forensics Examiner” by Gary C. Kessler
Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. … Read more
U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.
At issue is the 1994 … Read more
PivX Solutions, Inc. has announced a partner agreement to expand the company’s nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.Under the agreement, PivX will be the exclusive provider of computer forensic expert witness and … Read more
Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can’t make the date all presentations will be archived … Read more
Montrose County District Court Judge Dennis Friedrich denied a motion Wednesday from defense attorneys to dismiss 19 misdemeanor child exploitation counts against Park Avenue Dance Works co-operator John Ward.
At Wednesday’s hearing, David Penrod, a forensic examiner for Computer Forensic … Read more
U.S. Attorney General John Ashcroft today will announce the arrests of dozens of people nationwide charged with flooding e-mail inboxes with spam and perpetrating computer fraud and other cyber crimes.
Many of the cases have their origin in Pittsburgh, where … Read more
Purdue University is teaming with law enforcement officers to improve investigation of the new generation of crimes, including computer-aided terrorism, espionage, bank and business fraud, and identity theft.
A collaboration with 20 law enforcement officers from throughout Indiana is part … Read more
The Justice Departmentâ€™s National Institute of Justice has published the second in a series of guidelines for IT crime investigations.
â€œForensic Examination of Digital Evidence: A Guide for Law Enforcementâ€ was created at the agencyâ€™s request by the National Institute … Read more