±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 33802
New Yesterday: 1 Visitors: 137

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 278

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Submissions Being Accepted for Timothy Fidel Award for Excellence

Thursday, October 13, 2005 (12:31:50)
Building on the success of the inaugural Timothy Fidel Memorial Award, Guidance Software along with AccessData, today announced the Timothy Fidel Memorial Award Committee. The Committee was created as the decision making body for the award which is given in memoriam of Special Agent Tim Fidel, who was a pioneer and tireless advocate of cyber forensics...

FBI Shows Off Cyber Crime Lab In KC

Wednesday, October 12, 2005 (19:48:02)
Several attorneys general from the Midwest got a closer look at how to fight cyber crime Monday. The group visited the FBI's regional computer forensics lab in Kansas City to learn more about their software...

More (KMBC-TV)

Juris e-prudence

Tuesday, October 11, 2005 (17:00:05)
The 'paper trail' no longer consists of paper. More than 90 percent of all business documents are now created digitally, and computer forensic techniques allow recovery of evidence invisible to most computer users. So if you think your organization is prepared to face a lawsuit, you may want to think again. If you have not yet got the message about e-mail retention delivered by a Florida state judge to Morgan Stanley back in May, then be afraid. Be very afraid...

More (CIO)

High-tech detective

Monday, October 10, 2005 (13:00:02)
Randy Stone put the pieces together to solve BTK case There was only one valid file on the purple computer disk: TestA.rtf. The text file had a single sentence in it, telling investigators to read a 3x5 index card BTK had sent with the disk in an envelope KSAS-TV received on Feb. 16. With a simple maneuver, Detective Randy Stone of the Wichita Police Department's forensic computer crimes unit learned that the file had last been saved by a person named Dennis...

More (Wichita Eagle)
  • Posted by: jamie
  • Topic: News
  • Score: 4.5 / 5
  • (462 reads)

File System Forensic Analysis

Friday, October 07, 2005 (14:18:48)
The field of investigative forensics has seen a huge surge in interest lately, with many looking to study it because of shows like CSI or the increasing coverage of computer-related crimes. Some people see a career opportunity there, and are moving toward computer forensics, marrying both law enforcement and investigations with their interest in things digital. Central to this field is the study of data storage and recovery, which requires a deep knowledge of how filesystems work. Brian Carrier's new book File System Forensic Analysis covers this topic with clarity and an uncommon skill...

More (Slashdot)

And some other opinions:

http://catless.ncl.ac.uk/Risks/24.01.html#subj17
http://catless.ncl.ac.uk/Risks/24.02.html#subj16

[Personally, I'm only about a third of the way through it - Jamie]
  • Posted by: jamie
  • Topic: News
  • Score: 4 / 5
  • (654 reads)

Sony Selects Guidance Software for Upcoming Movie

Friday, October 07, 2005 (13:56:14)
Sony Pictures Television is portraying the digital investigation that put BTK behind bars for life by drawing from Guidance Software's forensic experts. Guidance CEO John Colbert, who has 14 years of law enforcement experience, served as a strategic technical advisor for the production. Colbert helped producers properly portray how Encase was utilized during the investigation.

More (press release)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (629 reads)

Litigation Forum Review: Embracing technology

Thursday, October 06, 2005 (17:09:01)
Computer forensic experts can retrieve hidden or lost data, as well as provide evidence as to whether files have been damaged or tampered with. They can reveal evidence of the conduct of those people who had access to the computer, and recreate computer-related events. Electronic disclosure can make discovery more efficient, less time consuming and less costly, if it is properly managed and supervised. However, on account of the volume of information that can be stored electronically and its dynamic, rather than static, nature, if it is not effectively managed, it can increase discovery costs and delays...

More (Legal IT)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (310 reads)

Computer sleuthing turning cops into geeks

Thursday, October 06, 2005 (11:53:22)
Computers and their criminal investigation capabilities turned Dori Schulze, an Internal Revenue Service special agent, into a self-proclaimed "geek" by the early 1990s. That initial embrace of computers by her and her employer led to the largest retail tax evasion conviction at the time. She used a computer to gather evidence against Stew Leonard Sr., the founder of Stew Leonard’s Dairy in Norwalk, who was convicted of evading $6.8 million in taxes in 1993...

More (New Haven Register)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (280 reads)

Expert witness questions CP jailings

Wednesday, October 05, 2005 (15:23:27)
A witness in computer crime trials has called for the release of individuals convicted of CP offences based entirely on material found on their hard drives. Jason Coombes, who has been involved in computer crime trials since 1994, issued a statement calling on police to be more thorough in their investigations. The expert contends that third-party control of a PC which is then used to store or view CP images could lead to the conviction of innocent people...

More (vnunet.com)

Web helps criminals trap victims

Tuesday, October 04, 2005 (15:10:35)
Malicious hackers and hi-tech criminals are changing tactics in a bid to outwit security firms. Statistics show that tech-savvy criminals are starting to turn away from e-mailed viruses to webpages to snare their victims. Also, say security firms, criminals are using spyware to get hold of personal data they can sell or use themselves...

More (BBC)