±Forensic Focus Partners
|New Today: 0||Overall: 33982|
|New Yesterday: 4||Visitors: 119|
Back to top Skip to content Skip to menu
More (Portales News-Tribune)
More (The Age)
Page 286Back to top Back to main Skip to menu
Friday, October 28, 2005 (05:59:46)Hot Pepper Technology, Inc. (http://www.hotpepperinc.com) has announced the release of version 3.0 of its E-Mail Detective - Forensic Software Tool. E-Mail Detective (EMD) provides investigators with a rapid and comprehensive method of retrieving all America Online E-mail messages and photos stored on a user's computer disk. This updated version adds several new features and enhancements to the application. Version 3.0 offers enhanced AOL reporting features for the investigator: built in key phrase search, automatic hash value tagging, quick scan capability and the ability to run the EMD application from a USB jump drive for field investigations.
Thursday, October 27, 2005 (18:39:14)For the last four years, David Usery, 47, has been a man the public doesnâ€™t see â€” a pivotal person behind thousands of criminal case investigations from the 9th judicial District Attorneyâ€™s Office and New Mexico State Police as well as local law enforcement. Usery is the Information Systems Manager for the DAâ€™s office. He is a computer forensics expert and prepares computer-generated maps, images and animation for courtroom presentations. The evidence Usery gathers from hard drives is damning, â€œIâ€™ve never had to testify in court, they (defendants) usually plead,â€ he said...
More (Portales News-Tribune)
Wednesday, October 26, 2005 (20:21:45)In cramped, dingy offices near New Yorkâ€™s East River, a couple dozen detectives and analysts hunch over computers, plowing their way through hundreds of criminal cases. This is the home of the New York Police Department Computer Crime Squad. The heart of this or any other computer crimes unit is computer forensics, the conservation, deconstruction and analysis of electronic evidence contained on personal computers, networks and, increasingly, handheld devices such as cell phones and personal digital assistants...
Wednesday, October 26, 2005 (01:01:41)Last month, when Australian Federal Court Judge Murray Wilcox ruled that Kazaa is illegally authorising copyright infringement, he put Australia on the world map of landmark intellectual property cases - related cases against Kazaa in the US had previously failed. But Wilcox's finding has also put Australia on the map for another reason. Wilcox relied on crucial digital evidence from forensic computer specialists. In a situation where there was no smoking gun, these specialists were able to build a solid case on purely digital evidence...
More (The Age)
Saturday, October 22, 2005 (12:39:00)Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because these two phases of computer forensics are the most critical to evidence acceptance, but are not thoroughly covered in text or courses. Throughout the book, a constant eye is kept on evidence dynamics and the impact investigators can have on data integrity while collecting evidence.
Friday, October 21, 2005 (14:02:59)The pages that are printed by your colour laser printer may include tiny dots, almost invisible to the naked eye. The dots form a code that can be read by the US Secret Service, ostensibly to track down counterfeiters. Now, for the first time, the code has been cracked. The Secret Service has admitted before that the tracking information is part of a deal struck with selected colour laser printer manufacturers â€“ including Xerox, Canon and many others. If a colour laser printer is used to forge a document and agents get sight of the document, the codes can be read. However, the full nature of the private information encoded in each document was not previously known...
Thursday, October 20, 2005 (16:39:56)Consumer-level financial fraud has been around since thieves first thought to filch blank checks from mailboxes. The Internet has taken it to a new level, not yet fully understood by the general public. By many measures, 2005 is shaping up as a watershed year for e-commerce â€” and cybercrime...
Wednesday, October 19, 2005 (13:34:29)I am often quizzed by friends on how savvy the Indian Police are in handling cyber crime. Although it is a few years since I left the force, I have been closely following trends of cyber investigation and Court decisions. I am generally pleased with what I have seen or heard. A few victim organisations have actually told me that they have been happy with the style of approach of cyber crime cells in receiving complaints and disposing of them in the manner prescribed by law. This satisfactory situation is the outcome of a heavy emphasis on training by the police leadership and the involvement of private industry and bodies such as the Nasscom in providing the necessary inputs...
Tuesday, October 18, 2005 (15:18:55)The legal profession is responding to the increasing importance of digital evidence in legal cases by extending its professional development training to include computer forensics. In the first of a series of presentations to 23 Essex Street, information forensics specialists Andy Clark and Nick Spenceley, directors of Inforenz, spoke about The Hidden Life of Documents. They demonstrated how rigorous forensic investigation can reveal unexpected information about computer files such as how, when and by whom they are created. They were also able to show how such data has provided key evidence for both prosecution and defence in a wide variety of criminal cases. The Inforenz talk was followed by a presentation by barristers from 23 Essex Street about the legal issues surrounding the use of digital evidence.