±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 32454
New Yesterday: 7 Visitors: 121

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 292

Arcadia PD has own computer forensics specialist

Sunday, September 05, 2004 (14:16:27)
Detective Scott Elenberger started the Arcadia Police Department's computer forensics program by building a computer out of spare parts from home. Now, after about three years of training and building a high- tech computer lab, he's retrieving digital evidence that's helping the District Attorney's Office file charges against suspected criminals...

More (PasadenaStarNews.com)

Paper: Steganography for the Computer Forensics Examiner

Saturday, September 04, 2004 (16:55:40)
"An Overview of Steganography for the Computer Forensics Examiner" by Gary C. Kessler

Abstract

Steganography is the art of covered or hidden writing. The purpose of steganography is covert communication-to hide the existence of a message from a third party. This paper is intended as a high-level technical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography without delving into the mathematics, although references are provided to some of the ongoing research for the person who needs or wants additional detail. Although this paper provides a historical context for steganography, the emphasis is on digital applications, focusing on hiding information in online image or audio files. Examples of software tools that employ steganography to hide data inside of other files as well as software to detect such hidden files will also be presented.

Read the full paper

Ashcroft wins Internet wiretap system

Saturday, September 04, 2004 (14:28:56)
U.S. regulators last month ruled tentatively in favor of an FBI and Justice Department proposal that would compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.

At issue is the 1994 Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates surveillance backdoors in U.S. telephone networks, allowing the FBI to start listening in on a target's phone calls within minutes of receiving court approval. Last March, the Department of Justice, the FBI and the U.S. Drug Enforcement Administration jointly petitioned the Federal Communications Commission (FCC) for a ruling that cable modem companies and other broadband providers are also covered by the law.

More (SecurityFocus)

PivX Solutions Announces Computer Forensics Partnership Agreement

Tuesday, August 31, 2004 (16:30:10)
PivX Solutions, Inc. has announced a partner agreement to expand the company's nationwide computer forensic services by partnering with SuperGeeks, a computer consulting company in Hawaii.

Last Call for DIGEV 2004 Web Conference Registrations

Monday, August 30, 2004 (07:53:32)
Last chance to register for DIGEV 2004, the 1st International Digital Evidence Web Conference. The one-day event takes place online on the 2nd of September (this Thursday), but even if you can't make the date all presentations will be archived for future viewing.

They've secured a world-leading speaker line-up...I guess it's easier to secure such a distinguished line-up when you're asking the speakers to only take 60 minutes out of their schedule, not 5 days!!!

http://www.digev2004.com

Defense loses motion in CP case

Friday, August 27, 2004 (18:14:20)
Montrose County District Court Judge Dennis Friedrich denied a motion Wednesday from defense attorneys to dismiss 19 misdemeanor child exploitation counts against Park Avenue Dance Works co-operator John Ward.

At Wednesday's hearing, David Penrod, a forensic examiner for Computer Forensic Labs in Englewood, testified for the defense regarding his examination of computer hard drives and related equipment seized from Ward's home.

Penrod said a massive number of files seemed to have been accessed on Ward's computer when he wasn't home...

More (Montrose Daily Press)

Dozens of spammers, scammers arrested

Thursday, August 26, 2004 (18:00:30)
U.S. Attorney General John Ashcroft today will announce the arrests of dozens of people nationwide charged with flooding e-mail inboxes with spam and perpetrating computer fraud and other cyber crimes.

Many of the cases have their origin in Pittsburgh, where investigators at the National Cyber-Forensics and Training Alliance have been quietly studying and tracking computer crimes since its creation was announced in 2002 by U.S. Attorney Mary Beth Buchanan.

More (post-gazette.com)

Purdue, Law Enforcement Probe Digital World Of Computer Forensics

Saturday, August 21, 2004 (05:40:19)
Purdue University is teaming with law enforcement officers to improve investigation of the new generation of crimes, including computer-aided terrorism, espionage, bank and business fraud, and identity theft.

A collaboration with 20 law enforcement officers from throughout Indiana is part of a new, federally-sponsored program designed to set national standards for computer forensic education and certification. The goal is not only to increase the number of trained officers and educators, but also to ensure that the evidence found is admissible in court.

Justice issues guidelines for handling digital evidence

Friday, August 20, 2004 (05:41:49)
The Justice Department’s National Institute of Justice has published the second in a series of guidelines for IT crime investigations.

“Forensic Examination of Digital Evidence: A Guide for Law Enforcement” was created at the agency’s request by the National Institute of Standards and Technology. It outlines techniques for extracting digital data while preserving its integrity.

More (GCN)

South Carolina Computer Crime Center Gets New Tool

Friday, August 20, 2004 (05:28:57)
The South Carolina Computer Crime Center, which opened in December 2002, handles the forensic examination of evidence collected during the investigation of computer crimes in South Carolina. Soon after it opened, the facility was faced with a rapidly growing volume of digital evidence and needed a highly scalable storage solution that would leverage the Center's existing infrastructure. The answer: Thunder 9570V from Hitachi Data Systems.

More (Government Technology)