±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 32909
New Yesterday: 2 Visitors: 110

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

RSS Feed Widget

±Latest Webinars

Page 297

The Role of Computer Forensics in Stopping Executive Fraud (Sample Chapter)

Sunday, October 03, 2004 (00:03:07)
"Virtual evidence is an important part of nearly every modern corporate crime investigation, and proper handling of that evidence can mean the difference between a conviction and a criminal walking free. In this chapter, you'll learn how to properly investigate computer evidence in a corporate environment."

More (informit.com)

Feds invite comment on Internet wiretaps

Thursday, September 30, 2004 (14:44:42)
The Federal Communications Commission (FCC) on Thursday launched a public comment period on its plan to compel Internet broadband and VoIP providers to open their networks up to easy surveillance by law enforcement agencies.

More (Security Focus)

SC Magazine Forensic Tools Group Test

Thursday, September 30, 2004 (13:57:00)
A group test of the major players in the forensic acquisition/analysis market:

http://scmagazine.com

Seminar on criminal investigations in Goa, October 9th

Wednesday, September 29, 2004 (10:39:56)
A two-day seminar on ‘Crime investigation - modern techniques’ will be inaugurated at the Goa International Centre, on October 9. The inaugural session of the seminar will have a plenary lecture on ‘Computer crimes and cyber forensics’ delivered by the DIG (CID), Mr Muktesh Chander.

More (Navhind Times)

Forensics gains credibility at Purdue

Wednesday, September 29, 2004 (10:35:14)
Chris Marsico, a graduate student, is using this semester to focus on the forensic possibilities of devices like iPODs. Just this summer, a group of car thieves in the UK was arrested, due in part to evidence discovered on an iPOD.

"You have to be prepared for anything; criminals are crafty," Marsico said.

After graduation in May, Marisco hopes to work for the FBI. But for now, his concern is developing a standard practice regarding how digital evidence may be used in court.

More (The Exponent)

Digital Investigation - Issue 3

Sunday, September 19, 2004 (14:30:06)
From Matthew Smaldon at Elsevier:

"I would like to notify you that the table of contents of the third issue of Digital Investigation is now available at http://www.digitalinvestigation.net. We are pleased to be able to offer two articles from this issue free of charge, available to download now.

These are:

Reporting security breaches: A risk to be avoided or responsibility to be embraced? Editor in chief, Eoghan Casey, debates whether companies should or shouldn't report incidents to the police. If faced with more corporate reporting could law enforcement cope?

Tool Review: Forensic analysis of windows hosts using UNIX-based tools Most examiners only use UNIX-based forensic tools when investigating a UNIX system. However, such tools are excellent for examining Windows hosts. Cory Altheide writes a 16 page technical report on how to use Linux as a platform for forensic analysis and all the advantages it can bring to an investigation.

Download these articles at http://www.digitalinvestigation.net"

Forensic Focus call for papers

Monday, September 13, 2004 (17:40:30)
The Forensic Focus "papers and articles" section

http://www.forensicfocus.com/computer-forensics-papers.php

is now online and we're actively looking for contributions. If you would like to submit a paper or article for publication at Forensic Focus please mail me at [email protected], thank you.

Jamie
--
Forensic Focus

Mobile threat to company data exposed by security experts

Monday, September 13, 2004 (13:35:38)
Companies must be more vigilant about employees using mobile devices – such as iPod music players and personal digital assistants (PDAs) – at work, security experts warned today.

A computer forensics study into the latest Mini iPod, conducted by corporate investigators The Risk Advisory Group (TRAG), shows that mobile devices can be used to easily download vast amounts of confidential company information...

More (Personnel Today)

Peterson Testimony Turns to Computer Data

Thursday, September 09, 2004 (11:47:58)
Testimony in Scott Peterson's murder trial returned to what investigators found in his computers as prosecutors try to prove Peterson researched the San Francisco Bay before dumping his pregnant wife's body there...

More (Sun Herald)

New download: A National Research and Development Agenda (ISTS)

Monday, September 06, 2004 (16:10:31)
Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda. This study is the culmination of a multi-year research effort by the Technical Analysis Group at the Institute for Security Technology Studies (ISTS). In this document we present the top band of critical problem areas encountered during cyber attack investigations that may be addressed through research and development. Solving the needs outlined in this work would significantly increase law enforcement's ability to investigate and prosecute cyber attack cases. We offer this agenda to serve as a resource for decision makers, developers, and researchers, in government, industry, and academic institutions across the country.

View download page