±Forensic Focus Partners
|New Today: 0||Overall: 35260|
|New Yesterday: 4||Visitors: 140|
Back to top Skip to content Skip to menu
More (Pioneer Press)
More (Tom's Hardware Guide)
Page 327Back to top Back to main Skip to menu
Wednesday, March 30, 2005 (11:59:03)Eighty large net service firms have switched on software to spot and stop net attacks automatically. The system creates digital fingerprints of ongoing incidents that are sent to every network affected. Firms involved in the smart sensing system believe it will help trace attacks back to their source. Data gathered will be passed to police to help build up intelligence about who is behind worm outbreaks and denial of service attacks...
Wednesday, March 30, 2005 (11:44:25)It's hard to cover your tracks on your computer. Deleted files aren't immediately deleted. And software programs on most PCs keep all sorts of data trails, recording the Web sites you visit, the pictures you look at, the e-mails you exchange, and much more. That is why probing the computers of suspects has become a routine part of criminal investigations, whether they deal with corporate misdeeds or mass murder. It's believed e-mails recovered from a computer used by Jeff Weise, who fatally shot nine people before killing himself March 21, led authorities to arrest Louis Jourdain, 16, on Sunday...
More (Pioneer Press)
Tuesday, March 29, 2005 (09:22:01)The cost of forensically examining the computers seized during the UK police's Operation Ore investigation into online CP will total Â£15m, according to the National Crime Squad (NCS). Operation Ore was launched after the FBI smashed an illegal CP ring in the US. The FBI passed UK police a list containing the details of over 7,000 UK citizens who had given their credit card details to gain access to CP websites run by the gang...
Monday, March 28, 2005 (14:34:39)A computer forensics expert who has spent up to 400 hours examining evidence in the Mark Lundy murder case says he has ruled out police claims that Lundy manipulated a computer clock to give himself an alibi. The Crown at Lundy's trial in 2002 claimed that after murdering his wife Christine and daughter Amber in their Palmerston North home, Lundy tampered with the clock to make it appear the computer was shut down at 10.52pm - when he was 150km away in Petone...
Saturday, March 26, 2005 (11:13:06)Between my fingers typing these words and the Word application which records them there is a huge range of different programs, not all of which I know intimately. If even a simple document such as this is potentially affected by unknown sequences of instructions, then what of a more important document relevant to a criminal prosecution? How sure can we be that the evidence of guilt contained on a computer should be relied upon?
Friday, March 25, 2005 (10:54:05)Derek Wyatt, chairman of the All Party Internet Group, is to raise a 10 minute rule bill in the Commons next month calling for the Computer Misuse Act to be strengthened. The move follows a campaign by Computer Weekly, businesses and IT security professionals to increase sentencing for offenders and tighten the act's provisions against denial of service attacks.
Thursday, March 24, 2005 (14:09:20)Intel is developing a technology that promises to uncover hidden information in digital images and videos and create output files of significantly higher resolution and quality. "Super Resolution" (SR) consumes enormous computing resources, but is on track to reduce the bandwidth required to transmit video files and automatically enhance digital pictures sometime in the future...
More (Tom's Hardware Guide)
Thursday, March 24, 2005 (10:37:30)Computers seized from Michael Jackson's bedroom and containing stored images of naked women from adult Web sites are not admissible at the singer's child-molestation trial, Superior Court Judge Rodney Melville ruled Wednesday. Melville said he barred the materials because it was unclear if anyone actually viewed or downloaded the images that were stored on four computer hard drives. In arguing to bar the material, defense attorney Robert Sanger said that the origins of the images were murky. For example, Sanger said they could have been sent as an unsolicited e-mail before landing in the computers' "cache" file. Sanger added that it was unclear if Jackson himself had used the computer. "The issue of who accessed the material is totally unresolved," he said...
Wednesday, March 23, 2005 (10:11:13)Kroll Ontrack(R) has honored top legal professionals with its third annual Electronic Evidence Thought Leadership Awards. Award recipients include law firms, litigators, practice support professionals and scholars who have shown excellence and leadership in the field of electronic discovery.