±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36568
New Yesterday: 3 Visitors: 192

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 343

Battling the High Tech Crime Wave in Oregon

Thursday, March 02, 2006 (16:29:18)
If your vision of a high tech criminal is a lone hacker sitting in a college dorm, think again. In just a few short years, cyber crime has evolved from the domain of individuals seeking notoriety to sophisticated organized crime syndicates. Portland is not immune to this trend. In fact, according to the Federal Trade Commission, Oregon ranks ninth in the nation as an identity theft hot spot...

More (OregonLive.com)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (708 reads)

John the Ripper 1.7

Wednesday, March 01, 2006 (16:56:05)
Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what's new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and how one can choose strong passphrases (forget passwords) that are harder to break...

More (Security Focus)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1481 reads)

Navigating The Forensic Data Minefield

Wednesday, March 01, 2006 (16:13:50)
In today’s electronic environment, many high-profile cases have been solved through forensic searches of computerised media, and experienced electronic discovery professionals are now in great demand. Investigative teams should, however, remember to use electronic discovery in the context of an overall document search, focusing on subject matter and investigative targets rather than purely on the discovery methodology. If improperly employed, electronic discovery procedures can create difficulties, overwhelming investigators with truckloads of irrelevant data that may hamstring an investigation...

More (CIO Asia)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (941 reads)

NSA searches for advanced data mining tech

Tuesday, February 28, 2006 (17:14:55)
The National Security Agency (NSA) visited Silicon Valley this month on the hunt for private sector technology to beef up its already formidable snooping and signals intelligence portfolio. Data mining technologies to search for connections between seemingly unrelated snippets of information was top of the NSA's shopping list, according to venture capitalists who held meetings with agency officials...

More (The Register)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1067 reads)

Cybercrime Summit, Feb 27 - Mar 3, 2006

Friday, February 24, 2006 (23:44:08)
Originally known as the Southeast Cyber Crime Summit, the new and improved CyberCrime Summit starts its fourth year in existence. This is due to the growth and realization that the summit reaches beyond the Southeastern U.S. The CyberCrime Summit attracts attendees from all over the world. Last year in addition to the U.S. and many Northern European attendees, some of the farthest attendees came from Italy, and Colombia, South America.

Registration: $249.00

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1076 reads)

UK rapped on data retention law

Friday, February 24, 2006 (17:22:05)
Britain's net industry has named the UK presidency of the EU as its villain of the year. The Internet Service Providers' Association (Ispa) singled out the UK for its role in pushing for Europe-wide data retention laws. The laws, requiring telecom operators to store phone and internet data to help fight terrorism, received its final go-ahead earlier this week...

More (BBC)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (2500 reads)

Data Retention Directive endorsed by Ministers

Friday, February 24, 2006 (00:18:59)
The controversial Data Retention Directive received its final seal of approval on Tuesday, when Ministers at the Justice and Home Affairs Council adopted the Directive with a qualified majority. Irish and Slovak Ministers voted against the measure. In general terms, the Directive aims to harmonise Member States' provisions relating to the retention of communications data, in order to ensure that the data, which can identify the caller, the time and the means of communication, is available for the purpose of the investigation, detection and prosecution of serious crime. The Directive is not concerned with the content of the communications...

More (Out-Law.com)

Nowhere to hide

Thursday, February 23, 2006 (21:17:39)
Be careful what you try to deny is the message from Ed Wilding, particularly if files retrieved from electronic devices have your name all over them. The forensic investigation of data held on computers, laptops, cellular telephones, PDAs and other data processing and storage devices is a valuable resource in litigation and for dispute resolution...

More (Legal IT)

Washington Post fails to protect Deep Throat from metadata!

Wednesday, February 22, 2006 (21:32:45)
The Washington Post, famous for hiding the name of its Deep Throat source during the Watergate scandal, might have accidentally revealed the name of one of its sources in a less important yarn about a hacker...the article ran a doctored picture of 0x80 which when the people at Slashdot had a look at the metadata in the pic it revealed 0x80 lived in the town of Roland, population 2,842...

More (the Inquirer)
  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1002 reads)

Are non technical juries keeping criminals at large?

Wednesday, February 22, 2006 (19:32:47)
In England and Wales the only qualifications required of a jury member to be eligible to appear in a court of law are that they are registered on the electoral roll, aged between 18 and 70 and have lived in the UK for at least 5 years. Jurors are not required to hold any professional qualifications and there are to date no technical jury qualification guidelines for cases involving complex computer data. Where does that leave us then, when vital yet highly complicated technical information needs to be communicated and thoroughly understood in order to fairly evaluate a case? Let’s take a look at the evidence…

  • Posted by: jamie
  • Topic: News
  • Score: 0 / 5
  • (1992 reads)