±Forensic Focus Partners

Become an advertising partner

±Your Account


Forgotten password/username?

Site Members:

New Today: 0 Overall: 36738
New Yesterday: 0 Visitors: 141

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Page 373

Search on This Topic: News

[ Go to Home | Select a New Topic ]

Authorities use computers to track down woman accused of murder

Saturday, December 18, 2004 (19:44:50)
Authorities say they used computer forensics to zero in on a Kansas woman accused of killing another woman and stealing her unborn baby. The baby, that had been cut out of her mother's womb, was found alive Friday after a frantic search, and authorities arrested the woman they say strangled the child's mother. The baby girl is said to be in good health.

More (WMTW)

Napier 'spy' software set to fight terrorism

Tuesday, December 07, 2004 (20:01:11)
Computer "agents" which can help fight global terrorism and organised crime are being developed by scientists at an Edinburgh university. Academics at Napier University are creating software programs which act as detectives - accessing other computers via the internet or wireless technology and seeking out signs of criminal activity. Dr Bill Buchanan, leader of the Distributed Systems research group in the institute’s School of Computing, is working with the Police Information Technology Organisation (PITO) to produce the software, which he says is more reliable and trustworthy than human investigators.

More (Edinburgh Evening News)

UK man jailed after computer forensics investigation

Monday, December 06, 2004 (11:18:19)
Computer forensics leads to conviction for UK man at Warrington Crown Court

More (Cheshire Online)
  • Posted by: Andy
  • Topic: News
  • Score: 0 / 5
  • (2039 reads)

Cellphone Forensic Software Open Sourced

Saturday, December 04, 2004 (13:40:33)
The Netherlands Forensic Institute (part of the Dutch Ministry of Justice) has open sourced one of their high-profile software frameworks, TULP2G. With this BSD licensed framework, one can extract and decode all data from GSM SIM cards, e.g. called phone numbers and received SMS messages. This was previously only possible with commercial software.

More (Slashdot)

Computer forensics aids schoolyard fight investigators

Wednesday, December 01, 2004 (12:26:20)
A second teen has been charged in a schoolyard fight that was videotaped, set to music and sold to high school students in an edited form. With the help of Beaverton computer forensics company NTI Breakwater, police were able to remove an overlay of rap music and restore the original audio track and edited segments to the recording, allowing investigators to hear what was said in the Junction City High School parking lot the evening of Oct. 21.

More (The Register-Guard)

Version 0.69 of the Honeywall CDROM released

Monday, November 22, 2004 (15:05:21)
The Honeynet Project has announced the release of version 0.69 of the Honeywall CDROM. Some key features of this new version include

- - Whitelisting: The ability to identify IP's and networks you
want to allow inbound and outbound of your honeynet, but do not want to log or alert on.
- - Blacklisting: The ability to identify IP's and networks you
want to deny inbound and outbound of your honeynet and do not
want to log or alert on.
- - Traffic Summary: Improved traffic summary reporting, with
the addition of Snort alerts, Snort-Inline alerts, and
Suspicious traffic.

More (The Honeynet Project)

Detection of 'counterfeit reality' becoming a new specialty

Friday, November 19, 2004 (11:09:59)
During the past decade, the DNA technology used to solve crimes and settle paternity suits has become a big business. The federal government alone spent $232 million this past fiscal year promoting the use of a technology that barely existed 20 years ago. Now two information-technology experts with Florida ties are predicting the use of digital forensics to police -- what they call "counterfeit reality'' -- will soon join DNA science as a growth industry.

A coming explosion of counterfeit reality -- the use of computers and digitally based media to produce fake images, video, documents or sounds -- will drive a multibillion-dollar business of detecting what is real and what is not, say Daryl Plummer and Frank Kenney, analysts with Gartner Inc., a market-research firm based in Stamford, Conn.

More (Duluth News Tribune)

Top cops of London, Delhi meet

Friday, November 19, 2004 (10:36:22)
Top officials of London Police yesterday met their counterparts in New Delhi to discuss areas of mutual interest, including cyber crime and computer forensics. Commissioner of London Metropolitan Police John Stevens and Deputy High Commissioner of Britain Mark Runacres, accompanied by senior police officials, held talks with Delhi Police Commissioner K K Paul and his senior colleagues at the police headquarters.

More (Team India)

Method Provides Double Computer Crime-Solving Evidence

Wednesday, November 17, 2004 (18:54:57)
Like an episode of "CSI: Computers," a UF researcher has developed a technique that gives digital detectives twice the forensic evidence they now have to catch all kinds of hackers, from curious teenagers to disgruntled employees to agents of foreign governments.

Writing in the current issue of the International Journal of Digital Evidence, UF doctoral student Mark Foster proposes a new and improved method of computer crime solving, called “process forensics.”

“If a guy walks into a bank and robs it, leaving footprints behind or his fingerprints on the counter, the forensic analyst would come in and find those traces of what happened,” said Foster. In the same way, process forensics merges two existing types of digital evidence – intrusion-detection and checkpointing technology – to give an investigator the most possible information to crack a case, said Foster, a computer science and engineering student conducting the research for his dissertation with UF professor of computer science Joseph Wilson, who co-wrote the paper.

More (Newswise)

Final version of NIST's "Guidelines on PDA Forensics" complete

Tuesday, November 16, 2004 (18:53:30)
Special Publication 800-72, entitled Guidelines on PDA Forensics, was developed to help organizations evolve appropriate policies and procedures for dealing with PDA forensics and to provide forensic specialists with a background on the technology, tools, and principles involved. The intended audience ranges from response team members handling a computer security incident, to organizational security officials investigating an employee-related situation, to forensic examiners involved in criminal investigations.

More (IWS)