Criminals long ago got a whiff that law enforcement could not trace or track them if they purchase these phones at a retail or discount store. Of course, the privacy sirens are raising a stir about this new development, but they should know that law enforcement will still have to pursue court orders to get the information, just as usual. Drug dealers, terrorists, gang members, and white-collar criminals should be very concerned about this development. Law-abiding citizens should not. http://lnkd.in/KmQZhf
Wednesday, June 9, 2010
People terrified of a malicious virus destroying their computer systems are purchasing useless software that its unscrupulous sellers say will protect their computers from infection. Scareware is booming, and criminals are becoming rich from selling it. Would you fall for this ploy? http://www.usatoday.com/money/industries/technology/2010-06-07-scareware07_ST_N.htm
Friday, May 21, 2010
Thursday, May 20, 2010
While this article says you can start out learning computer forensics on your own - I did - you will soon have to take courses from one of the major vendors - AccessData for FTK (Forensic Toolkit), Guidance Software for EnCase, Prodiscover, etc. Without formal training, you will never be seriously taken in court, and will find it very difficult to compete for customers.
Tuesday, May 11, 2010
Typically, printers not attached to computers with built-in hard drives have proprietary software running, usually of the Linux or Unix flavor. If a user has another Linux or Unix computer on that network, he might be able to see one or more volumes at that IP address, and perhaps copy those files.
Computer forensic examiners who have processed a few of these type printers pulled the hard drives and imaged them the old-fashioned way. Analysis of the hard drives in the scanner/copiers found full copies and fragments of many of the documents that had been scanned.
Some other interesting info I ran across:
"Researchers at Purdue University have developed a method that will enable authorities to trace documents to specific printers, a technique law-enforcement agencies could use to investigate counterfeiting, forgeries and homeland security matters. The technique uses two methods to trace a document: first, by analyzing a document to identify characteristics that are unique for each printer, and second by designing printers to purposely embed individualized characteristics in documents. The technique currently focuses on laser printers but eventually will be expanded to inkjet printers, said Edward J. Delp, a professor of electrical and computer engineering at Purdue."
Full article here:
Thursday, May 6, 2010
Wednesday, May 5, 2010
Tuesday, April 27, 2010
Monday, April 19, 2010
Tuesday, April 13, 2010
Monday, April 12, 2010
Friday, March 26, 2010
Thursday, March 25, 2010
Monday, March 22, 2010
Sunday, March 21, 2010
Wednesday, March 10, 2010
Tuesday, March 9, 2010
Sunday, March 7, 2010
Thursday, March 4, 2010
Tuesday, March 2, 2010
"Digital Evidence - A Primer on Computer Forensics"
Presented by Dave Pettinari, CEO of TAC Forensics, LLC, Director of Forensics for ECSI, Online Instructor for University of Phoenix
From computers to smart phones, our actions and communications are captured in greater
detail than ever before.
Don't miss this opportunity to learn about
the unseen world of digital evidence and how you can apply it to your cases.
Presented by: Dave Pettinari
Date: March 23, 2010
Time: 9:00 a.m. - 12:00 p.m. (Registration
Begins at 8:30 a.m.)
Location: Expert Consulting Services,
Inc., 2140 S. Ivanhoe Street, Suite 105
Submitted for 3 general CLE credits
Learn more at our website:
To register: Download our registration
form here, call ECS at (303) 226-0450
or email us at email@example.com
Tuesday, February 23, 2010
Sunday, February 7, 2010
Tax time is upon us, and we are all desperate to read up on and learn about the new stuff we need to know to save money on our taxes.
Criminals are taking advantage of that thirst for tax season info by sending out phishing e-mails that could cause you a lot of problems.
What could we do to alert folks to these dangers so they can protect themselves before they fall victim to them?
Reference: The Tech Herald, Tax season kicks off with a wave of related scams, retrieved 7 February 2010 from http://www.thetechherald.com/article.php/201005/5177/Tax-season-kicks-off-with-a-wave-of-related-scams.
Would it interest you if one of your friends posted on your Facebook page that his ex-girlfriend had cheated on him?
Don't go there…DO NOT click on this announcement. Here's why: http://ping.fm/RmuaO