The American Civil Liberties Union, based in New York, NY., reported the U.S. Government claims the right to read personal online data without warrants. This trend is not unique to the U.S. Government. Many governments around the world make requests of these service providers as well.
According to statistics published by Google, it received over 16,000 requests for information affecting over 31,000 users in 2012. Google’s same statistics stated they provided information in over 85% of the requests.
In 2012 Microsoft received over 70,000 requests affecting over 120,000 accounts. While this is a much higher number, Microsoft only produced information on these requests about 2% of the time. Almost 80% of the requests asked Microsoft to divulged subscriber and transactional information only.
Locking the thieves out:
Companies and individuals can take easy steps to prevent thieves, companies and the government from gaining access to online storage which contains private information.… Read More
Computer Forensics, or Digital Forensics to give it another name, is something that in today’s fast moving environment has become as much part of policing as walking the beat or patrolling or the mobile unit.
As technology progresses and it does so extremely quickly these days, so to do the ways in which technology is applied to crime and its uses by the criminal. Whereas in the past when crime was much more straightforward and involved a physical presence, Computer Crime requires, in some instances, nothing more than a computer, access to the internet, and the personal information of an unwitting individual.
As this type of computer criminal becomes more and more common so too does the need for experts in the field of Computer Forensics Analysis. However in the United Kingdom at the present time there is a shortage of trained professionals in this field which leaves the computer … Read More
Computer forensics is the process of using the latest knowledge of science and technology with computer sciences to collect, analyze and present proofs to the criminal or civil courts. Network administrator and security staff administer and manage networks and information systems should have complete knowledge of computer forensics. The meaning of the word “forensics” is “to bring to the court”. Forensics is the process which deals in finding evidence and recovering the data. The evidence includes many forms such as finger prints, DNA test or complete files on computer hard drives etc. The consistency and standardization of computer forensics across courts is not recognized strongly because it is new discipline.
It is necessary for network administrator and security staff of networked organizations to practice computer forensics and should have knowledge of laws because rate of cyber crimes is increasing greatly. It is very interesting for mangers and personnel who want … Read More
In today’s society, traveling with a laptop seems like an everyday occurrence, whether for “mobile office” or just personal use. There are some things you should be aware of when traveling with your laptop. Since it is portable and portable items can be easily lost or stolen. Here are a few tips to help avoid heartache and an employer’s wrath.
#1 Treat your laptop like cash. Some of the information might be replaceable. Other information, however, may be irreplaceable. There is also the risk of someone using the information to further their cause (attempt to sell it back to you, or one of your competitors). If nothing else, it will be the hell and countless hours you have to go through to get another machine and get it setup just like the laptop which disappeared.
#2 Never leave your laptop alone and exposed, ANYWHERE! Not in the car, not in … Read More
The Dennis Rader Computer Forensics Case
Back in January 1974 police turned up at a family home to find a horrific scene all four members of the same family has been brutally murdered. This included Joseph and Julie Otero and the two children 11 year old daughter and the 9 year old son. This was the start of the now infamous serial killers campaign of terror with his self-styled insignia “BTK”. His murderous rampage continued on for 17 years when he committed his last confirmed murder. The Otero family was a little outside the normal victims of the BTK which generally fell within the female gender with a wide age range, he was also known to label his victims as projects.
Dennis Rader the BTK killer would contact and communicate with the police and local media on a regular basis he would use newspaper columns and leave clues and cryptic … Read More
The most common visual is the pale nerd in his mother’s basement who is getting into his university server to change his rivals grades to failing ones. Then there are the various Hollywood depictions which show “master criminals” manipulating traffic signals and financial markets. This is a fairly recent use of the word “hacker” and for years before it had a very different meaning.
In the early 90’s when Linux (a popular free computer operating system) was introduced, the word hacker did not even exist. Users of these operating systems referred to themselves as “hackers”, only due to their ability to manipulate and reuse programming code for their own purposes, outside of its originally intended purpose. If you think of them as chefs, everyone has that one basic recipe for lobster bisque, but each chef will put their own spin on the recipe to make it their own. They were … Read More
The world of computer forensics — like all things computer — is rapidly developing and changing. While commercial investigative software packages exist, like EnCase by Guidance Software and FTK by AccessData, there are other software platforms which offer a solution for obtaining computer forensic results. Unlike the two aforementioned packages, these open sources alternatives do not cost hundreds of dollars — they are free to download, distribute and use under various open source licenses.
Computer Forensics is the process of obtaining information from a computer system. This information may be obtained from a live system (one that is up and running) or a system which has been shut down. The process typically involves taking steps to obtain a copy, or an image of the target system (often times an image of the hard drive is obtained, but in the case of a “live” system, this can even be the other … Read More
What’s the difference between data recovery, computer forensics and e-discovery?
All three fields deal with data, and specifically digital data. It’s all about electrons in the form of zeroes and ones. And it’s all about taking information that may be hard to find and presenting it in a readable fashion. But even though there is overlap, the skill sets require different tools, different specializations, different work environments, and different ways of looking at things.
Data recovery generally involves things that are broken – whether hardware or software. When a computer crashes and won’t start back up, when an external hard disk, thumb drive, or memory card becomes unreadable, then data recovery may be required. Frequently, a digital device that needs its data recovered will have electronic damage, physical damage, or a combination of the two. If such is the case, hardware repair will be a big part of the data … Read More
Do you think you have control over all your valuable assets, including trillions of dollars of transactions happening all around the year? If yes, then I am sure you must have developed a sophisticated and multi-faced approach to cyber-security in advance and if no, then you must consider developing one. With the era of digitization, cybercrime is increasing at a rapid rate. After all, there are tons of high school students hacking into systems in their spare time and most of the current attacks are initiated through such gimmicks.
Computer Forensics is a highly specialized area where investigators are charged for uncovering or fighting cyber crime for law enforcement agencies. These professionals spend most of their time working on computers, either in an office or digital laboratory setting. A computer forensics expert is mostly meant to work on digital artifacts such as computer systems, hard drives, CD’s and several other … Read More