Tuesday, July 31, 2012

Guest post by Nancy Parker

Gather Evidence to Prosecute Cyber-Criminals with Tech Forensics

Digital or tech forensics provide the digital evidence required to apprehend a hacker engaged
in criminal activity in the digital world. Without digital evidence, prosecution is not possible
and justice is unlikely. Tech forensics increases the possibility that justice will be served if the
hacker’s steps can be traced.

Corporations can take precautions. Proactive measures can be taken with the use of digital
forensics to prevent future breaches. Corporations can examine vulnerabilities and implement
safeguards to increase security in those areas.

For instance, wireless-based technology and infrastructure has grown in popularity in the last
10 years, but it is not without its vulnerabilities. Security threats are common with wireless
infrastructure. Wireless technology provides corporations with flexibility and convenience, but
it also opens the door for corruption, criminal activity and intentional misuse. Tech forensics can
help companies identify areas of weakness and close those doors for potential breaches while
maintaining convenience for the company.

The Future of Tech Forensics and Wireless Networks

More research in the field of tech forensics and wireless networks is required to prevent breaches
and gather adequate evidentiary support when breaches do occur. Currently, most companies
make use of wireless local area networks (WLANs). In an effort to reduce potential breaches,
researchers proposed a new wireless model in 2010 that incorporates a wireless drone with a
forensic server.

The wireless forensic model (WFM) monitors wireless network traffic at multiple access points
(APs). Wireless drones are employed to accomplish this goal. During monitoring, the drones
collect information about the network traffic and forward it to a centralized forensic server. The
server will store all acquired data for evaluation and future use. These systems were tested to
determine the efficacy and viability of the new model.

When evaluated on its ability to gather evidentiary information and store trails of digital
evidence relating to an attack, WFM proved its ability. The new model is capable of capturing
data generated even at the maximum speeds of a WLAN configuration. In most instances, data
integrity was maintained and details of the attacks were provided. When evaluated, researchers
found that the WFM model was capable of providing information about any attack that occurred.
This development marked the beginning of a new and more secure wireless network for

Prosecuting Cyber-Criminals

Without evidentiary support, cyber-criminals cannot be prosecuted and stopped. When
technology is put into place to gather evidence, the next phase of capturing cyber-criminals can
occur. DNA testing and analysis is another aspect of tech forensics that helps corporations gather
evidence to incarcerate guilty cyber-criminals. This technology is older and has been employed
since the 1980s. Newer technologies are expected to have a greater degree of precision.

Prior to implementing a strategy to catch cyber-criminals, every company should review the
basic principles of computer hacking forensic investigation. This ensures that companies
are gathering evidence in a “forensically sound manner.” When the information is captured
according to the principles, it can be used in a court of law to prosecute cyber-criminals. If
the evidence gathering procedures do not comply with the regulations for forensic evidence
gathering, the evidence may not be used in a court of law. Legal evidence is instrumental in
capturing cyber-criminals and gaining justice for victims.

How is Your Companies Tech Forensics Strategy?

More hacking incidents have occurred in the past two years than has historically occurred. Your
company’s tech forensics strategy is essential to survival. Talk with a professional that can
provide information about tech forensics solutions available to prevent breaches and capture

Author Bio

Nancy Parker was a professional nanny and she loves to write about wide range of subjects like
health, Parenting, Child Care, Babysitting, nanny background check tips etc. You can reach her
@ nancy.parker015@ gmail.com

Saturday, July 07, 2012

July 2012

Just updating my weblog in Istanbul at the airport since I just attended the International Association of Legal Medicine IALM 2012, where I presented a paper on face comparison as well as other body parts for forensic investigations and a poster on camera identification. It was a nice conference closed to the water in the Halic conference center, and good to see some good papers on CT and MRI imaging techniques for pathology. Where the main message is that these techniques are additional to the regular atopsy, since some causes of death can be determined by CT scans and angiography and others can only be determined by an atopsy. Also the AAFS had a special session within the conference which discussed the further implementation of the outcomes of the NAS-report.

Lately I received several messages of social network sites and even my phone provider that the database of password was hacked by cybercriminals. So it seems that either they did not detect it before, or they did not inform me, or perhaps indeed more sites are hacked. Having different passwords on different sites can help, however of course the best would be to have a 2-way protection as such, which some sites as gmail have implemented. 

Now it is also the time to submit abstracts for the American Academy of Forensic Science, since they should be in before August 1st. Also the Forensic IT Working group meeting in Rome, in October is also coming nearby.

the conference center of IALM