Tuesday, February 23, 2010

6 Steps To Having Computer Forensic Examination Done

Copyright (c) 2009 Ed Opperman

A computer forensic examination consists of the preservation, identification, extraction, and interpretation of documents that have been at one point stored on a computer. Whether you are looking for evidence from a crime or are simply looking to find information about your spouse, a Certified Computer Forensic Examiner can perform such an examination with six steps.

The first step the examiner will take is establishing some chain of custody. It is important that examiner knows where any items related to the investigation will be located at all times. Many times places like a safe or cabinet is best to secure the items.

Next, the examiner will catalog all relevant information including active, archival and latent data. Any kind of information that has been deleted can be recovered if at all possible and any encrypted information or information that is password-protected will be identified. During this process, an exact copy of the hard drive image will be made and the image is then authenticated against the original to ensure it is the exact copy.

From there, additional sources of information will be obtained depending on how the computer forensic examination is going and what the circumstances are. Some additional sources of information that may need to be obtained include firewall logs, proxy servicer logs, Kerberos server logs or sign-in sheets.

The fourth step during the examination is analyze and interpret all of the information in order to determine what can be used as evidence. The examiner will look for both exculpatory and inculpatory evidence to solidify a decision. In order to ensure the accuracy of the decision, encrypted files and password protected files will be identified.

After collecting all of the necessary information and evidence needed with the case, a written report will then be submitted to the client with whatever findings and comments the investigators have.

Finally, the investigator will provide expert witness testimony at a deposition, trial, or some other form of legal proceeding. Keep in mind that you cannot perform a computer forensic examination on your own. A certified examiner uses licensed equipment that will prevent tainting the evidence and ultimately ensure its validity in court.

When looking for a computer forensic examination, make sure you look for help from a certified examiner. They will be able to help you with whatever problem or evidence you are looking to attain. When performing the examination, the examiner will go through the six steps listed in this article in order to do so legally and efficiently.


Ed Opperman invites you to visit his cyber investigation website for all of your search needs. He offers employment locate, internet infidelity investigations, email tracing, telephone investigations, and much more. To learn more about how to recover deleted pics and other useful information please click here now:===> http://www.emailrevealer.com

Saturday, February 20, 2010

Computer Forensics nabs Child Pornography Suspect

NEW YORK – U.S. Immigration and Customs Enforcement (ICE) special agents took a Long Island man into custody at his home on Feb. 12. The arrest was announced by U.S. Attorney Benton J. Campbell, Eastern District of New York, and ICE Special Agent in Charge James T. Hayes Jr.

Matthew Sasbon, 29, of Mastic, N.Y., admitted to having downloaded and saved pictures and videos of child pornography on thumb drives seized by ICE agents.

According to the complaint, Sasbon admits to trading pictures using the Internet and to viewing child pornography, some of the victims as young as newborns, as recently as two weeks ago.

A preliminary computer forensic examination of a computer in Sasbon’s home revealed a number of video files of apparent child pornography involving prepubescent girls.

“Predators who think they can hide are mistaken – we have agents with the know-how and technology to find them,” said Hayes. “Child pornography is a heinous crime that physically and mentally scars the most vulnerable members of our society – our children.”

The investigation began in Oct. 2008 after ICE special agents with the Child Exploitation Section discovered a publicly accessible Web site used to send and receive child pornography over the Internet. The investigation revealed the Internet address (IP address) was subscribed to Matthew Sasbon’s father.

ICE investigators discovered online chats in which Sasbon used various usernames on his father’s IP address to allegedly receive child pornography and expressed his interest and desire to sexually exploit young children.

This case was part of Operation Predator, which is a nationwide ICE initiative to protect children from sexual predators, including those who travel overseas for sex with minors, Internet child pornographers, criminal alien sex offenders, and child sex traffickers.

ICE encourages the public to report suspected child predators and any suspicious activity through its toll-free hotline at 1-866-DHS-2ICE. This hotline is staffed around the clock by investigators.

Saturday, February 6, 2010

FBI has released Michael Jackson FBI file

By Phyllis Pollack


Michael Jackson's FBI file has been released.

This morning, the FBI declassified Michael Jackson's FBI file.

Some of its contents were disseminated to the Secret Service because of a death threat made against Jackson and against George Bush by a man who attempted to gain access to the White House.

A Los Angeles field office bureau file was opened in 2004 to investigate child molestation allegations. Due to lack of witness cooperation, the case was closed.

The Los Angeles field office opened this file when it was asked by local authorities to provide forensic computer analysis assistance in a child molestation investigation in 2004. The examination of evidence in this case was conducted by the FBI’s Computer Analysis and Response Team (CART). Mr. Jackson was ultimately acquitted of these charges in a California court.

One hundred and twenty-three pages were withheld to protect personal privacy, the identity of sources that provided information to the FBI in confidence, and internal rules and practices or to prevent the disclosure of techniques and procedures for law enforcement investigations or prosecutions.

Another part of the file This file involves a request made of the FBI's Critical Incident Response Group to provide advice and assistance to local authorities concerning a child molestation investigation in 2004.

Some information was redacted and held private by the FBI after releasing the file to protect personal privacy and internal rules and practices.

Last week, this Examiner.com column was the first media outlet to break the news that Jackson's file would be released, reporting it at noon Pacific Time on December. 18.

This Examiner.com column was also the first media outlet to report that the file would be declassified today, both on December 18 and earlier today.

The Five Signs He May Be Having a Cyber Affair

Published December 21, 2009 by:
Jan Stankewitz-Hunt

So you think that he's cheating on you but he's not leaving the house? Then he may be having a cyber affair. Look for the following signs.

Sign 1 : He's always on the Internet but you have no clue what he's doing.

Your mate is on the Internet but you have no clue what he's doing on there. When you ask what he is doing he says nothing or stalls and takes forever to come up with a reason for all the late night hours on the net. He never buys anything, talks to anyone or plays games. Install Family Cyber Alert to catch him in the act.

Sign 2 : He suddenly knows what Craigslist is.

Your mate comes to you suddenly and tells you that he saw a great, fill in the blank, on Craigslist and wants to buy it. More than likely he might have been on there looking at their casual encounters section looking for a playmate to talk to. You can always post an ad on their yourself and see if he responds to you.

Sign 3 : He has a new e-mail address that he didn't tell you about.

This e-mail might have been set up to receive e-mails from the other woman or women. You see him checking it but you don't know the password and you ask why but he has no excuse and closes the window before you can see the content. Try sending him something personal to this account and see if you get a response or you can try to crack his password through yahoo.

Sign 4 : He installs cCleaner on your computer.

This program wipes out all Internet history, cookies, temp files and more. You will never know where he has been or what he has been doing. If every time you get on the computer he has used this you might be looking at a cheater.

Sign 5 : He's never in bed when you are.

He says that he needs to finish something and will be to bed in a bit. You wait and when you go downstairs he closes the screen down and shuts off the computer and says he coming to bed. Or he may get up way before you do in the morning to carry on on the net with someone else in another time zone. This man may also not be showing any sexual interest in you no matter what you do to tempt him into it. He may not even be able to preform even though you have put on his favorite nurse outfit.