Privacy International
Privacy International (PI) is a human rights group formed in 1990 as a watchdog on surveillance by governments and corporations. PI is based in London, England, and has an office in Washington, D.C. PI has conducted campaigns throughout the world on issues ranging from wiretapping and national security activities, to ID cards, video surveillance, data matching, police information systems, and medical privacy.
Friday, January 18, 2002
Cyber Solutions Tools Center
CIAC's Cyber Solutions Tools Center (CSTC), located at the Lawrence Livermore National Laboratory, provides solutions to U.S. Government agencies facing today's security challenges in information technology. We maintain information protection core-competencies through high-tech, integrated INFOSEC incident response, product development, and consulting services.
The CIAC is composed of three complementary business units: Operational Incident Response; Advanced Security Projects; and Secure Systems Services.
The Operational Incident Response group assists the Department of Energy in its information protection efforts by providing computer security incident response related services.
The CIAC is composed of security-cleared information security professionals with backgrounds in computer science, information systems, and engineering specializing in awareness, training, and education; Electronic Commerce security; electronic security assessment; firewall and web security; incident response; Internet and Intranet security; intrusion detection; malicious code detection and eradication; network security; policies and procedures; risk management; and system and software engineering.
CIAC's Cyber Solutions Tools Center (CSTC), located at the Lawrence Livermore National Laboratory, provides solutions to U.S. Government agencies facing today's security challenges in information technology. We maintain information protection core-competencies through high-tech, integrated INFOSEC incident response, product development, and consulting services.
The CIAC is composed of three complementary business units: Operational Incident Response; Advanced Security Projects; and Secure Systems Services.
The Operational Incident Response group assists the Department of Energy in its information protection efforts by providing computer security incident response related services.
The CIAC is composed of security-cleared information security professionals with backgrounds in computer science, information systems, and engineering specializing in awareness, training, and education; Electronic Commerce security; electronic security assessment; firewall and web security; incident response; Internet and Intranet security; intrusion detection; malicious code detection and eradication; network security; policies and procedures; risk management; and system and software engineering.
How Goner suspects were tracked down
Messages coded into the Goner worm and monitoring of the IRC channel used to control its activities led to the arrest of four suspected Israeli virus writers over the weekend.
One of the actions of Goner, which normally spreads as an infected attached-to-email message, is to install denial of service scripts for the mIRC Internet Relay Chat client. By monitoring the #pentagonex channel used to control the worm's activities, security experts working for DALnet IRC were able to track down its suspected creators.
Messages coded into the Goner worm and monitoring of the IRC channel used to control its activities led to the arrest of four suspected Israeli virus writers over the weekend.
One of the actions of Goner, which normally spreads as an infected attached-to-email message, is to install denial of service scripts for the mIRC Internet Relay Chat client. By monitoring the #pentagonex channel used to control the worm's activities, security experts working for DALnet IRC were able to track down its suspected creators.
Thursday, January 17, 2002
DIBS USA Inc - World Leaders in Computer Forensics
DIBS USA Inc is a privately owned, independent US corporation, specializing in forensic computing, with activities in three main areas.
DIBS USA Inc is a privately owned, independent US corporation, specializing in forensic computing, with activities in three main areas.
HashKeeper
HashKeeper is a database application of value primarily to those conducting forensic examinations of computers on a somewhat regular basis. The application uses the MD5 file signature algorithm to establish unique numeric identifiers (hash values) for known files and compares those known hash values against the hash values of unknown files on a seized computer system. Where those values match, the examiner can say, with statistical certainty, that the unknown files on the seized system have been authenticated and therefore do not need to be examined.
HashKeeper is a database application of value primarily to those conducting forensic examinations of computers on a somewhat regular basis. The application uses the MD5 file signature algorithm to establish unique numeric identifiers (hash values) for known files and compares those known hash values against the hash values of unknown files on a seized computer system. Where those values match, the examiner can say, with statistical certainty, that the unknown files on the seized system have been authenticated and therefore do not need to be examined.
BEST PRACTICES FOR SEIZING
ELECTRONIC EVIDENCE
A Joint Project of the International Association of Chiefs of Police
and the United States Secret Service.
ELECTRONIC EVIDENCE
A Joint Project of the International Association of Chiefs of Police
and the United States Secret Service.
Links
- Get MIRC IRC Software
- Get Prevention/Powerpoint Presentations (Prevention/Awareness)
- Get Internet/Online Service Provider List#1 and List#2
- Get Sunny Parmar's Online Investigation Manual (Email Request)
- Look-up National Police Contact List By CITY/STATE
- Join HTCC & Get on Police High Tech Contact List
- Join CFID/Get on the Computer Forensics Investigators Digest (Email)
- Get Computer Security Manual
- Get Free Encryption programs
- Get Neo Trace Tracking Program
- Get WS-Ping Pro Tracking Program
- Get Revelation Password Crack
- Get the ICSA Anti-Spoofing Test Tool
- Get New Defender Programs
- Get Steganos Encryption/Data Hiding Software Suite
- Get Evidence Eliminator Software (Use Caution)
- Get Forensic Software List (1)
- Get Forensic Software List (2)
- Get File Extension Information (Look-Up File Extensions)
- Get Federal Guidelines on Computer Search & Seizure
- Get example Affidavit-Search Warrant for Computers (Child Porn)
- Get some Federal Laws Pertaining to Computer Crime
- Get MD5 Hash Values for Child Porn Images (Email Request)
- Get how to Read/Trace E-Mail Info.
- Get the Port Number List
Evidence Eliminator - What evidence is on your hard drive?
Links to interesting Forensic Services.
These sites offer services, software programs and information about recovering deleted data from hard drives.
Links to interesting Forensic Services.
These sites offer services, software programs and information about recovering deleted data from hard drives.
Quality Security Tools
In May/June of 2000, we conducted a survey of 1200 Nmap users from the nmap-hackers mailing list to determine their favorite security tools. Each respondant could list up to 5.
I was so impressed by the list they created that I am putting the top 50 up here where everyone can benefit from them. I think anyone in the security field would be well advised to go over the list and investigate any tools they are unfamiliar with. I also plan to point newbies to this page whenever they write me saying "I do not know where to start".
In May/June of 2000, we conducted a survey of 1200 Nmap users from the nmap-hackers mailing list to determine their favorite security tools. Each respondant could list up to 5.
I was so impressed by the list they created that I am putting the top 50 up here where everyone can benefit from them. I think anyone in the security field would be well advised to go over the list and investigate any tools they are unfamiliar with. I also plan to point newbies to this page whenever they write me saying "I do not know where to start".
Wednesday, January 16, 2002
Electronic Harassment Specialists
It is our goal to help victims of Electronic Harassment. This is done with decades of well trained, experienced and knowledgeable professionals. Electronic Harassment occurs in almost every country in the world, it knows no borders. Neither do we. We will not rest until Electronic Harassment is properly legislated or eliminated.
It is our goal to help victims of Electronic Harassment. This is done with decades of well trained, experienced and knowledgeable professionals. Electronic Harassment occurs in almost every country in the world, it knows no borders. Neither do we. We will not rest until Electronic Harassment is properly legislated or eliminated.
Monday, January 14, 2002
Free Security Scan
Worried about hacker attacks on your always on Internet connection? Test your Internet Security with our Free Security Scan. This utility will scan your computer for possible weaknesses. We simply scan for available ports and processes servicing those ports that appear to the public.
Worried about hacker attacks on your always on Internet connection? Test your Internet Security with our Free Security Scan. This utility will scan your computer for possible weaknesses. We simply scan for available ports and processes servicing those ports that appear to the public.
Subscribe to:
Posts (Atom)