[ale] OT: qualified/reputable computer forensics expert
Sid Lane
jakes.dad at gmail.com
Thu Jan 4 11:15:06 EST 2007
thanks to everyone for the references!
I have forwarded them on...
Norcross group came reccomended from some of our people here too...
from the information I'm getting it doesn't sound like the "forensic" work
was done in a manner even approaching professional. they're not sure what
to scrutinize because they've not gotten any technical details of how it was
found (just a digital photo of a screenshot - nice). no documentation of
whether they checksummed the drive/partitions before/after examination,
read-only mounted, names/versions of tool(s) used, etc. - basic DUH! stuff.
not even actual filename(s)/path(s) (i.e. was it in "my documents\..." or a
browser cache and/or swapfile, etc.). I don't know if that means it
actually was done that sloppily (i.e. system was actually booted, possibly
still connected to internet, and "browsed") or if it was done "right" and
they're just withholding that evidence...
On 1/3/07, Bob Toxen <bob at verysecurelinux.com> wrote:
>
> On Tue, Jan 02, 2007 at 01:03:46PM -0500, Sid Lane wrote:
> > I have an in-law in need of this service (unfortunately not **AA related
> -
> > wish it were that benign) to scrutinize recently disclosed evidence.
> >
> > sorry, can't provide any specifics beyond that (their family isn't
> telling
> > me much which is pretty frustrating).
> >
> > any references would be greatly appreciated...
> I'm experienced at doing this on Linux and Unix systems, including
> Macs. If it is a Windows box or other equipment I may be able to do
> it, depending on circumstances.
>
> My references include Dow Hurst, a long time ALE member:
>
> Dow Hurst
> 336-334-5122:W
> University of North Carolina, Greensboro
> 1000 Spring Garden Street
> Greensboro, NC 27403
> Dow.Hurst at mindspring.com dphurst at uncg.edu
>
> Best regards,
>
> Bob Toxen, CTO
> Horizon Network Security
> "Your expert in Firewalls, Virus and Spam Filters, VPNs, Linux System
> Administration, local and remote backup software, Network Monitoring,
> and Network Security consulting, in business for 16 years."
>
> http://www.verysecurelinux.com [Network & Linux/Unix Security
> Consulting]
> http://www.realworldlinuxsecurity.com [My 5* book: "Real World Linux
> Security"]
> http://www.verysecurelinux.com/sunset.html [Sunset
> Computer]
> bob at verysecurelinux.com (e-mail)
> +1 770.662.8321 (Office: 10am-6pm M-F U.S. Eastern Time)
> +1 404.216.5100 (Cell away from office)
>
> My recent training and talks on Linux security include:
> in Ireland on Dec 04-08 2006
> in Denver, CO on May 16-18 2006
> in Silicon Valley, CA on May 1-3 2006
> at ISSA, Atlanta, GA on Apr. 26 2006
> at ISSA, Kennesaw, GA on Apr. 25 2006
> in Denver, CO on Feb. 15-16 2006
> in Silicon Valley, CA on Jan. 15-17 2006
>
> in Silicon Valley, CA on Dec. 5-13 2005
> in Chattanooga, TN on Jun. 16 2005
> in Denver, CO on May. 16-20 2005
> in Denver, CO on Feb. 28-04 2005
>
> in New Jersey on Nov. 15-16 2004
> at Atlanta Unix Users Group on Nov. 01 2004
> in Boston, MA on Oct. 11-14 2004
> in Denver, CO on Sep. 27-28 2004
> at Linux World SF signing at Prentice Hall's booth on Aug. 03 2004
> in Denver, CO on Jul. 12-13 2004
> at the Atlanta SecureWorld Expo in Atlanta on May 27 2004
> in New Jersey on May. 25-26 2004
> in Denver, CO on Apr. 15-16 2004
> at the FBI's Atlanta headquarters on Mar. 10 2004
> at Southeast Cybercrime Summit in Atlanta on Mar. 4 2004
>
> in New Jersey on Oct. 27-30 2003
> at Computer Associates' Atlanta Linux Security Summit on Sep. 16 2003
> at the Enterprise Linux Forum in Silicon Valley on June 04 2003
> at the Atlanta SecureWorld Expo in Atlanta on May 22 2003
> at IBM's Linux Competency Center in New York City on Mar. 06 2003
>
> Author,
> "Real World Linux Security: Intrusion Detection, Prevention, and Recovery"
> 2nd Ed., Prentice Hall, (C) 2003, 848 pages, ISBN: 0130464562
> Also available in Japanese, Chinese, Czech, and Polish.
>
> If you spend more on coffee than on IT security, you will be hacked.
> What's more, you deserve to be hacked.
> -- White House cybersecurity adviser Richard Clarke
>
> Public key available at http://www.verysecurelinux.com/pubkey.txt,
> keyservers,
> and on the CD-ROM that comes sealed and attached to Real World Linux
> Security
> pub 1024D/E3A1C540 2000-06-21 Bob Toxen <book at realworldlinuxsecurity.com>
> Key fingerprint = 30BA AA0A 31DD B68B 47C9 601E 96D3 533D E3A1 C540
> sub 2048g/03FFCCB9 2000-06-21
>
> > _______________________________________________
> > Ale mailing list
> > Ale at ale.org
> > http://www.ale.org/mailman/listinfo/ale
>
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Ale
mailing list