Profile

Cover photo
126 followers|28,343 views
AboutPostsReviews

Stream

 
The mere presence of an unlawful image on a computer or mobile phone is commonly becoming the only evidence used to form criminal cases... 
1
1
MJP solicitors's profile photo
Add a comment...

Athena Forensics

Shared publicly  - 
 
People near clashes between riot police and protesters on Tuesday received a text message saying, “You are registered as a participant in a mass disturbance.”
1
Add a comment...
 
UK and US intelligence have reportedly cracked technology used to encrypt internet services such as online banking, medical records and email.
UK and US intelligence have reportedly cracked technology used to encrypt internet services such as online banking, medical records and email.Disclo..
1
Add a comment...

Athena Forensics

Shared publicly  - 
 
Plans to cut the legal aid bill by awarding contracts to the lowest bidder have been dropped, Justice Secretary Chris Grayling has announced. 
1
Add a comment...
 
 
The Palestinian hacker 'Khalil Shreateh', who broke into the Mark Zuckerberg's Facebook Timeline to expose a security lapse will be awarded nearly $12,000 but not from Facebook, it will come from an online crowdsourced campaign.

Read more : http://thehackernews.com/2013/08/palestinian-hacker-who-hacked.html
13 comments on original post
1
Add a comment...
Have them in circles
126 people
Catherine McDonald's profile photo
Michael Dickinson's profile photo
Orawan JANJD's profile photo
Dodd Franks's profile photo
thx Chang's profile photo
wilfredo munoz's profile photo
Jim Ault's profile photo
claims.com's profile photo
Forensic Computing's profile photo
 
 
Microsoft remotely deleted Tor-based #Malware called 'Sefnit' and older version of Tor Browser from 2 Million Systems http://thehackernews.com/2014/01/microsoft-remotely-deleted-tor-browser.html
In an effort to takedown Sefnit malware Botnet, Microsoft had remotely deleted Tor Browser from more than 2 Million Systems.
View original post
1
Add a comment...

Athena Forensics

Shared publicly  - 
 
More than 300,000 attempts were made to access pornographic websites at the Houses of Parliament in the past year, official records suggest. 
1
Add a comment...

Athena Forensics

Shared publicly  - 
 
Hundreds of millions of people rely on Dropbox and similar services to store, share, and update their files however a growing body of research shows..
1
Add a comment...

Athena Forensics

Shared publicly  - 
 
PRISM and Data Protection for EU Citizens

The Chair of the Article 29 Working Party has expressed concerns about the impact of the US PRISM program on the data protection rights of EU citizens in a letter to EU Commissioner Reding

The Article 29 Working Party has released the text of a letter written by its Chair, Jacob Kohnstam, to EU Commission Vice-President Viviane Reding. The letter, dated 13 August, concerns what he describes as 'the recent Prism controversy and related disclosures on the collection of and access by the American intelligence community to data on non-US persons'. He describes the revelations about XKeyscore, which allegedly allows for the collection and analysis of the content of internet communication from around the world, as 'especially alarming'.

The first of the Article 29 Working Party's concerns, and the questions which are identified as needing to be answered, relate to what data has been collected and what safeguards are in place when accessing it:

'The WP29 would … like to know when US authorities consider personal data to be inside the US, especially given the continuously increasing use of the internet for processing personal data, where much information currently is stored in the cloud, without knowing the exact location of the datasets, and following the global scale of backbone networks and their inherent capability to convey a wide range of communication services. It needs to be determined whether data on communication networks that are only routed through the United States (data that are in transit) are also subject to collection for the aforementioned intelligence programs'.

The nature of the FISA court procedures and the extent to which EU citizens have 'redress' are also questioned. Predictably, Safe Harbour issues are raised too:

'The Safe Harbour Principles indeed do allow for a limitation of adherence to the Principles "to the extent necessary to meet national security (…) requirements". However, the WP29 has doubts whether the seemingly large-scale and structural surveillance of personal data that has now emerged can still be considered an exception strictly limited to the extent necessary. Furthermore, the WP29 recalls that the Article 3.1 (b) of the Commission Decision on the Safe Harbour principles (Decision 2000/52/EC of 26 July 2000) gives to the competent authorities in Member States the possibility to suspend data flows in cases where there is a substantial likelihood that the Principles are being violated and where the continuing transfer would create an imminent risk of grave harm to data subjects.'

This threat to the US Safe Harbour status has obvious commercial and practical importance that transcends any diplomatic row. Although the reports of an impact on the market for Cloud services by virtue of the publicity surrounding PRISM are likely to be distorted by their short period of reference, a long-running spat over access to Cloud data must have implications for that market.

It is not just the USA that concerns the Chair of the Article 29 Working Party. Whitehall will be worried about the penultimate paragraph of his letter:

'Finally, the WP29 wishes to stress that it will not only focus its attention on the intelligence programs used by the United States, but will also make an effort to assess any impact of PRISM, including the use of PRISM-derived information on European territory, to the extent possible within the WP29's mandate. Furthermore, the WP29 intends to examine compliance with EU data protection principles and legislation of possible similar intelligence programs on the territory of the Member States, such as Tempora, in its continuous endeavour to uphold the fundamental rights of all individuals.'

The letter can be read in full here http://ec.europa.eu/justice/data-protection/article-29/documentation/other-document/files/2013/20130813_letter_to_vp_reding_final_en.pdf
1
Add a comment...

Athena Forensics

Shared publicly  - 
 
Developed to process data on abuse by British soldiers in Iraq, Ares is being used to tackle child abuse and cybercrime
Developed to process data on abuse by British soldiers in Iraq, Ares is being used to tackle child abuse and cybercrime Forensic investigation of b..
1
Add a comment...
People
Have them in circles
126 people
Catherine McDonald's profile photo
Michael Dickinson's profile photo
Orawan JANJD's profile photo
Dodd Franks's profile photo
thx Chang's profile photo
wilfredo munoz's profile photo
Jim Ault's profile photo
claims.com's profile photo
Forensic Computing's profile photo
Contact Information
Contact info
Phone
08458 827 386
Email
Fax
08453 081 512
Address
Athena Forensics Limited Regus House Malthouse Avenue Cardiff Gate Business Park Cardiff CF23 8RU
Story
Tagline
The UK's Leading Specialists in Digital Forensic Investigations
Introduction
Welcome to Athena Forensics' Google+ page.

Athena Forensics are the UK's leading specialists in Digital Forensics including; 
Athena Forensics have a loyal customer base and our Digital Forensic services are requested on a regular basis by clients in the following sectors;
Our Experts are proven and highly regarded in their field of expertise, all reports produced are clear and concise and are supported by robust expert witness testimony in courts throughout England and Wales.

Call and speak to an expert today on 08458 827 386, email or visit our website Athena Forensics
86% of our work is gained through customer recommendation. We constantly look to improve our service and build upon our achievements. Customer satisfaction and feedback is key to our success.
Public - a year ago
reviewed a year ago
1 review
Map
Map
Map