Computer Log Collector
Terrorists and criminals continually find ways to defeat computer security and hack into automated systems. Previously, determining the specific details – who, what, when and how – concerning a hacking incident was time consuming and difficult. In response, ID Scientific (formerly known as 3rd Ring, Inc.) developed a new software tool that allows investigators to collect the information in the computer that answers these questions. A small thumb drive contains the entire software program and attaches to any USB port on a computer or server. Once connected, the tool can extract vast amounts of data pertinent to the hacking and store it on the thumb drive. It allows for easy downloading to other storage media. It can also identify and collect the RAM, running processes, all event log files, and other types of information. The software then categorizes, analyzes, and formats the data to make it easy to use by investigators. The system is versatile and law enforcement officials can use it in other types of computer investigations. The International Association of Chiefs of Police recognized the Computer Log Collector with an Excellence in Technology Award in 2009. The item is commercially available. Requests for additional information should be sent to firstname.lastname@example.org.