Internet "Forensic Tool" Can Trace Past Web Activity

A new Internet "forensic tool" has been introduced that aims to help educators, police and other law enforcement officials trace the past World Wide Web activity of computer users.

Net Threat Analyzer, from Gresham, Ore.-based New Technology Inc., can be used to identify past Internet browsing and e-mail activity done through specific computers. The software analyzes a computer's disk drives and other storage area that are generally unknown to or beyond the reach of most general computer users.

"Kids can figure out ways so that their parents don't find anything on their machine, but Net Threat Analyzer goes back in after the fact where things are easier to detect," said Scott Stevens, program manager at NTI.

Stevens said the company will make its Net Threat Analyzer available July 6 free of charge to computer crime specialists, school officials and police.

The program is booted from a floppy disk and uses filtering tools to collect data on users' basic browsing and e-mail history. "It flags possible threats like anything dealing with drugs, bombs, country codes or pornography," Stevens said. "Web sites are changing so often that it's difficult to keep up with which ones are porn sites or drug sites."

Stevens used the example of www.whitehouse.gov, which is the official White House Web site, and www.whitehouse.com, which is a pornography site. "If Junior's been to whitehouse.com 300 to 500 times, it will make it through most 'Net nanny' software," he said. "But that will cause a red flag with our product."

Stevens said the software was designed to help prevent situations like the recent tragedies at Columbine High School in Littleton, Colo., and the Thurston High School in Springfield, Ore., where weapons were made by teen-agers who had downloaded the instructions from the Internet.

The company, which specializes in computer forensics tools and training, has posted order forms for its software on its Web site at www.forensics-intl.com. The tool is not available to the public, but a special version can be purchased by Fortune 500 companies, government agencies, military agencies and consultants who have a legitimate need for the software.

Featured

  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.