Category List

Tag Cloud

Covert investigationsdigital forensics warringtoncomputer investigationsPCIforensic scienceContactChip Off ForensicsCyber Securitydigital forensics yorkshireSecurityForensic Assuranceiphone forensicsConference & ExhbitionsISO 17025 accreditationHelping PoliceLoss Preventiondigital forensic case managementforensic analysisISOmobile phone analysis leedsevidence managementGraduate RecruitmentISO 27001Professionalspolice case managementSoftware Demonstrationscientific supportForensic careersSC MagazineWarringtonQuality Standardscomputer expertcomputer forensics yorkshireCases SolvedForensics EuropeISO 17025Lab ApprovedMobile Phone ForensicsDSSapple forensicsIntaForensicsexpert witness computersUS case management softwareNew FeaturesDigital ForensicsJobsForensic ReadinessUpdateITHRMarketingEmploymenttrainingcomputer forensic analysisDigital Forensic Trainingreportingcovert forensicsGraduatedata recoveryPicture Imagesmobile phone forensics yorkshireCase Managementcontinutiy managementTalentComputer EmergenciesData SecurityNetwork forensicsLegalforensic securityscientific case managementCase Management systemCyber-SecurityComputer forensics jobsInnovationJob VacanciesLimaFinanceCase Management softwareHuman Resourcesmobile phone forensics leedsdisciplinary evidencemobile phone analysis yorkshireLima solutionForensic Case ManagementEmployee DisputeComputer forensic case managementRecruitmentdigital forensic caseComputer forensics leedsmobile phone forensics jobsVersion 2.0Mobile Phone Forenicscomputer forensics laboratoryCrime ReductionUK case management softwaredigital forensics leedsLaunch Eventdigital forensics north-westchip-off forensicsdigital forensics londonMobile PhoneCloud Forensicschain of custody managementiOS forensicsComputer ForensicsLima LiteRemote ForensicsCyber AttackData ProtectionEventSoftwareWindowsDigital EvidenceMalicious AttackCareers Cyber Crimecomputer forensics north englandForensic jobsLaw Enforcement ForensicsStaffLima TrainingGraduate Training WeekHackingISO 9001stafford jobs

Tag List

Computer Emergencies (2)
mobile phone analysis yorkshire (1)
Crime Reduction (1)
digital forensics leeds (2)
Contact (1)
Cyber Security (1)
computer forensics north england (2)
police case management (1)
Computer forensics jobs (1)
Software Demonstration (1)
computer forensics yorkshire (1)
digital forensics yorkshire (2)
iOS forensics (1)
Windows (2)
Lima solution (2)
Case Management software (11)
Graduate (1)
Cyber Crime (3)
stafford jobs (1)
forensic science (1)
Mobile Phone Forenics (1)
PCI (1)
Picture Images (2)
mobile phone forensics jobs (1)
Graduate Recruitment (1)
Lima Lite (1)
ISO 27001 (2)
Recruitment (2)
Jobs (1)
Staff (1)
chain of custody management (1)
Cyber Attack (1)
Chip Off Forensics (1)
covert forensics (1)
Innovation (1)
Remote Forensics (2)
Data Protection (1)
ISO 17025 (3)
chip-off forensics (1)
Job Vacancies (2)
Forensic careers (1)
Warrington (1)
Lima (17)
evidence management (1)
US case management software (1)
UK case management software (1)
scientific support (1)
computer forensics laboratory (1)
SC Magazine (3)
Network forensics (1)
Version 2.0 (1)
Covert investigations (1)
mobile phone forensics yorkshire (1)
digital forensics london (1)
Forensic Assurance (3)
Law Enforcement Forensics (1)
Lima Training (4)
Employee Dispute (1)
Software (2)
computer forensic analysis (1)
training (4)
Cyber-Security (1)
ISO 17025 accreditation (2)
Computer forensic case management (1)
Cases Solved (2)
Malicious Attack (1)
data recovery (1)
Digital Evidence (2)
Data Security (1)
Launch Event (1)
continutiy management (1)
Helping Police (1)
Forensic Case Management (7)
Human Resources (1)
Security (1)
HR (1)
Case Management system (6)
expert witness computers (1)
Professionals (1)
digital forensic case (2)
IT (1)
Forensic Readiness (2)
New Features (1)
ISO 9001 (2)
Loss Prevention (1)
mobile phone forensics leeds (1)
Forensics Europe (1)
digital forensics north-west (1)
Update (1)
digital forensics warrington (1)
Hacking (1)
iphone forensics (1)
DSS (1)
forensic security (1)
Talent (1)
digital forensic case management (3)
Careers (1)
forensic analysis (4)
ISO (1)
Employment (1)
Case Management (13)
Finance (1)
Mobile Phone (1)
computer expert (2)
Marketing (1)
Cloud Forensics (1)
Digital Forensic Training (2)
Lab Approved (1)
Event (3)
Graduate Training Week (3)
apple forensics (1)
scientific case management (1)
Mobile Phone Forensics (11)
Conference & Exhbitions (3)
mobile phone analysis leeds (1)
disciplinary evidence (1)
Computer Forensics (20)
IntaForensics (6)
Digital Forensics (20)
Legal (1)
Computer forensics leeds (1)
Forensic jobs (1)
computer investigations (1)
reporting (1)
Quality Standards (1)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.