Criminals long ago got a whiff that law enforcement could not trace or track them if they purchase these phones at a retail or discount store. Of course, the privacy sirens are raising a stir about this new development, but they should know that law enforcement will still have to pursue court orders to get the information, just as usual. Drug dealers, terrorists, gang members, and white-collar criminals should be very concerned about this development. Law-abiding citizens should not. http://lnkd.in/KmQZhf
Professional, courteous, timely, accurate and comprehensive services...
Wednesday, June 9, 2010
'Scareware' ads proliferate across Internet
People terrified of a malicious virus destroying their computer systems are purchasing useless software that its unscrupulous sellers say will protect their computers from infection. Scareware is booming, and criminals are becoming rich from selling it. Would you fall for this ploy? http://www.usatoday.com/money/industries/technology/2010-06-07-scareware07_ST_N.htm
Friday, May 21, 2010
Thursday, May 20, 2010
Tips on how to learn computer forensics on your own.
http://bit.ly/cf732u
While this article says you can start out learning computer forensics on your own - I did - you will soon have to take courses from one of the major vendors - AccessData for FTK (Forensic Toolkit), Guidance Software for EnCase, Prodiscover, etc. Without formal training, you will never be seriously taken in court, and will find it very difficult to compete for customers.
Tuesday, May 11, 2010
Printer forensics
Typically, printers not attached to computers with built-in hard drives have proprietary software running, usually of the Linux or Unix flavor. If a user has another Linux or Unix computer on that network, he might be able to see one or more volumes at that IP address, and perhaps copy those files.
Computer forensic examiners who have processed a few of these type printers pulled the hard drives and imaged them the old-fashioned way. Analysis of the hard drives in the scanner/copiers found full copies and fragments of many of the documents that had been scanned.
Some other interesting info I ran across:
"Researchers at Purdue University have developed a method that will enable authorities to trace documents to specific printers, a technique law-enforcement agencies could use to investigate counterfeiting, forgeries and homeland security matters. The technique uses two methods to trace a document: first, by analyzing a document to identify characteristics that are unique for each printer, and second by designing printers to purposely embed individualized characteristics in documents. The technique currently focuses on laser printers but eventually will be expanded to inkjet printers, said Edward J. Delp, a professor of electrical and computer engineering at Purdue."
Full article here:
http://www.scienceblog.com/cms/node/4363
Thursday, May 6, 2010
Wednesday, May 5, 2010
Tuesday, April 27, 2010
Church Security Vigilantes
This organization just posted a page on a video posted by a Christianity Today expert regarding armed... http://bit.ly/9Os4cy
Monday, April 19, 2010
Tuesday, April 13, 2010
Monday, April 12, 2010
Friday, March 26, 2010
Thursday, March 25, 2010
10 Key Responsibilities of Computer Forensics
A computer forensics' job involves conducting investigations, data ... http://bit.ly/cHrTtL
Monday, March 22, 2010
The 50 Riskiest Cities For Cybercrime
Did your hometown make the list? http://preview.tinyurl.com/ykjg6zr
Sunday, March 21, 2010
Wednesday, March 10, 2010
Tuesday, March 9, 2010
Sunday, March 7, 2010
Thursday, March 4, 2010
Tuesday, March 2, 2010
Computer forensics for Denver area lawyers - CLE
"Digital Evidence - A Primer on Computer Forensics"
Presented by Dave Pettinari, CEO of TAC Forensics, LLC, Director of Forensics for ECSI, Online Instructor for University of Phoenix
From computers to smart phones, our actions and communications are captured in greater
detail than ever before.
Don't miss this opportunity to learn about
the unseen world of digital evidence and how you can apply it to your cases.
Presented by: Dave Pettinari
Date: March 23, 2010
Time: 9:00 a.m. - 12:00 p.m. (Registration
Begins at 8:30 a.m.)
Location: Expert Consulting Services,
Inc., 2140 S. Ivanhoe Street, Suite 105
Submitted for 3 general CLE credits
Learn more at our website:
www.ecsofcolorado.com
To register: Download our registration
form here, call ECS at (303) 226-0450
or email us at info@ecsofcolorado.com
Starter kit for new private investigators now at my Windows Live site…
http://cid-952aeab2609b979a.skydrive.live.com/browse.aspx/.Public
Tuesday, February 23, 2010
Sunday, February 7, 2010
Criminals targeting unaware taxpayers who want tax help
Tax time is upon us, and we are all desperate to read up on and learn about the new stuff we need to know to save money on our taxes.
Criminals are taking advantage of that thirst for tax season info by sending out phishing e-mails that could cause you a lot of problems.
What could we do to alert folks to these dangers so they can protect themselves before they fall victim to them?
Reference: The Tech Herald, Tax season kicks off with a wave of related scams, retrieved 7 February 2010 from http://www.thetechherald.com/article.php/201005/5177/Tax-season-kicks-off-with-a-wave-of-related-scams.
Would it interest you if one of your friends posted on your Facebook page that his ex-girlfriend had cheated on him?
Don't go there…DO NOT click on this announcement. Here's why: http://ping.fm/RmuaO
Need a job?
Cybercriminals are hiring; pay $180 for every 1,000 computers infected! http://ping.fm/uW3p6
Foreigners computers spy on our country!
http://www.rnw.nl/africa/article/social-networking-sites-used-foreign-intelligence-services.
Tuesday, January 26, 2010
PI Magazine
Monday, January 25, 2010
Check out Colorado House Bill 10-1012.
This is a bill to make surveillance illegal. www.statebillinfo.com/bills/bills/10/1012_01.pdf
Saturday, January 23, 2010
Convicted by your own computer
Digital evidence finds its way into more court actions. http://ecsinvestigations.com/convicted-computer/
Wednesday, January 20, 2010
New Tableau Imaging software ...
They say it is four times faster than FTK. Download here: http://bit.ly/4Rd91S