Wednesday, June 9, 2010

Crackdown on prepaid cell phones

Criminals long ago got a whiff that law enforcement could not trace or track them if they purchase these phones at a retail or discount store. Of course, the privacy sirens are raising a stir about this new development, but they should know that law enforcement will still have to pursue court orders to get the information, just as usual. Drug dealers, terrorists, gang members, and white-collar criminals should be very concerned about this development. Law-abiding citizens should not.

'Scareware' ads proliferate across Internet

People terrified of a malicious virus destroying their computer systems are purchasing useless software that its unscrupulous sellers say will protect their computers from infection. Scareware is booming, and criminals are becoming rich from selling it. Would you fall for this ploy?

Thursday, May 20, 2010

Guide to starting a computer forensics career

Tips on how to learn computer forensics on your own.

While this article says you can start out learning computer forensics on your own - I did - you will soon have to take courses from one of the major vendors - AccessData for FTK (Forensic Toolkit), Guidance Software for EnCase, Prodiscover, etc. Without formal training, you will never be seriously taken in court, and will find it very difficult to compete for customers.

Tuesday, May 11, 2010

Printer forensics

Typically, printers not attached to computers with built-in hard drives have proprietary software running, usually of the Linux or Unix flavor. If a user has another Linux or Unix computer on that network, he might be able to see one or more volumes at that IP address, and perhaps copy those files.

Computer forensic examiners who have processed a few of these type printers pulled the hard drives and imaged them the old-fashioned way. Analysis of the hard drives in the scanner/copiers found full copies and fragments of many of the documents that had been scanned.

Some other interesting info I ran across:

"Researchers at Purdue University have developed a method that will enable authorities to trace documents to specific printers, a technique law-enforcement agencies could use to investigate counterfeiting, forgeries and homeland security matters. The technique uses two methods to trace a document: first, by analyzing a document to identify characteristics that are unique for each printer, and second by designing printers to purposely embed individualized characteristics in documents. The technique currently focuses on laser printers but eventually will be expanded to inkjet printers, said Edward J. Delp, a professor of electrical and computer engineering at Purdue."

Full article here:

Thursday, May 6, 2010

Tuesday, April 27, 2010

Church Security Vigilantes

This organization just posted a page on a video posted by a Christianity Today expert regarding armed...

Tuesday, April 13, 2010

Trends in Computer Forensics via @addthis

Friday, March 26, 2010

Thursday, March 25, 2010

10 Key Responsibilities of Computer Forensics

A computer forensics' job involves conducting investigations, data ...

Monday, March 22, 2010

The 50 Riskiest Cities For Cybercrime

Did your hometown make the list?

Wednesday, March 10, 2010

Tuesday, March 9, 2010

Tuesday, March 2, 2010

Computer forensics for Denver area lawyers - CLE


"Digital Evidence - A Primer on Computer Forensics"


Presented by Dave Pettinari, CEO of TAC Forensics, LLC, Director of Forensics for ECSI, Online Instructor for University of Phoenix


From computers to smart phones, our actions and communications are captured in greater
detail than ever before.


Don't miss this opportunity to learn about
the unseen world of digital evidence and how you can apply it to your cases.


Presented by: Dave Pettinari

Date: March 23, 2010

Time: 9:00 a.m. - 12:00 p.m. (Registration

Begins at 8:30 a.m.)

Location: Expert Consulting Services,

Inc., 2140 S. Ivanhoe Street, Suite 105


Submitted for 3 general CLE credits


Learn more at our website:


To register: Download our registration

form here, call ECS at (303) 226-0450

or email us at


Starter kit for new private investigators now at my Windows Live site…

Sunday, February 7, 2010

Criminals targeting unaware taxpayers who want tax help

Tax time is upon us, and we are all desperate to read up on and learn about the new stuff we need to know to save money on our taxes.

Criminals are taking advantage of that thirst for tax season info by sending out phishing e-mails that could cause you a lot of problems.

What could we do to alert folks to these dangers so they can protect themselves before they fall victim to them?

Reference: The Tech Herald, Tax season kicks off with a wave of related scams, retrieved 7 February 2010 from

Facebook viewed as riskiest social network by companies

Would it interest you if one of your friends posted on your Facebook page that his ex-girlfriend had cheated on him?

Don't go there…DO NOT click on this announcement. Here's why:

Need a job?

Cybercriminals are hiring; pay $180 for every 1,000 computers infected!

Foreigners computers spy on our country!

McAfee: Big Business Under Constant Cyber Attack

Tuesday, January 26, 2010

PI Magazine

Private Investigator Magazine - PI Magazine - Private Investigators read PI Magazine, the trade publication for private investigators, private detectives, police detectives, SIU Investigators and anyone interested in learning how to become a private investigator - PI.

Monday, January 25, 2010

Check out Colorado House Bill 10-1012.

This is a bill to make surveillance illegal.

Securing smartphones

How to lock down handhelds running third-party apps

Saturday, January 23, 2010

Convicted by your own computer

Digital evidence finds its way into more court actions.

Monday, January 4, 2010

Online threats get smarter and nastier

Why Twitter will endure