Tag Archives: Forensic science

Don’t use cellular phone to track without a warrant

cell phone track“Police violated a burglary suspect’s state constitutional right to privacy when they located him using cellphone tracking information without first obtaining a warrant, a New Jersey appeals court ruled on Friday.

Read more: http://www.njlawjournal.com/id=1202642187228/Tracking-Suspect%27s-Cellphone-Without-Warrant-Flouted-Constitutional-Rights#ixzz2tJTc9thZ

Advertisements

Leave a comment

Filed under Domestic Investigations, GPS, Laws, Laws effecting Investigators, News of PI's, Professional Investigations, Surveillance

Spyware on your cell phone?

Several mobile phones
Image via Wikipedia

From Tom Slovenski, of Cellular Forensics

How do you protect a client and their information from thieving eyes and stalking ex-lovers?  How do you protect your own phone as well.  Here are a few simple tips.

  1. Never let anyone you do not know use your cell phone.  Don’t loan it out.
  2. If the phone is lost or stolen and  then recovered, do not use it to transmit sensitive date until it has been thoroughly checked by a cellular professional as it could have become infected.
  3. Turn off the “Bluetooth” when not is use. There is no need for an “open door” when you are not using a secure headset. For added security, use a wired headset.
  4. Do not accept any connection with which you are not familiar.  If you are sitting in a Starbucks and your phone is asking permission to hook on to a device with which you are not familiar…refuse the connection.
  5. Do not open attachments from a party you do not know
  6. Password protect your phone. This will eliminate 95% of problems. If the phone is locked down, the bad guy can’t get into it.

What if the person thinks the phone is already “bugged”? What are some of the signs?

  1. Are there too many “coincidences” in the client’s life? Is the information being transmitted from their phone seemingly winding up in someone else’s  hands. In a conversation, does the other party relate confidential information you did not disclose to them?
  2. Was the phone recently lost and then recovered?
  3. Has the person recently been through a traumatic experience with an ex-lover, spouse or business partner?
  4. Is the person in the midst of a highly charged court battle?
  5. Is the battery area hot to the touch? (The extra transmissions of the spyware to the other party pulls on the battery power)
  6. Does the battery drain quicker than it used to? (Again, more transmissions, less power)
  7. Does the phone light up for no reason?

For the complete article, see PI Magazine, June 2009 edition, or Tom’s website, www.cellularforensics.com, then click on Articles.

Reblog this post [with Zemanta]

Leave a comment

Filed under Home

Cyberspies penetrate US infrastruture

 Sounds sort of like “UFO Sightings”

MSN Tracking Image
MSNBC.com 

Cyberspies penetrate electrical grid

Spies from China, Russia believed to be trying to navigate electrical system
Reuters
updated 9:54 a.m. ET, Wed., April 8, 2009

WASHINGTON – Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, the Wall Street Journal reported on Wednesday.

The spies came from China, Russia and other countries, and were believed to be on a mission to navigate the U.S. electrical system and its controls, the newspaper said, citing current and former U.S. national security officials.

The intruders have not sought to damage the power grid or other key infrastructure but officials said they could try during a crisis or war, the paper said in a report on its website.

“The Chinese have attempted to map our infrastructure, such as the electrical grid,” a senior intelligence official told the Journal. “So have the Russians.”

The espionage appeared pervasive across the United States and does not target a particular company or region, said a former Department of Homeland Security official.

“There are intrusions, and they are growing,” the former official told the paper, referring to electrical systems. “There were a lot last year.”

Authorities investigating the intrusions have found software tools left behind that could be used to destroy infrastructure components, the senior intelligence official said. He added, “If we go to war with them, they will try to turn them on.”

Officials said water, sewage and other infrastructure systems also were at risk.

Protecting the electrical grid and other infrastructure is a key part of the Obama administration’s cybersecurity review, which is to be completed next week.

 The sophistication of the U.S. intrusions, which extend beyond electric to other key infrastructure systems, suggests that China and Russia are mainly responsible, according to intelligence officials and cybersecurity specialists.

While terrorist groups could develop the ability to penetrate U.S. infrastructure, they do not appear to have yet mounted attacks, these officials say.

URL: http://www.msnbc.msn.com/id/30107040/

 

© 2009 MSNBC.com

Leave a comment

Filed under computer forensics, Professional Investigations

NC Private Investigator To Be On Talk Forensics Radio

Although this is a PR release, it is after all about Monty Clark, the famous Monty Clark

Private Investigator Monty Clark Is This Week’s Guest on Talk Forensics Radio Show Feb 22

2009-02-17 20:11:14 – Talk Forensics, a new talk radio show hosted by Larry Daniel of Guardian Digital Forensics, is proud to announce Monty Clark, Private Investigator will be the guest on Talk Forensics Radio for the February 22nd Episode.

About our guest:

Monty Clark is a member of the North Carolina Association of Private Investigators (NCAPI), the South Carolina Association of Legal Investigators (SCALI), The National Association of Professional Process Servers (NAPPS), The US Process Servers Association (USPSA) and the Internationl Association of Process Servers. Monty has been on the Board of Director’s for the North Carolina Association of Private Investigators for the past 13 years serving as Vice President from 1996-2000. He has served as President of the NCAPI during 2000-2002 and 2004-2005. He is presently serving as the President.

Prior to entering the Private Investigative profession, Monty was a Charlotte City Police Officer for 11 years. During this time he assisted the North Carolina State Bureau of Investigation (SBI) in various undercover assignments. He was then transferred to the Vice and Narcotics Bureau where he served four years undercover investigating specialized crimes. Monty was then transferred to the Charlotte-Douglas International Airport, Narcotics Interdiction Unit investigating drug smuggling.

Monty was also assigned to special tasks units that provided executive protection for President Ronald Reagan, President Jimmy Carter and Presidential Candidate Gary Hart during their visits to the Charlotte area.

In 1997 Monty was accepted by the National Football League (NFL) to assist as the Associate Security Representative assigned to the Carolina Panthers Football Team.

About the Show:

The purpose of our show is to educate and entertain the public on the various fields of forensic science, crime scene investigation, missing person searches and various aspects of the legal system as it relates to forensic science.

You can call (646) 727-3674 and ask questions of our Expert Guest during the live show.

About our host:

The host of our show is Larry E. Daniel. Larry is the primary expert for Guardian Digital Forensics. Larry is well known for his work on capital cases and is an expert in computer forensics.  Larry also writes a popular internet blog on forensics at http://www.exforensis.blogspot.com.

The show airs on www.blogtalkradio.com/TalkForensics each Sunday at 4PM Eastern. Shows will be available soon after on iTunes as pod casts.

We are currently looking for additional guests in various forensic disciplines and for law enforcement experts as well. Contact Leslie Denton for more information or to be considered for the show. (919)868-6291 or email leslie@guardiandf.com

Reblog this post [with Zemanta]

1 Comment

Filed under Investigative Tools, News of PI's, North Carolina Private Investigator, Professional Investigations, South Carolina Private Investigator