Dear readers, below are in depth discussions of the relevant topics of the day. Let me know what you think in the comments.
Dear readers, below are in depth discussions of the relevant topics of the day. Let me know what you think in the comments.
Facebook wants you to share as much information as possible. Advertisers like all that data too. One key thing to remember, the Internet is forever. Once you have posted something online, it does not belong to you anymore.
All this means your default privacy settings probably don’t jibe with how you want to actually share your information. With a few small setting adjustments, you can take back control and make sure you share only what you want.
At the HOPE hacker conference in New York, Nadim Kobeissi released a beta version of an all-purpose file encryption program called miniLock. It is a free and open-source browser plug-in designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds. It’s super simple, approachable, and it’s almost impossible to be confused using it – it is a file encryption that does more with less. MiniLock can be used to encrypt anything from video email attachments to photos stored on a USB drive, or to encrypt files for secure storage on Dropbox or Google Drive.
A major issue was the 2011 conviction of Anthony Elonis for posting threats on Facebook against his estranged wife, law enforcement and local elementary schools. John Elwood, a lawyer for Mr. Elonis, said prosecutors should have to show that someone accused of making threats intended to put the listener in fear.
Why should you bother with encrypting your mobile device? Encryption does more than just bar a person from accessing information on your cell phone, as the lock screen does.
It is the legal investigator's task to be fact finders from scene to courtroom. A formal investigative protocol will both enhance and ensure the investigative process. The Investigative Protocol I have developed is: Prepare, Inquire, Analyze, Document, and Report. Following this protocol will expose any weaknesses in the opponent's case and enhance your case.
It is often said that a professional is only different from their adversary because of the morals and ethics, and using their honed skills for the betterment of others and not themselves. The same is true of professional investigators.