Thursday, June 29, 2006
“In addition to the academic contributions, police officers have provided us with some of the best crime fiction,” Foster said. Who better to write in the mystery genre of the police procedural than the police officer. Police authors bring their training, experience and creativity to their work; giving the reader an authentic, insider’s view of human nature, crime and police procedures. Police authors like Dallas Barnes, Joseph Wambaugh and Paul Bishop write fiction from the perspective of someone who has seen, smelled, tasted and touched the crime scene.
While some police authors approach crime from an academic standpoint or a fictional point of view, others dissect real crime. There are no better guides through real crime than those who have spent years walking the walk. Crime reporters and journalists rely on police officers for information and interpretation of evidence and events. “A police authors cuts out the middleman or secondary interpreter, and gives the reader a first hand, first class storyteller,” Foster said.
An overriding factor in attracting people to the profession of policing is that every day is different. “Cops see every twist of human nature. They make order our of chaos when the world goes sideways; and, they often handle tense situations after dark and without a manual,” Foster noted. Simply put, police officers are choked full of the best and worst stories of humanity under pressure. The best police authors are able to take these “war stories” and weave them into an interesting and insightful look at America’s streets. These semi-biographical tales stand tall along side the academic, fictional and true crime. Foster added, “It would be a mistake to pigeon hole police authors in some narrow crime genre. Cops have written outstanding works from poetry to politics.”
According to Foster, the website currently has 60 police authors who have written over 140 books. In addition to being accessed by author name, they are categorized by police department (29) and by subject. Hi Tech Criminal Justice realizes this is an ongoing research project and encourages submission of authors not listed. The website and contact information can be access at www.police-writers.com
There have been no reports of identity theft or other criminal activity related to the stolen computer, R. James Nicholson told the House Veterans Affairs Committee. He added that the VA would still honor its promise of free credit monitoring for a year. An unnamed individual turned over the laptop and hard drive to FBI officials in Baltimore. No persons are in custody at this time, officials said.
The laptop and hard drive were stolen from the Montgomery County, Md., home of a VA employee on May 3. Government officials do not believe the data on the laptop was the target of the burglary, and consider the break-in a random theft. "This has brought to the light of day some real deficiencies in the manner we handled personal data," Nicholson said. "If there's a redeeming part of this, I think we can turn this around
Thursday, June 22, 2006
Monday, June 19, 2006
The image is 1 of 6 tattoo photographs taken on an inmate who is said to be a "Blood". If you have knowledge of the significance of the above tattoos, please contact Lieutenant M. Duke of the Greensville Correctional Center with "CC" to Deputy Glenn Anderson of the Fairfax Co. Sheriff's Office.
Your cooperation in this matter is appreciated.
To View all 6 tattoos please proceed to the following web address: www.patc.com/special/tattoos.shtml
Lieutenant M. DukeGreensville
WORK 434-535-7000 EXT 6118
Deputy Glenn Anderson
Fairfax Co. Sheriff's Office
Tuesday, June 13, 2006
Location: Baltimore Convention Center, Baltimore, Maryland, USA
Regular - $495.00 USD
Student - $250.00 USD (active student ID required)
Conference Internet Web Site
We anticipate 800-1000 attendees at the Conference with representatives from over 60 federal agencies, 300 commercial vendors, and 25 universities. Attendees will include government executives and program managers, biometric technology vendors, system integrators, commercial technology users, researchers, and policy makers.
The two and one-half day 2006 Biometric Consortium Conference will address the latest trends in biometrics research, development, and application on biometric technologies. Over 100 experts from government, industry, and academia will addresses the important role that biometrics can play in the identification and verification of individuals in this age of heightened security and privacy by examining biometric-based solutions for homeland security (airport security, travel documents, visas, border control, prevention of ID theft) as well as the utilization of biometrics in other applications such as point of sale and large-scale enterprise network environments.
Executive Office of the President (EOP) of the United States, National Science & Technology Council (NSTC) Subcommittee on Biometrics
Department of Defense (DoD) Biometrics
Department of Justice (DoJ)
Department of Homeland Security (DHS)
National Institute of Standards & Technology (NIST)
Biometric solutions and applications
Large scale biometric implementations and other applications
Advances in biometric technologies, e-Authentication, and security of biometrics
Biometrics-based enterprise solutions
Biometric standards: status, impact, and adoption
Biometric performance and conformance evaluation
Biometric-enabled system requirements
The Center for Identification Technology Research (CITeR), a National Science Foundation (NSF) Industry/University Cooperative Research Center (IUCRC), will again conduct the Biometrics Symposium. The Biometrics Symposium provides a forum for the dissemination and exchange of basic and applied scholarly research leading to applications of biometrics. See www.citer.wvu.edu/bsym2006/
The Armed Forces Communications and Electronics Association (AFCEA) will manage the 2006 Biometrics Technology Expo. AFCEA is a non-profit international association, with over 31,000 members and is dedicated to supporting global security by providing an ethical environment that encourages a close cooperative relationship among civil government agencies, the military, and industry. See www.biometricstechexpo.com
2006 Biometric Consortium Conference Sponsors:
National Institute of Standards & Technology (NIST)
National Security Agency (NSA)
Department of Defense Biometrics (DoD)
Department of Homeland Security (DHS)
National Institute of Justice (NIJ)
General Services Administration (GSA) Office of Technology Strategy
Maritime Administration-US Dept. of Transportation (DOT)
Volpe National Transportation Systems Center, Research and Innovative Technology Administration-US Dept. of Transportation (DOT)
2006 Biometric Consortium Conference Supporting Organizations:
The Executive Office of the President (EOP) of the United States, National Science & Technology Council (NSTC), Subcommittee on Biometrics
The Biometric Knowledge Center of The NSF Center for Identification Technology Research (CITeR)
American National Standards Institute (ANSI)
The Biometric Foundation
Institute of Electrical and Electronics Engineers (IEEE)
International Biometrics Industry Association (IBIA)
InterNational Committee for Information Technology Standards (INCITS)
National Biometric Security Project (NBSP)
Please contact Matt Lake, Booz Allen Hamilton, at 301-821-8209 or email firstname.lastname@example.org for more information.
National computer forensics firm, Zentek Forensics, claims that whilst web-jacking is a new phenomena for home PC users, similar techniques are being widely-used in commercial environments.
Web-jacking involves planting a Trojan on a PC or server in order to gain access to or steal files, often with criminal intent. Trojan programs are so-called because they enter a system in a seemingly harmless way, but once activated release “malicious code” which effectively unlocks a back-door to PCs and servers.
Whereas home PC users are being taken in by the use of ‘pop-ups’ to plant the Trojan, businesses face an even bigger potential threat – from their people. In today’s cut-throat business environment, there is a rise in cases of companies sending spies into competitors. The moles’ go ‘undercover’ as employees to plant the Trojan directly onto computer hard drives, usually via a portable storage device such as a memory stick.
Even those with seemingly robust IT security are at risk, as John McConnell, Forensics Analyst at Zentek Forensics, explains:
“We had a case where a ‘key-logger’ had been installed by a cleaner, which captured the key strokes of the company and sent them to their competitor. They lost some major accounts, however we were able to discover the hidden Trojan on the system, which gave the company legal recourse.”
Legal practitioners are usually the first port of call for those suspecting industrial espionage, so the company is urging the profession to ensure it gives its clients the correct advice. John says:
“Computers, like any other crime scene, need to be treated carefully. The biggest issue in cases of industrial espionage is the preservation of evidence. For example, the simple act of opening an email or investigating file access by suspect employees could render data as inadmissible in Court.
“You should advise clients to call in computer forensic experts in cases of suspicion, at the earliest opportunity. The hardware can be then analyzed in the proper manner, and any evidence recovered can be presented in Court.”
Advancements in the computer forensics industry over the past 10 years means it is playing an increasing role in prosecutions of all types of cases, ranging from fraud, terrorism, and industrial espionage to employment tribunal hearings and commercial contract breaches.
Zentek Forensics is a national computer forensics firm, dealing with a broad range of crimes involving computer-based evidence. It works with businesses and Police forces across the UK to investigate and prove cyber-crime.
For more information call Zentek Forensics on 0870 7584302, or visit www.zentekforensics.co.uk.