From an IT Security Professional to Chief Technology Officer in Under A Year!

From an IT Security Professional to Chief Technology Officer in Under A Year!

Business
Everyday great people pass us on the street without a moments notice.
3 Elements of Modern-Day Slavery

3 Elements of Modern-Day Slavery

communication
Human Trafficking has been identified as a form of modern-day slavery. Being defined as “the use of force, fraud, or coercion to exploit human beings for some type of labor or commercial sex purposes.”
10 Brilliant Ways To Conduct Twitter Investigations

10 Brilliant Ways To Conduct Twitter Investigations

CyberCrime
See this guide on how to conduct Twitter investigations!
Five Common Scams On Social Networking Sites

Five Common Scams On Social Networking Sites

Intelligence
See how you can become aware of the common scams on social networking sites.
Josh McAfee Chases The Bad Guys (The REALLY, REALLY Bad guys) Online

Josh McAfee Chases The Bad Guys (The REALLY, REALLY Bad guys) Online

Culture
A former law enforcement officer and loss-prevention executive, Josh McAfee, CEO of McAfee Institute, trains corporations and law enforcement agencies to battle cybercrime and fraud.
The Scary Truth of How Terrorist Could Crash Your Car

The Scary Truth of How Terrorist Could Crash Your Car

communication
Experts fear cyber terrorists could target cars, tinkering with software in a way that causes accidents.
Learn Where Fraudsters are Selling Stolen Goods Online

Learn Where Fraudsters are Selling Stolen Goods Online

Fraud Investigations

When selling stolen goods, criminals tend to sell locally and normally within 30 miles of their theft. When trying to receive easy cash, criminals tend to use pawnbrokers and Internet auction sites.

 

Bitcoin Transaction Major Points

Bitcoin Transaction Major Points

Cryptocurrency
Bitcoin transactions are one of the most secure transfers of money that can happen today.  There are a few things that every bitcoin transaction consists of.  This would be the header and the input and the output. The input of a bitcoin transaction is showing that the prior balance of the wallet contains a certain number of bitcoins available to use.  These bitcoins are then transferred forward to the current transaction that is about to...
Cryptocurrency Mining

Cryptocurrency Mining

Cryptocurrency
How bitcoins are brought into existence is through a process that we call mining. Mining a bitcoin is done through using software that connects you to the blockchain and allows you to verify transactions across the blockchain. Verifying these transactions is done through solving a series of mathematical puzzles that yield a reward in bitcoin if the block gets completely mined. This is what would drive someone to want to mine bitcoin from the blockchain....
Following the Money

Following the Money

Cryptocurrency
When a bitcoin purchase or trade is made, there are slight amounts of the information left behind that can lead investigators to the owner of the virtual currencies.  When you start looking deeper into this information, then you have the chance at finding the address and tracking down where the money is headed. One tool that you can use is bitcoin block explorer which summed up is a bitcoin tracker.  You insert the unparsed address,...
Tools to Conceal Your Online Presence

Tools to Conceal Your Online Presence

cryptocurrency
There are several different internet sites on the dark web that allow criminals to purchase anything from drugs to hitman.  To access these sites, you must enter the realm of the dark web.  To do so, using a tor browser along with a VPN will completely conceal the identity of the computer that is accessing the dark web.  These are the two primary tools that criminals and you should use if you are trying to...
Government Asset Seizure

Government Asset Seizure

CyberCrime
Whenever there is criminal activity associated with a specific currency or individual items that may be sold for criminal intent or involved in a crime, the government allows for a seizure of the money or items.  These days the most of asset seizures that occur are civil based and not criminal based seizures.  If a seizure occurs civilly, then the government can then use the information from the object to show that it was used...