This paper explores advances in forensic investigation of explosives and how application of forensics is able to aid in the development of serial bomber profiles or in linking serial bombers to scenes or scenes with other scenes. Since the topic of forensic...
I was recently asked to write about the RIAA John Doe and Jane Doe lawsuits. While I may be against anonymity on the internet, I’m thoroughly opposed to John and Jane Doe lawsuits for a variety of reasons. “In 2004, the Recording Industry Association of America...
I was recently asked: “How has American life been affected by the US Patriot Act? Provide one example each of the Patriot Act’s impact on the online community, the technical industry and the law enforcement community. Explain whether the examples you used have had a...
Skills, knowledge, resources, authority, and motives (SKRAM) is one of the methods security professionals assess potential threats. The following are some controversial arguments I make concerning SKRAMS efficacy. Question 1: “Do you think the SKRAM model is useful...
While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: CASE 1: My first case is a classic example of a salami attack (Samaha, 2008). A salami attack according to Samaha (2008) is when a...