Forensics in the apprehension of serial bombers

This paper explores advances in forensic investigation of explosives and how application of forensics is able to aid in the development of serial bomber profiles or in linking serial bombers to scenes or scenes with other scenes. Since the topic of forensic...

The RIAA’s John and Jane Doe lawsuits

I was recently asked to write about the RIAA John Doe and Jane Doe lawsuits. While I may be against anonymity on the internet, I’m thoroughly opposed to John and Jane Doe lawsuits for a variety of reasons. “In 2004, the Recording Industry Association of America...

Patriot act and the online community

I was recently asked: “How has American life been affected by the US Patriot Act? Provide one example each of the Patriot Act’s impact on the online community, the technical industry and the law enforcement community. Explain whether the examples you used have had a...

The SKRAM model

Skills, knowledge, resources, authority, and motives (SKRAM) is one of the methods security professionals assess potential threats. The following are some controversial arguments I make concerning SKRAMS efficacy. Question 1: “Do you think the SKRAM model is useful...

Four types of computer crime

While in no way comprehensive, this is a list of four types of computer crimes complete with real life examples of individuals involved: CASE 1: My first case is a classic example of a salami attack (Samaha, 2008). A salami attack according to Samaha (2008) is when a...