The tickle of curiosity. The gasp of discovery. Fingers running across the keyboard.

The World of Iniquus - Action Adventure Romance

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Monday, May 29, 2017

Well, That's Alarming!


Our guest blogger is Christina Patchell (Chris), whom I met when our books were chosen as Kindle Scout winners.

Chris Patchell is the bestselling author of In the Dark and the Indie Reader Discovery Award winning novel Deadly Lies. A former tech worker turned full-time author, Chris Patchell pens gritty suspense novels set in the Pacific Northwest.


Chris is out with her newest book. Woohoo! And, I invited her on to share some of her research.

Chris, I'm going to sit back and take notes.

Sweet Dreams – Fun Facts about Security Systems

“Protect your home with the best home security system.” That’s what one popular home security system provider claims. And the truth is that we all want to keep our families secure. How many of us have spent hundreds or even thousands of dollars installing home security systems and hundreds more on monitoring contracts every year? Once the systems are safely installed in our homes, many of us do something else that we think will act as a deterrent. We plant a sign in the middle of our flower beds outside of our houses that proudly lists the name of the security company whose equipment protects our homes, in the hopes that if a potential thief rolls down our street in the middle of the night, seeing the sign posted out front will compel them to drive on by. But is that true?

I was talking to a friend of mine about the kinds
of things I learned
while researching my latest book, Dark Harvest, and this little fun fact was one of those things that stuck in my mind long afterwards. When something goes bump in the night, the first thing I do is open my eyes and glance across the alarm to the alarm panel wondering if in my sleepy stupor, I actually managed to arm it. Through the dark I see the red light shining like a beacon, and know that it the system is armed. A deep sense of security wraps around me like a warm blanket, and I drift off to sleep once more.

But what if that little sign or sticker adhered to a window isn’t the deterrent you think it is? What if they know what I learned while I was doing my research, that there is a way to block an alarm signal from broadcasting to the monitoring station?

We’ve all heard the claim that you can find anything on the internet, right? Well, if you know where to look, you can find the frequency certain security companies use to broadcast their alerts. So, if a technologically savvy thief knows what to do, they can actually jam the frequency by blasting “white noise” to that signal, thereby preventing the alarm system from sending the alarm.

‘How is this even possible?’ you ask. Easier than you might think. There are devices, like a H.A.M. radio, to tune to the right frequency and blast a signal. A software-defined radio can also be configured onto a laptop and run from there. In essence, a software-defined radio behaves in much the same way the hardware version does, by scanning a range of radio bandwidth to detect activity on specific frequencies. Once the wireless alarm activity is found, it can be exploited by overpowering or jamming the signal issued by the alarm. Some alarms come with anti-jamming protection that can be circumvented by jamming the signal for short bursts (say 20 seconds) then turned off for a second or two, before repeating the process.

This isn’t as easy or cheap as I’m making this sound. There is a fair bit of technical know-how required to setup the system and jam a signal. Setting up a software-defined radio can cost anywhere between $1,000 and $4,000. Since some of these vulnerabilities have been exposed, companies have been hard at work putting solutions in place to stop hackers.

So, how do I keep my family safe? First, don’t make it easier for thieves by posting the sign. Let the blasting alarm be deterrent enough if they target your house in the middle of the night. Or if you really like the idea of posting a sign as a deterrent, post another alarm company’s sign in your yard and keep the bad guys guessing.

In Dark Harvest, Henry Cahill, a computer hacker with a Robin Hood complex, uses a similar technique to break into a business and search for information that will help him solve a crime. Things don’t work out for Henry quite the way he expects, but hey, that’s the kind of wrinkle that makes fiction fun.

If the ins and outs of how things works intrigues you like it does me, here are a few links if you’d like to do some reading of your own:

Hacking home alarms

Hacking alarm systems

Hacking alarm systems

Fiona-
In your writing, reading, and your everyday life, knowing the truth can help you stay one step ahead.

I hope you buy and enjoy Chris's newest book!
Let us know what you think!

Thursday, April 10, 2014

Forensics in Your Plotline: Information for Writers



Amanda Knox reacts at the announce of the verd...
Amanda Knox reacts at the announce of the verdict of
her appeal trial in the Meredith Kercher' murder
 (Photo credit: Beacon Radio)
Amanda Knox has probably learned more about forensics than she probably ever thought or hoped she would. But her case in Italy makes a very interesting point. While specific laws change from region to region - country to country, what constitutes good science does not. 
Video Quick Study (1:26)
Video Quick Study (2:31) rape case thrown out over tainted forensic evidence


Forensics is a science; specifically, the application of science to the law. It is the application of scientific techniques developed through the scientific method that produces data. Are these 100% accurate and dependable results? No. They are not. They are within a scope or continuum - the data falls on a line of probability. When DNA results are offered, it usually reads as 98.99% chance of accuracy (and even those results are based on some pretty weird location generality tables). Nothing is 100%. This is an excellent way to twist your plot line.

I remember distinctly reading about a case where the body of a baby was hand-carried to the coroner for autopsy. Based on the coroner's findings, the mother was convicted of murder and sent to prison for life. Decades later when the officer was diagnosed with terminal cancer, he admitted that he had dropped the baby's body down a long marble staircase. Also, the person who had performed the autopsy had failed to document body damage that had occurred premortem versus postmortem. When these aspects came to light a second trial was held and the woman found innocent.

Forensics is processed by humans. Humans make mistakes. Mistakes effect lives - and plot lines.  

When you see a forensic scientist on the witness stand they will:
* Explain what they did in terms of collection and analysis and
   why (process)
* Offer an interpretation of the results (expert testimony)
* Explain how they arrived at their interpretations
* Explain what conclusions can and cannot be drawn. For example
   in the Casey Anthony case the forensic scientist indicates that
   hair is not a source of positive identification. 
    Video Quick Study (4:17)
   Video Quick Study (10:19) How reliable is forensic science?


EspaƱol: ESTUDIANTE INTEC
 (Photo credit: Wikipedia)

On occasion, forensics scientists will run experiments and try to collect data to help inform their testimony for a specific case.
Video Quick Study (2:10) 

And sometimes the scientists perform forensic experiments to inform future crime scenes. The Body Farm is an anthropological research center, for example, that sets up various scenarios for understanding how bodies decay. 
Video Quick Study (graphic in nature - 5:17) 


But it is important to note that not all forensic cases have to do with death. They can be anything from questioned document cases 
(Questioned Document Blog Article) to drug cases (Blog links to Illegal Drugs 101 and Toxicology Blog) and so forth.



Think about your crime scene as one great big science experiment.
1. There is an observation: "Hey, 
potd 4 17 12 - Forensic 497 final exam
potd 4 17 12 - Forensic 497 final exam (Photo credit: pennstatenews)
    look Harvey, I found
    a foot!"
2. There is a hypothesis: 
    "Someone must
     have been murdered!"
3. There is data gathering 
    (blog article CSI 101)
4. There is data analysis by
    various forensic experts
5. Conclusions are drawn. If the
    conclusion supports the hypothesis
    then you're ready to support a case in court. If the results do
    NOT support the hypothesis, then you have to start again with a
    different hypothesis.

Video Quick Study (7:33) Lack of reliable/valid research in forensic
                                          cases.

Here it is in a handy-dandy flow chart if that helps:


English: Flowchart of the steps in the Scienti...
 Scientific Method (Photo credit: Wikipedia)




English: A forensic scientist at the U.S. Army...
 (Photo credit: Wikipedia)

When you are plotting your story, the analysis section is where you can twist the status quo. "The red toe-nail polish and dainty size did not hold up to DNA evidentiary review - this is not a woman after all!"

Now your inspectors have to start back to square one with the formulation of a different hypothesis.



See how this article influenced my plot lines in my novella MINE and my novel CHAOS IS COME AGAIN.


Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.


Thursday, February 27, 2014

Home Invasions: Information for Writers With Anti-Terrorist Expert Rock Higgins



___________________


English: A photo of S&W Mountain Gun M625-6 .45 LC
(Photo credit: Wikipedia)
Fiona -
This week, I posted an article on FB/Twitter about a recent home invasion, and Rock Higgins and I thought it would be an excellent blog topic.


Rock
Although I have written on this subject in my book, Meditations of a Modern Warrior, LINK there is more that can be discussed on this issue and here, Fiona Quinn and I will shed some more light on the subject of home defense.

Fiona -  
Let me say that my remarks are geared towards writers who are trying to write their scenes right, and Rock is the professional who will keep real humans alive and well. To learn more about Rock and his book go to this  LINK 

Let's take a minute first to explain the difference between a burglary and a home invasion.

A Burglary -

* Happens when there is no one home.
English: A door lock broken during an attempte...
 (Photo credit: Wikipedia)
* Usually happen during the day or when you
   are out of town. (So please don't put your
   fab plans for going to Paris out on social
   networks or make your plans generally
   known - you can share afterwards when
   you have the photos.)
* While some burglaries are done by
   opportunists, typically they are planned and
   the criminal knows quite a bit about you,
   your set up, your schedule, and your
    defenses. 
* If you get home and find something off - do
   not go in and investigate it alone. Call the
   police. Maybe you think one of your kids
   just accidentally left the door open.
   Minimally, you can get a neighbor to hang
   outside with your kids and the phone ready
    to dial 911 while you go do a 
    room-by-room.


Home Invasion - 

* Happens while someone is home. 
* A criminal who is coming into your home
   at night will assume that there is going to be a confrontation.
* Confrontations are to be avoided when possible. So it is important
    to be a HARD TARGET.
* Reason they might choose a home invasion:
   `Their plan may be to get someone to open safes or give pin
     numbers.
   `They plan a rape
   `They plan to inflict harm/kill the people inside


Being a hard v soft target

English: The "YL88 Digital Lock Adjustabl...
 (Photo credit: Wikipedia)
* Lock your solid-core doors with quality
   locking systems.
* Drill peep holes at your level and the
   children's level so they can see who is
   there, too.
* Lock your windows on all levels of the
   house not just the ground floor.
* Plant thorny bushes under your windows -
   and trim other bushes so that the criminal
   can not use them as a shield to hide behind.
* Motion detection lighting covering the 
   whole yard.
* Dogs 
* Consider a security system especially one
    that includes cameras. But if you can't afford a whole house
    system that is monitored, you can purchase the stickers and yard
    signs to put up. There are also portable alarms, designed for hotel
    stays, that are very inexpensive and can be used where alarms are
    not allowed (a dorm room, and apartment). 

    Remember noise and light make you a hard target. dark and
    quiet make you an easy target.  Link - this link takes you to a
    security store so that you can see the wide range of options. 
    (not an endorsement)
* A safe room set up. 
   `Simply a designated area to retreat to in an emergency. 
   `The children are taught to go there. 
   `The hinges are placed so the door swings out. 
   ` Some things that you might include: 
      A land line phone.
      Water
      Weapons
      Fire extinguisher
      Escape rope ladder
      Flashlight
  

Our Home Invasion Stories:

Rock-

      I was a young boy before my teenage years, my dad worked a shift system. My mom hated the night shift. At certain times when my dad was at work, someone would ring the front door bell or bang on the front door. As my mom went to answer the door, someone would climb over the rear wall and bang on the back door. When my mom went to the back, the front door bell would chime again and so on. This went on for quite some time. The local police were unable to catch whoever it was, and the neighbors never saw anything.

     My mom took to sleeping with a large carving knife under her pillow. My younger brother and I had no idea what was going on. Would I have liked to have been forewarned of events? Yes, definitely. Anyway, one night, my mom had had enough. When the front door bell rang (remember this is in the early hours so no one was coming round for a visit), she went to the front door and waited. When the back door was banged, she waited by the front door with the nib off so the door was open. On the next ring, she threw open the door; with  knife in hand she lunged. The guy had already taken a couple of steps back, and as he was confronted by a screaming woman wielding a blade, he legged it and would have been an Olympic sprint champion according to my mom.

     They never did come back after that and were never caught. When I learned of this story from my parents years later I asked my mom what she would have done that night, ‘I would have killed them’ she said and left it at that.

Are you trained in the weapons you have and are you mentally prepared to kill if it comes to that?


Fiona -

One day, I was home with my four small children when the bell rang. I went to the door and looked through the peep hole to find a man in a phone company uniform. I went to the window and saw that there was a company vehicle parked in front of my house. This was odd because we weren't having an issue with our phone. 
     So I called through the door, "May I help you?"
     "I'm here to fix the phone line..."
      My radar was up - something wasn't right. "We're fine. No issues with the phone. Thank you, anyway."
      He explained to me that it was my husband who had called, and he told me my husband's name. My instinct was that something was not right. I used my cell phone to call hubby to ask him what the issue was with the phone. My husband explained that he had switched our phone service, and we didn't even use that company anymore. My next call was to the police. I yelled through the door that the guy should get off my property, and he started kicking the door in, cursing at me, and ordering me to let him in. I had one of my children go press the panic button on our alarm. With the sirens wailing and whole house flashing red lights, I announced that the police were en route, and I had my gun aimed at the door, one more kick and I would shoot. He sprinted away, and the police congratulated me on not becoming a statistic.

So here I would caution you to  (or if you are writing this into a scene, then apply this to your character) premeditate a strategy. Know the applicable laws in the area you are staying and make decisions. Many of my friends will say, "I'd rather face 12 than be carried by six." My plan: I walk away, and my family is safe.

So Rock, what sparked this whole blog article for us was the story of the home invasion where the mother protected her family by firing at (and missing) the three teens who kicked in her door. Can you talk a little bit about guns and home safety?

English: Picture of a standard 'K Bullet' as m...
. (Photo credit: Wikipedia)

Firearms and Home Defense


Rock
Fiona has done a great piece on choosing a firearm for a heroine in a novel, and you can see it here: Choosing a handgun link

There is an inordinate amount of literature on firearms for home defense: rifle, shotgun, pistol. With the amount of choices, how do you really decide what is right for you? Well let me say this from the start, stick with a pistol, or a short barreled pump action shotgun at the most. Why? Well the tactics and the training to use a ‘Long’ effectively is 
far more complicated than using a ‘Short’. 

In this post I am going to ask more questions than give advice. This is because I do not know your circumstances. It’s your life, your home, your family. I can help point you in the right direction with questions you can answer.

Before you purchase your firearm get down the range and have a go with a few different types. Your hand size, strength and where you live (I will explain this a little later) all have an effect on the weapon of your choice. Also, take into consideration weak hand drills, that’s your none dominant hand, the weapon should feel comfortable for use in both hands with mechanisms that suit both dominant and none dominant hand firing.

But as you will see you may need to purchase two weapons, one for home defense and one for personal defense while out of the home.

Once you have chosen your weapon and are comfortable firing it on the range, the next step is to plan how you are going to defend your home.

Where you live will have some way to go in your weapon of choice and the rounds you use. Do you live in a block of flats, a house on a street, a semi or detached house? 

What are the walls like in your house, solid brick, plaster board, wooden or other? I ask this because if you live in a block of flats with thin walls, you don’t want a round hitting your next door neighbor while they are reading Virginia is for Mysteries, do you?  LINK

So two firearms: home defense may need .22 or a subsonic frangible round where as a CCW (concealed carry weapon) would employ a standard round for your weapon of choice. Bullet turorial

I have planned homes and night clubs for violent encounters. Why? Most home invasions happen at night and night clubs are dimly lit.

What is the first thing most people do on hearing a noise either outside, downstairs or in another room? You guessed it. They put the light on. This has now put the home owner on an equal footing with the intruder. You must get used to fighting in the dark. In the house it may be pitch black, or there may be ambient light coming in from outside. Either way, this is where the combat must take place, here you have the advantage.

When planning on low light combat, here you will also have to think about any attachments for your weapon:
* Torch (flashlight)? Not a good idea in my book. Remember you want the advantage, giving away your
   position is not having an advantage. 
* Laser dot light? Good if trigger activated, and you are already on target.


Your home must be planned with combat in mind.

* Can you move around your house in the dark without tripping
   over furniture, kids toys, cats or dogs? You should be able to. 

Fiona - Gosh Rock, and here I've been using the kid debris to make us a hard target. There's no way you could steal quietly through the room - and the thousands of lego pieces and marbles are special bonuses.

Rock - Yes,  toys make great noise traps when placed at points of entry. 
* Can your partner or kids move around in the dark to a safe room or escape from the home? 
* Do you have a plan for where you should meet up to count heads 
   in any emergency be it a home invasion or fire? Not next door for
   obvious reasons. 
* What about those who either don’t like guns or live, as I do, 
   where firearms are illegal? Well you are going to have to train in
   other weapons, knives, sticks, batons... Weapons can be placed 
   around the home either as ornaments or as purposefully located 
   weapons. 

Fiona - 
Ha! Don't break in at Rock's house. It will go badly for you. Here's hoping you all stay safe and sound. 


Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.



DISCLAIMER - This is a non-political site that is geared to help writers write it right, presenting information to help develop fictional characters and fictional scenes. In no way are we advocating any position or personal decision.
Enhanced by Zemanta

Sunday, February 9, 2014

Body Guard and Close Protection Specialist: Information for Writers with Rock Higgins



______________________________________________________

Fiona - Hi Rock, Would you please introduce yourself
            to my readers, and tell us how you spend your
            days and about your credentials? They are pretty
            impressive.

Rock - My full time job is as an Executive Protection
           Operator (Bodyguard) I work a 7 day on 7 day off
           rotation for an international businessman and his
            family. As I oversee 20 guys, it's pretty busy as we
            travel worldwide. So it is either working, planning
            or training plus much more. 

            My Certified Anti-Terrorism Specialist
            qualifications not only helps my full time role, 
            but when I work for myself. 
            I train businesses in anti-terrorism
            procedures. I also teach civilians, law
            enforcement, military and bodyguards in close
            quarter combat and now, of course, the writing.

Fiona - I have your book. Can you tell me about the impetus to write Meditations of a Modern Warrior.
            Whom did you want to reach?
Amazon Kindle Link

Rock - It didn't start out as a book. I had been doing a newsletter and had so many people asking for back
            issues. Someone said I should put it into a book form, and so I did. 
           
            The book is really for anyone regardless of  age, experience with violence/dangerous environment,
            or employment. Over 90% of being secure is mental, so the book mostly informs people how to
            look at themselves, their environment, and generally how they live or should live to be secure. It's
            getting the average person to take on the correct mind-set.

Fiona - Authors, if you are writing a a plot line that includes a safety detail, this is a great resource book for
            you. It includes all kinds of possible plot twists that Rock is preparing professionals to face. It will
            help you understand thought process and preparation as well as write those awesome combat
            scenes.

            Rock, let's pretend just that. I am writing a plot line where I have a heroine who needs protection
            because she is a daughter of an executive worth mega bucks. What do you tell her about what life
            will be like with close protection? 

Rock - Well I have been in that position so this is first-hand knowledge. As a young person, they don't
            want you there, and if I was in there shoes I would not want anyone cramping my style either. It is a
            master and slave relationship and a lot of give and take to build up trust. Depending on the threat,
            high medium or low risk, the environment that the daughter lives in and travels to, and also the people
            with whom she associates are going to impact how the operation is handled. 

            The more space you can give them when it is safe, the closer you can get when the situation changes.
            They are the masters (Employers) but when the shit hits the fan, it is a role reversal if they want to
             live or remain unharmed. Through the work of building trust, they learn to recognize from the
             bodyguard the signs of trouble and know how to behave and obey orders when command of the
             situation falls firmly onto the bodyguard. And they effectively become the slave. I use the code word
             'Harden Up' as an indicator from me to them that it's going serious, and they have a Pre-text fast
             dial to me with the same code word to get me running.

Fiona - "Harden up" - I LOVE that! Okay lets talk things going serious, can you give me an instance when
            you would say "harden up"? And another instance when the Principal would text you the "harden up"
            message.

Rock - I work as either an IBG (Individual Bodyguard) or as a team leader in charge of a team. 
            As an IBG, I am giving orders to my boss. As a team leader I am giving orders to my team. 
            As an IBG, unless there is a direct threat, it will be the opportunist who attacks. 
            Unarmed, edged or blunt trauma weapons or firearms. On my command of "Harden up," I need to
            simultaneously move the principal out of harms way and take on threat. 




            You can see this on the website under close protection and the latest blog post gives a bit more
            detail. (BLOG LINK to Rock Higgins Blog Article on this subject) With a team the nearest person
            to the threat gives the order to "Harden up," he takes on the threat while the team evacs the principal.

Fiona - And the text message?

Rock - For example in Moscow, you know you are in a nice place when doormen (bouncers) have AKs
           and chest riggs. A family friend's party, at the venue we don't know any of other guests, so there
           may be an indirect threat. Then a family friend turns up with three SUV type vehicles. Eight uniformed
           soldiers in urban camo de-bus and go into all round defense with AKs, and the family friend gets out
           and goes into the venue. As we are in the venue but not close, that is when the txt message comes in
           handy.

Fiona - What do you call the person you are protecting is there a specific term?

Rock - Officially they are known as the Principal, actually known as the Boss

Fiona - What if it's not the principal? What if it's his wife or kid?

Rock - Kids get called by their name, wives or husbands Mr. or Mrs. surname.

Fiona - Can you tell me some of the criteria that would put someone in a low
             medium of high risk category?

Rock - Some risk criteria:

Low risk
* City / town being visited is relatively free from crime. 
* Emergency services in place with fast effective response
* There is no direct threat to family member. 
* Normal close protection security procedures in place 
Link to V.I.P.A. Website

Medium risk -
*City / town being visited has normal / average 
  crime rate. 
* Emergency services in place are slow or only
   respond to certain crimes /emergencies. 
* Terrorists have been active in the area in the
    past. 
* No direct threat against family member. 
* Opportunist attack is more prevalent. 
* Contingency plans to be put into place. 

High risk
* Crime is higher than normal. 
* Opportunist attack at higher rate with foreign
   nationals targeted. 
* Unsafe or no-go areas in area visited.
* Direct threat against family member. 
* Terrorists active within the last year. 
* Emergency services slow, lack moral, equipment, 
  or are unable to cope with crime levels. 
* Contingency plans to be implemented

 Extreme Risk -
* These are personal risk assessments which are
   combined with a country risk level to give a more
   in-depth picture of threats faced.

Fiona - Has one of your young people (or older
            people for that matter) ever tried to ditch
           you?

Rock - Young people trying to do runner. Yes that
            happens a  lot of the times, especially where
            boyfriends were concerned.

Fiona - Hahaha Can you blame them?

Rock - Nope, but it's a right pain in the backside

Fiona - I bet - Do you have a "talk" with the boy?

Rock - Yes once the guys knew who we were and what we did, they usually were on side. But there
             have been some fantastic escape plans that I am sure prisoners of war would be proud of.

Fiona - LOL I actually clapped my hands when I read your last answer. Can you tell us a story?

Rock - Without giving too much away... 
            We could not figure out how one young
            person was getting out of a secure building, 
            we even actually made a joke about how
            they were getting out that in fact was true. 
            I was asked to load some luggage for a
            family friend into a car, a suitcase which I
            struggled to lift. I got another to help me and
            as we were putting the case into the boot I
            said wouldn't it be funny if such and such
            was in here. Well it turned out that was how
            they were getting out of the building. The
            next time I was asked, I opened the case
            before it left the building, and a head and
            shoulders popped out. Although serious, I
            couldn't help but laugh at how ingenious they were.

           I could actually write a book on all of the funny stories without giving any operational details away,
           maybe in the future.

Fiona - You should! Very cool that you are living what we are writing.




 Fiona - Rock, can you describe your favorite scar and tell us the story behind it?

Rock - That has got me stumped. Through all of my military career, my security work and all of the insane
            contact sports I play, I am pretty scar-less. I do though have a dislocated little finger that is out of
            shape from playing rugby and every time I look at it, I laugh as I remember it was snapped in half 
            and bent backwards. At the time, I let out a very girl-y high-pitched squeal which I am to this day
            embarrassed about.

Fiona - I'd pay good money for a video of that!

Rock - There is no video of me squealing, and I think I would say no there is no video of me squealing even
            if there was LOL.

Fiona  - Rock, thank you for the pleasure of your company and for sharing all of this wonderful information. 

Readers, you can catch up with Rock through:
Linkedin - Paul 'Rock' Higgins CMAS, SAC Dip
Facebook - Paul 'Rock' Higgins CMAS, SAC dip
E-mail vipatacticaltraining@hotmail.com
Website - www.vipatacticaltraining.com


Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.



Enhanced by Zemanta

Monday, January 13, 2014

Digital Footprints - Computer Forensics and Digital Evidence: Information for Writers

_____________________________

This office is Grand Central.” He plugged a new flash drive into the computer.
      “Are you finding what you need?” I asked.
      “Some of it. They have security on top of security.”

     ~ Missing Lynx





If you're writing a contemporary suspense/thriller/crime novel, then digital information is an important angle to consider.

Modern technology makes certain crimes easier to carry out than ever before, indeed there are certain crimes that exist now that were not possible before computers became generalized to the world population.

How many of you have been at the end of an African lottery win phishing expedition? Conversely, if the criminal is not aware of how digital forensics can help an investigation, it can also make crime harder to get away with.



Map showing the Strategic Alliance Cyber Crime...
Map showing the Strategic Alliance Cyber Crime Working Group member countries and lead agencies (Photo credit: Wikipedia)


Most interrogators working with computerized information are called Digital Forensic Investigators. Apparently calling them computer-geek-cops is frowned upon.



Deutsch: Micro USB Ladekabel fĆ¼r Mobiltelefone
 (Photo credit: Wikipedia)

They cover such crimes as:

* Cyber bullying
* Child porn and child
   exploitation
* Pirating - software, music,
   videos, and
  other copyrighted work
   like books.
  Link to novalist John
  Dolan's blog post
  about his experience with
  pirating. Just FYI
* Credit card fraud
* Altering medical data for insurance fraud
* Espionage
* Terrorism
* Corporate crimes
* Pharming - Pretending to be a legitimate
   organization when they are not
* Phishing - Trying to defraud people


Video Quick Study (3:43) Phishing and Pharming examples
Video Quick Link (3:28) - excellent overview of digital crimes
Video Quick Study (6:44) - This is Josh Moulin who taught at
                                WPA 2011. He is explaining what he does,
                              listen carefully to his mode of speech and his
                              vocabulary. This is not specialized speak
                              for the interview. This is how he spoke with us.
                              (Don't go to the website he offers; it is
                              incorrect).
                             * Includes tips for how to protect a child on line
                             * Tips on general computer safety



The first hurtle to jump is just identifying that there is an issue.

* Is this a glitch in a program? A human error? Or, is this a crime?
   Often times computer crimes are hard to discover.
* Did the person have widely scoped criminal intent such as a
   terrorist? Or was this a bored teenager hacking into a system to
   see if he could?


Then they start looking for a suspect.

Digital Forensics Experts will:
1 Trace Back - the computer experts try to find the source
   computer - computer from which the attack originated - by
   following the trail of addresses (IP Addresses)
2. Scrutinize the computer system of the entity that was
   compromised called the target.


Once the investigators have narrowed in on the suspect, they need to prove:

MOTIVE
* Did the person have motive for perpetrating a crime and what
   was it? Motivators might include:
   ` Curiosity - like hackers to see if they can.
   ` Money
   ` Victimization (such as stalking or pedophilia)
   ` Power/leverage/ revenge

KNOWLEDGE and MEANS
* Believe me, I could have all of the motivation in the world, BUT
   if my scheme includes anything more than
   using a word processor, you've got the wrong girl.

ACCESS to perpetrate such things as:
* Data mining for materials that would benefit a criminal such as
  credit card numbers.
* Logic Bombs - "is a piece of code intentionally inserted into a
   software system that will set off a malicious
  function when specified conditions are met. For example, a
  programmer may hide a piece of code that
  starts deleting files, should they ever be terminated from the
  company." More information here.
* Opportunity to perform alterations of computer logs to show that
   the activity happened at a different time
    or date. (Investigators must look at the time/date stamp and make
   sure these were not tampered with,
    for example)



English: DCIS special agents investigate cyber...
English: DCIS special agents investigate cyber crime within DoD. (Photo credit: Wikipedia)


In order to develop the motive, access, and means, the investigators will collect evidence. Evidence is collected, analyzed, and stored.


Traditional Investigation
1. Interview eye witnesses - did anyone see or hear anything
    pertaining to the crime?
2. Conduct surveillance
    * Electronic surveillance might include pretending to be a target
       such as posing as a thirteen-year-old girl.
    * Discovering if the suspect would have been some how
       UNABLE to perform a cyber crime by location,
       activity, etc. Ex. a scuba diver would probably have an alibi if
       they were underwater.
    * Smart phones with internet capability make this difficult at
       times; though again, everything leaves a digital
       trail, so it might just be helping investigators.

Digital investigation

In order to access digital information from the target computer system, the investigators would need owner permission. If they wish to gather the information from the source computer they will need a warrant. 
* The investigators might want to do this surreptitiously so as not
    to let the suspect know that they are
    being investigated.
* They may confiscate the equipment.


COLLECT: 4 strategies for collecting the digital footprint.


English: A portable Tableau forensic write-blo...
English: A portable Tableau forensic write-blocker attached to a hard disk drive (Photo credit: Wikipedia)

1. Seizure - bag, tag, and send devices to
    the forensics laboratory.
   * Ever growing number of devices with
      huge amounts of memory makes long
      back logs.
   * No way to differentiate between items
      that might contain evidence and items that
      have no relevance.
2. Onsite Imaging
    * Time consuming
    * Issues of contamination
3. Digital Triage with Boot CD or Thumb
    Devices
    * Cannot cope with cell phones, GPSs or
       similar devices
    * Can contaminate the data that is being
       harvested.
4. Onsite collection with specialized equipment such as Spektor
    * The one in this video was developed for investigators who do not specialize in digital forensics. So your
      Joe-cop could collect the evidence with maximum forensic control.
   * Can handle cell phones and GPS devices.
   Video Quick Study  (4:53) Promotes Spektor - but is a good quicky-overview of the collection techniques


English: A Tableu internal forensic write-prot...
English: A Tableu internal forensic write-protection module (Photo credit: Wikipedia)


Once the device is in the hands of the investigator:

1. They make back up copy (working copy)
    * Original data must stay intact allows it to be presented later in original condition if needed in court.
    *  Making the copy is called imaging.
    * Working Copy Master (the original copy) is used to make
       more copies. The original WCM is archived along with the 
       original data.
    * Investigators work on one of the other versions - if it is
       somehow corrupted then the investigators can
        make a fresh copy from the WCM

Plot point: How are the investigators sure that the copy is correct? They use a hash value - program that converts data into whole numbers that are added up. These sums are compared and if they match, then investigators know that they have an exact replication. This is a very cool little piece to manipulate in a plot line so I'm including this LINK to an academic paper concerning its use.


2. Examination computer - the data is
Image found on Facebook
    removed by
   a. USB
   b. SCSI  small computer interface
   c. Computer firewires link to howstuffworks article
 
  The machine is placed inside of a
   protective box that prevents
   someone at a remote location
   from communicating with the data
   and, for example, wiping the hard
   drive.

Analyze - specifically and carefully

Preserve - with a documented chain of custody to maintain the integrity of the evidence for presentation in court.


DATA STORAGE - 

Where do people (the good guys and the bad guys) look for data?

Slack space - where data goes when your heroine thinks she deleted it.
Any digital data storage device can be used to...
 (Photo credit: Wikipedia)
* Unencripted passwords and bank account
   numbers could be found here by
   investigators
* Hackers can go and harvest that same kind
   of data
Browser history (opening individual files)
Keyword search 
Metadata searches ex:
*who created it
* when
* where was it received and by whom

Video Quick Study (5:07) Great easy-to-understand description of why data doesn't disappear when your heroine deletes her files.


Another way Digital Forensics Investigators gather evidence is cell phones via GPS.
Cell phones will ping off of a cell tower and give a general location. This can help establish an alibi; it can
also place a criminal in the vicinity of the crime. Investigators have to be careful in areas that have many cell towers because there can be bleed over. This happens when someone is near the overlapping area of two towers. PLOT TWIST if there is bleed over, it could put your heroine near the scene of the crime instead of in bed reading a good book like Virginia Is for Mysteries. (yup, I just unabashedly plugged my anthology!) Your heroine's lawyer might just use bring in an expert to testify on this very subject. Where was she the night of the murder? - Can't tell from her cell phone pings.

But this is all very cops and robbers. Your plot line runs more along the line of a savvy heroine who isn't taken advantage of. By anyone. What can she do? Your heroine doesn't have to be a forensic security geek - she can get simple tools like Recover It. LINK (quicky advertising video that shows this in action)


Pertinent Laws:

Cable Communications Policy Act 1984 link
Electronic Communications Privacy Act 1986 link
Digital Milennium Copyright Act 1998 link
USA Patriot Act 2001 (Uniting and Strengthening America Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) link



See how this article influenced my plot lines in my novella MINE and my novel CHAOS IS COME AGAIN.


Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.