The tickle of curiosity. The gasp of discovery. Fingers running across the keyboard.

The tickle of curiosity. The gasp of discovery. Fingers running across a keyboard
Showing posts with label court. Show all posts
Showing posts with label court. Show all posts

Sunday, October 25, 2015

From Crime to Punishment in 18 Steps: Information for Writers with John Higgins, Esq.

AMAZON author page
ThrillWriting's good friend John Higgins stopped by to give us a quick and dirty look at the road
"From Crime to Punishment" so you don't skip a step in your M.S.











The Steps in a Criminal Trial


  1. Investigation Blog article
  2. Charges  Blog article
  3. Grand jury Blog article
  4. Discovery
  5. Pretrial motions(where a lot of decisions are made about what evidence and testimony can be used...
  6. Jury selection
  7. Openings  Blog article
  8. Prosecution case in chief  Blog article
  9. Motion to dismiss 
  10. Defense case
  11. Defense decision to take the stand or not
  12. Final arguments
  13. Jury instructions
  14. Jury deliberations 
  15. Verdict   Blog article
  16. Appeals
  17. Post conviction relief motions after all appeals exhausted
  18. Incarceration  Blog article
Fiona - 
Don't forget the after-trial cigar.


Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.




Friday, January 17, 2014

Cyber Security - An Interview with a Hacker: Information for Writers


__________________________________________________

Question mark liberal
 (Photo credit: Wikipedia)
Fiona - In today's interview I am speaking with Steven, who
            was kind enough  to come and share some of his
            unique expertise with us. 

            Hey Steven, can you introduce yourself to my
            readers and tell them how you got
            involved with computers and hacking?

Steven - I work as an IT analyst. My first experience with
              computers was when I was about 10 years old and
              convinced my parents to purchase a used Atari
              computer from a yard sale. This particular
              system did not include very much software, but it
              did come with several books that contained source
              code which you could type and
              run yourself. This was fascinating to me. I had a
              video game console (NES) at this time, but never
              put much thought into how a game was made...
              and a game is essentially an application.

             It was as though a door had been opened, revealing
             a hidden dimension that was all around. My mind
             filled with wonder, and I quickly became obsessed with learning more about this hidden universe.

             Eventually, I learned about what was referred to as an "IBM Compatible" computer. It included
             (what I thought was at the time) a more robust operating system MS-DOS and the first graphical
              interface I used "Windows".

              I started by learning a few commands "dir" and "help". Then I went through the entire system and
              learned every command which was available and read every help document.

              By this point my obsession with the computer was so great, my parents decided to start locking the
              keyboard out so I could only use it at authorized times... This only lasted a while, as I figured out I
              could bypass the lock switch by flipping the jumpers.

Keyboard V
 (Photo credit: Wikipedia)
Fiona - Did your parents know that they
            were helping you grow your hacking
            skills by trying to keep you
            away from the computer?

Steven - My mom originally thought she
             would be the one to teach the rest of
             the family about computers. I don't
             think she could have anticipated that
             I would surpass her knowledge in
             such a short time, nor do I think she
             foresaw where this would lead.


Fiona - Did your friends share in your computer obsession?

Steven - At this point in time, I didn't know anyone else that had a computer. I lived in relatively small town.
             One day in middle school, an exchange student arrived from eastern Europe. I befriended him and
             learned that his father was a computer programmer. He too dabbled in computer programming and
             was as fascinated with computers as I was. We would always say "We didn't want to do something
             if we knew we could" -- Kind of saying, if we were 100% sure something was technically possible it
             didn't interest us. We really wanted to do things to prove ourselves wrong.

Fiona - Let me go back and tell the readers that this interview started on Skype. I was up on the video chat
            and this is the image that came up for Steven:

Black Square


Fiona (cont.) -  Steven startled me by speaking in a digitally disguised voice, which I will not lie, was totally
                        creepy. How did you do that?

Steven - I used a voice scrambling system called VMic. It installs a virtual sound card driver that applies
              modulation effects to the hardware microphone, and sends the output to whichever application you
              want.

Video Quick Study (:05) snippet of voice being disguised (not Steven)

Fiona - That could be a great plot point! Okay - so now we are typing on a program called Criptocat - can
            you explain what that is? Why one would use it? And how could something like CryptoCat help a
            literary villain get away with a crime?

Steven -  Cryptocat "encrypts" any messages sent to the chat. This would add another layer for a third party
               attempting to intercept a message via sniffing. They would need to decrypt the conversation
               before it was intelligible.


Child nose
(Photo credit: Wikipedia)
TIME OUT for a vocabulary tutorial: Sniffing:
"A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal." Link




Fiona - So Cryptocat  makes my data unreadable from my driveway where someone is sniffing my wifi?

Steven - It would make it difficult enough to prevent most people from sniffing the message. There's always
              the "lead pipe" method though.

Fiona looks perplexed - she can't see Steven, but she assumes he rolled his eyes.

Steven - "Lead pipe" method is where they [the criminal] would use the threat of physical violence to coerce
               you into revealing the key to an encryption. This would, of course, nullify any attempt for the
               listener to remain covert.

Fiona - What about in my slack space is it encrypted there or is it still plain text there?
             (plain text is un-encrypted data)
             Blog Link to Digital Footprints: Computer Forensics and Digtal Evidence

Steven - "Slack space," or the unwritten clusters on your physical storage media, will most likely remain in
               the same format as it was before it became "deleted". If you didn't encrypt it to begin with, it
               wouldn't be encrypted afterwards.

             "Slack space" is sort of an IT new-speak term invented by management with limited technical skills.
              There's an increasing belief that you don't need to be technical to manage those with technical skills.

Fiona - Good to note. The digital forensic investigators refer to the area as slack space but an IT person/
            hacker would not.

            When I first heard about your computer skills, you were on your way to DEFCON in Las Vegas
            to study hacking - now you're in IT, what shifted your perspective. Can you tell me about the change
            between back then and post 911?  (Defcon link)

Steven - I was never involved in anything "illegal". My interests were pure curiosity about how someone
             would go about bypassing security measures. Post 9/11, it "upped the ante". It seemed like more
             resources became available for law enforcement, and they were developing a trigger finger for their
             shiny new big guns. I didn't want to get caught in the scope.

Fiona - Big guns?

Steven - The big guns were things like provisions to the Computer Fraud and Abuse Act of 1986 by the
              patriot act.

Fiona - (Authors - Here's a link if you think this might influence your plot and want to do more research.)

             Steven, if our character was knowledgeable about computers, what advice/systems would you
             suggest they put in place just to be safer?

Steven -   Don't overlap accounts. If you use an account for personal or other business, do not use it where 
                you are doing activities you wish to remain hidden or secret... In other words, don't shit where you
               sleep.

Fiona - That makes sense. I'm suddenly thinking about the General Petraeus affair. 
            "The general’s biographer and mistress thought she was being clever by using anonymous
             e-mail accounts and sending messages using hotel WiFi networks.
             But metadata — in this case the Internet protocol addresses pointing to network locations — 
             gave the Charlotte woman away."  news article link

             What should a writer be careful about when they are writing about digital technology?

Steven - If there was an easy way to do it, everyone would be doing it. I think it would be good to attempt
              to avoid specifics as much as possible. At the time it may seem cutting edge, but probably won't
              age very well. "4 Megabytes" was a lot in 1984, but in 2014 we can transfer it in seconds.

Fiona - What do you see as a big fallibility in cyber security?

Steven - A huge security hole that will never be patched is people. If you can gain confidence with a
             person you can get them to do things they normally wouldn't do 


Fiona's aside: This is completely true. I trust Steven. He told me he would only do an interview with Cryptocat. Since I wanted very much to interview him, I signed right up without doing any research - Shoot! I could have agreed to load sniffing software into my computer, and he could be finding all of my passwords and bank account numbers, etc. Trust. Hmmmn.  

Fiona - Steven - can you believe our hour is up! This has been great. I so enjoyed speaking with you. I'm
            wondering if you could just quickly tell me the story of the hacker you met who turned evil and was
            caught because of his bragging.

Steven - I'd rather not end up on anyone's radar. Snitches get stitches.


English: CAPT John Rolph swears in COL Paul Ho...
 (Photo credit: Wikipedia)
Fiona's aside - Steven suggests that if you need a template for a crime, do a search for a crime that has come to trial and read through the court documents to find out the exact steps involved. 


Fiona - Ha! Well we don't want you acquiring any new scars. Speaking of scars, a standard question here on ThrillWriting is about your favorite scar.

Steven -  If this were an interview where I had
              admitted to doing something illegal, I
              would invent a scar in a
              place where one didn't exist... 
              But since this isn't the case, I'll have to go with my favorite scar would be the one
              on my left arm. I got it from a jungle gym when I was a child. I think it was my favorite because up
              until that point I didn't know anything about limits... I would tumble backwards off the top bars and
              land on my feet. Looking back, I could have snapped my neck, but the only real damage was a
              deep scratch from an uncapped screw.


Fiona - A huge thank you to Steven for his wonderful information.

Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.


Monday, November 18, 2013

The Death Investigator - A New Character Arrives On the Scene: Information for Writers


______________________________________________________


Manuel looked at the dark holes in the men’s foreheads. Felt the silence. Dead. Yes, must be dead. They were dead. Manuel’s mind tried to grasp this simple fact. 
 ~  Missing Lynx



 So you're writing right along, thrilled that your fingers are tripping over the keys when shock of all shockers your heroine stumbles on a body. She toes it, hoping maybe it's just a drunk, but the smell tells her she's not so lucky. Shoot! Not only did you give your heroine a very bad day and the seeds of her future nightmares, but now your romance has turned into something else. Who should she call?

Well, 911 to begin with. But they will send out a group of people who are not all playing on the same team. One of the players MUST be the coroner (if it's a small town or rural area) or the coroner's investigator/death investigator.

Well who is that? They've never shown up in any of the books you've read.


Death Investigators or Coroner's Investigators - 

* are specialists who become involved in all deaths that
   were not expected. 
* They help determine if the death should 
    be further considered for criminal review or if the cause was
   natural or accidental in nature. 
* These are the people who show up to represent the coroner and communicate with the coroners office. 
* If necessary they take photos and start to gather information for a forensic death investigation.
* Focuses on the pathology. They assume foul play until it is proven otherwise.
* Develop cases for criminal acts of murder or manslaughter
* Develop cases for civil suits such as product safety failures
* Coroner's Investigators are called to testify in court.
    Video Quick Study (4:53) Testifying as to her job
    Video Quick Study (1:38) death investigator talks about how many deaths he handles and talking with
                                             families.

PLOT TWIST POTENTIAL - the death investigator tries to document EVERYTHING because a body can change in transit. For example, the hearse could be in an accident when the murderer pursues them and forces the car off a cliff! The body could be jetted out the back. Now the body looks very different and perhaps the tell tale markings were abraded away...  

There are no federal laws that govern death investigation. The Model Postmortem Examination Act 1954 LINK to Act gives states guidelines for their laws. So you'll need to figure out the laws for the state your body is found.

Deaths must always be reported (though not necessarily investigated) when there is a:
* homicide (or possible homicide)
* sudden or unexpected death
* suicide
* in any institution other than the hospital
* work related
* public

1. Once a death investigator arrives they start documenting the basic questions:
* Who found the body BUT NOT who killed the person
* What was the condition of the body (clothing etc.) this includes stains, tears, and markings
* Where was it found - this includes the temperature and humidity levels as well as objects in the vicinity.
* How was it placed

Notice that there is no WHY? the "why" belongs to someone else. Though they might gather information that would help with an autopsy such as evidence that the person was depressed/suicidal.

2. They will then make decisions about preserving and transporting the body
3. Try to identify time of death
4. Up close and personal - a death investigator will
* Interview family and friends for clues into the death.
* Search the dead person's home to include reading materials, computers, read their journals etc. trying to get
   an understanding of what might have happened. They might, for example, collect the medical bottles to see
   if there was an interaction that killed the person. Or there was a possible overdose.
   LINK to blog article on Forensic Toxicology

Need a plot twist???

What is a coroner? Video Quick Study (1:49)
Coroners are sometimes elected and may have no idea what they are doing.
In many places, the person tasked with making the official ruling on how people die isn’t a doctor at all. In nearly 1,600 counties across the country, elected or appointed coroners who may have no qualifications beyond a high-school degree have the final say on whether fatalities are homicides, suicides, accidents or the result of natural or undetermined causes.LINK  
Video Quick Study (3:49) Untrained coroner and Michael Jordan's father's murder case.
Video Quick Study (3:24) Recommended standards that would make the death investigation accredited and peopled by doctors run by medical examiner not a coroner.
This is long but very interesting and informative. Video LONG study (1:09:37)

See how this article influenced my plot lines in my novella MINE and my novel CHAOS IS COME AGAIN.





Thank you so much for stopping by. And thank you for your support. When you buy my books, you make it possible for me to continue to bring you helpful articles and keep ThrillWriting free and accessible to all.