As most of you know by now, I’m currently training to be a psychotherapist, because I don’t have enough strings to my bow already. I know I want to practise existential psychotherapy but I’m not yet clear on whether there’s a particular group of clients I’d like to work with. I’ve recently been thinking, however, about working with law enforcement officers, particularly those who are engaged in investigating cases of child exploitation, human trafficking and counter terror. I have the advantage of understanding these industries from the inside, and hopefully with the benefit of psychotherapy training I’ll be able to make a difference to the field by helping people to deal with some of the things they’re seeing. Read more
A while ago I published a book. It’s a digital forensics textbook, and the guys over at Forensic Focus, where I normally write digital forensics related stuff, wanted me to promote it there. I couldn’t work out how to do that though: normally we either review books or interview the authors, but I couldn’t review my own book and I didn’t want to interview myself.
Enter Oleg, my co-author and very useful person, who took on more of the book than he’d originally agreed to when I got ill halfway through the process. Today I interviewed him on Forensic Focus about what he does as a day job, how he came to write the book, and what he thinks the most important current challenges are in digital forensics.
Take a look at the interview on Forensic Focus
Flashpoint, a business intelligence agency specialising in the deep and dark web, recently published a report on the economy of criminal networks online. The report looks not only at where criminals go to communicate on the internet, but also how their communications are structured, and the ways in which online communication has changed the criminal landscape.
Far from the kind of jack-of-all-trades portrayed in TV dramas, today’s cybercriminals structure their operations much like a business, each person having their own specialisms and reporting to the people above them. This helps to ensure that every member of the network takes on tasks that don’t overwhelm them, and often also ensures that the level of communication is kept to a minimum. Each party is only in contact with the level directly above, thus decreasing the likelihood of breaking up the entire network if a single individual’s identity is uncovered by law enforcement.
Any book that begins with a foreword by Eoghan Casey is almost guaranteed to be a vital and immensely useful read in the field of digital forensics, and Practical Forensic Imaging is no exception.
The need to securely preserve digital evidence is of the utmost importance to any investigator, particularly in criminal cases where findings may need to be upheld in a courtroom situation. Despite the huge impact of this subject matter, however, there have been precious few books on the topic to date. Luckily, Practical Forensic Imaging steps in now to fill the gap.
The other day I interviewed John Patzakis, Executive Chairman at X1 Discovery, about an article he’s written about a new amendment to Federal Rule of Evidence 902.
Subsection (14) will come into play this December, and will mean that all electronic data will be required to be “self-authenticating”.
People have always asked me how I manage to fit all the various things I do into my life. In the past, the answer was that I was a workaholic who could get by on four hours’ sleep a night.
Nowadays, however, I’m in my late twenties, and while that means I’m still young (right? RIGHT?!), it also means I’ve started making those little noises when I get out of chairs or bend to pick something up, and also that going to bed at a reasonable hour instead of stumbling drunkenly through the streets of Dalston at 3am seems like a perfectly good nighttime pursuit.
Yesterday, Sarah Von Bargen of YesAndYes (a blog you should definitely be following!) interviewed me about my work as a private investigator.
Does what we see on TV bear any resemblance to real life as a private investigator? Are you really tapping phones and going on stakeouts? Today, a working P.I. tells us about her strangest cases, how she finds missing people, and how long cases usually take (you’ll be surprised!)
I am a private investigator. By definition, that means I investigate things that are… well, private. I snoop around in people’s business to find out what’s going on, and then I present the evidence back to the client.
I am also a privacy advocate.
Tomorrow, the 1st of March 2016, marks my five-year anniversary as an investigator. I set up my first investigation business when I was still working at my old job (with their permission), and I’ve been through several iterations since.
Now, five years in, I’ve settled into my investigative identity. Here are some of the things I’ve learned along the way.
Some parts of becoming a private investigator are weirder and more confusing than others. I suspect that some of the experiences listed below have something to do with being a young, female, alternative-looking person, although considering that I have no other point of reference, I might be wrong about that.
I became a private investigator three years ago, and six things have stood out repeatedly over the years, so I thought I’d share them.