Tracking Lost Laptops

October 19th, 2011

All hope is not gone for those whose laptops have been stolen or inadvertently lost for one reason or another. Laptops have been especially functional for highly mobile people. It is this very mobility that puts the laptop at risk of getting lost while traveling, attending meetings or seminars or simply taking it in places where business takes the owner. Laptop owners not only have to contend with the lost unit but also with the lost of important data and information contained in it. The lost of the unit and the information it contains may prove to be more expensive than it appears specifically if possessed by the wrong hands.

To counteract this critical situation, various laptop tracking software have been introduced. Some of these are the Gadget Trak Search and Destroy, MacTrak: Advanced Anti-Theft, Cyber Angel, Backstopp, LoJack and the Adeona. All these software facilitates tracking of the lost laptop by sending information as to its present whereabouts and user once the alert has been activated in a stealth mode. Most could perform remote deletion of data files if such would be critical to the situation.

Nanny Camera Controversy

September 25th, 2011

Lately, the topic of the nanny camera has come over a number of times. It is interesting how today, since technology has advanced, and society has deteriorated, to some extent in my opinion at least, these cameras have become part of many people’s lives. It is absolutely horrifying to hear about or see stories of nannies abusing children that it seems like having a nanny camera is an absolute necessity that one must have in order to leave their children with a nanny. On the other hand, some might say, if you don’t k now your nanny well enough, or don’t trust her, then why leave her with your children, even if there is a nanny cam there? Do you need to wait until she actually abuses your children?

This is an interesting question, and it can be taken even further. If you don’t know your nanny all that well, and even if you do, even the more so, should you be videotaping her without her knowing about it? Perhaps it is enough just to tell her that she is being watched and then there won’t even be a need to videotape it. The bottom line is that we really can never know a person well enough, and if you want to be sure that your child is not being harmed, a nanny camera does come in handy.

Voice Stress Analysis

December 21st, 2010

Voice Stress Analysis is a technology that uses voice-based testing to come up with a conclusion. It is based on the basic principle that the human voice contains telltale signs that will betray its speaker’s emotional state like the intent to deceive. Small and often inaudible changes in the voice occur and are visually displayed on a computer screen. It not only seeks to recognize veracity but also a range of other emotions that can be of use in a broader screening process. The lie-detector has increasingly used voice stress analysis as its software continues to be refined.

Suspects are asked several controlled questions to gauge normal vocal response levels. The real questioning that follows would reveal the computer’s interpretation of the responses immediately.

Training the Handlers

November 13th, 2010

Any benefit derived from DNA technology would not be of any use unless the professionals involved in the criminal justice system or the handlers are provided training and assistance with regards to the collection and use of the DNA evidence. This would more or less include the police officers, prosecutors, defense attorneys, judges, forensic scientists, medical personnel, victim service providers, correction officers as well as the probation and parole officers.

Police officers should have the capability to collect evidence properly. Prosecutors and defense attorneys need to know how to introduce and use it successfully in court. Judges should know how to rule correctly on the evidence’s admissibility. Victim service providers and medical personnel likewise need to understand it to be more responsive to the victim’s needs.

Cyber sleuthing technology has the potential to unlock valuable information in thousands of crimes that have a digital component in them. The so-called flasher boxes facilitate deeper access to data in the form of complete extraction and examination of all information contained in a wide range of cell phones. This is definitely one step ahead of criminals who are trying to hide evidence in digital devices.

The main advantage of the flasher technology over other existing methods of information retrieval is in the ease of plugging the cell phone into the box to make its entire contents spill out into the computer. Contacts, call history and even deleted images and videos are included. However, the mass of letters and numbers that are shown may make no sense but can be turned into valuable information with the right mathematical translation.

The fundamental infrastructure support needs to be in place before any accomplishment can be hoped to achieve in increasing the analysis capacity of public crime labs. The basic processes of DNA analysis consisting of extraction, quantization, amplification and analysis require equipments and materials for it to be conducted. The process in turn, needs an information management system that is designed to automate evidence handling and casework management. This system is expected to improve the integrity and speed of evidence handling procedures while ensuring proper chain of custody.

Automated systems such as robotic DNA extraction units streamline aspects of the DNA analysis procedure that can be labor and time-intensive. It also aims to limit human error and reduce contamination. Lastly, there must be appropriate evidence storage conditions that will ensure the availability of the evidence throughout the period of investigation and justice proceedings.