Links

Columnists



Site Search


Entire (RSS)
Comments (RSS)

Archive Calendar

April 2020
S M T W T F S
« Mar    
 1234
567891011
12131415161718
19202122232425
2627282930  

Guides

How to Become a Bounty Hunter



Tag: software

FBI Agent Creates Technology to Chase Down Pedophiles

Steve Neavling
ticklethewire.com

A Salt Lake City FBI agent is changing how authorities investigate child sex crimes, the Salt Lake Tribune reports.

Special Agent Eric Zimmerman created software that the FBI approved last fall, leading to the arrests of more than 220 suspects, according to the National Center for Missing & Exploited Children.

The 13 software tools reduce the time to investigate data on a computer hard drive and interpret real-time information on suspected abusers, the Tribune reported.

“I can honestly say it is one of the best tools that I have ever used since doing this line of work,” Toronto Police Service Detective Paul Krawczyk, who has worked in the child exploitation section of his agency for 10 years, told the Tribune.

The FBI offers the technology to local police.

Online Data Sharing Leads to Disclosure of Sensitive Govt and Personal Info

computer1

Now this is pretty darn scary. Rep. Edolphus Towns says he plans to introduce legislation to ban such software. Whether or not that’s the answer, is another question. But someone needs to find the answer. It seems a more effective way would be to create a software that prevents this from happening. Banning software seems like a tough task.

By Brian Krebs and Ellen Nakashima
Washington Post Staff Writers
WASHINGTON — The indiscriminate use of a popular online data-sharing technology has led to the disclosure of sensitive government and personal information — including FBI surveillance photos of a Mafia hit man, lists of people with HIV, and motorcade routes and safe-house locations for then-first lady Laura Bush, a congressional panel was told on Wednesday.

The information is often exposed inadvertently by people who download the technology to share music or other files, not realizing that the “peer-to-peer” software also makes the contents of their computers available to other users, experts said.

For Full Story