President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s economic prosperity in the 21st century will depend on cyber security.”
Cyberspace touches nearly every part of our daily lives. It’s the broadband networks beneath us and the wireless signals around us, the local networks in our schools and hospitals and businesses, and the massive grids that power our nation. It’s the classified military and intelligence networks that keep us safe, and the World Wide Web that has made us more interconnected than at any time in human history. We must secure our cyberspace to ensure that we can continue to grow the nation’s economy and protect our way of life. http://www.whitehouse.gov/cybersecurity
Al Dressler, a seasoned investigator, and expert consultant with Colucci Investigations spends his days assisting individuals, corporations and law enforcement in the fight against invasion of privacy, in the areas of cyber crime, computer and cell phone forensics, e-mail tracing and network audits.
Facechecks.com, features facial recognition software to assist in the identification of those perpetrating crime… at their forensics lab in conjunction with professionals at the University of Bridgeport. http://www.facechecks.com/ They offer:
* Background Checks and Employment Screening
* Automated In-Bound Employment Confirmation
* Immigration Compliance and Form I9 Management
* Occupational Medical Testing and Drug Screening
* Human Resource Document Retention
* Electronic New Hire and Benefits Form Management
* FBI Fingerprint Background Check Service
Al joined host LadyJustice for a conversation concerning the modern day “Mission Impossible technologies”. CLICK HERE to listen…
- Intro for Al Dressler…;
- Al’s tribute to Susan Murphy Milano;
- Two year waiting list with State and Federal computer forensics… Kudos to the FBI and the Connecticut State Police computer labs in New Haven focusing on sexual predators- dealing with over 200 cases;
- Facecheck and Colucci Investigations’ value is to get the information needed and act as an intermediary between victims, prosecutors and law enforcement;
- Example of cyber harassment – Explaining the process prior to bringing it to the police department;
- Definition of Cyber security via a story about President Dwight D. Eisenhower contrasted with today;
- “Bully on the block” versus bullies hiding behind computers
- What it takes…. Taking hard drives, making images, giving a report to an attorney or police department, locating e-mails or IP addresses etc.;
- Example of a Cyber bully– Are the “Evil Doers” winning? A three year process….
- A person’s reality and paranoia…. The aftermath;
- Delilah asks about cyber security tips…..
- Al’s advice re – Children’s security- The main precaution – Parental Vigilance at the elementary school level; Website recommended-
- (Software- Spector soft ) Recording everything they do on line and sending a report covertly to what they are doing;
- Adult tips – Common sense and using the recommended website – www.webroot.com. It scans your computer for hackers, bugs. etc…
- Economical aspect of such security precautions….
- Face Recognition Technology- on the edge of innovation – Uses-High end security rooms; At a hospital holding radioactive drugs – replacing cameras to alert security; On line security – banks, brokers and to keep kids safe on line;
- Challenges of Facial Recognition – The speed and accuracy being worked on;
- Ladyjustice asks about the problems encountered with the ever changing features of growing children – How the facial recognition can match the growth patterns;
- Using facial recognition technology to help identify missing persons…;
- The expansion and implementation – Private level versus the Federal Government …. A pilot test rolled out in 2014 combined with fingerprinting (Adam Walsh Act);
- Challenges combining fingerprinting with facial recognition and new algorithms;
- Crime Victim expectations – and use of technologies…. On the Cyber end –CSI shows have accuracy…. But, the amount of time to process results and time to solve a case is inaccurate;
- Sorting through data – an arduous process – Making a forensic image of a hard drive, looking for that “needle in the haystack” piece of data takes a long time…
- Example –Hedge Fund Company in Westport, CT = Pequot Capital – Insider Trading…. After many years…. One e-mail made the difference and yielded a million dollar whistleblower settlement and arrest of the husband;
- Whistleblower cases…;
- Work on many cases simultaneously…;
- Traditional investigation and the cyber investigation enhances…
- Solving cases…Al’s opinion of using traditional methods versus cyber tools…;
- Delilah asks about the types of clients Al works wit hand how to approach their organization?
- Response: Al’s company works on three sectors – computer forensics, cell phone forensics, training at the law enforcement, corporate level and work on domestic situations;
- Training programs teach how to be a computer or cell phone forensics examiners;
- Ladyjustice asks if there is a hierarchy of case selection? Depends on the time factor and a missing person’s case may get priority….. Won’t take perpetrator cases of “kiddie porn;”
- The importance of background checks prior to taking a case;
- Ladyjustice asks if Al voluntarily assists non-profits organizations?
- Cases in the tri-state area and beyond;
- Services/resources available in different sectors and the ability to pay…;
- Cyber crime units…and the rich man vs. poor man’s court;
- Which of the emerging technologies hold the most promise in cold cases…. Facial Recognition could be very helpful when the Federal Government has the system in place;
- Delilah –“Science Fiction coming true…” a new reality…. Discussion regarding the fact that these technologies are very tough to grasp;
- Is the media your friend with regard to reporting emerging technologies?
- Lack of awareness on the part of media in the change- shift in technologies;
- The team at Colucci Investigations;
- A “typical day” in the life of a cyber security investigator….;
- Grunt work vs. field work;
- Connecticut Innovations Grant – Advantages;
- What should crime victim families know about what they do?
- Al’s response-The importance of counseling for domestic cases…dealing with their stress and the limitations of their services;
- Delilah relates that many professionals have a very limited understanding of how to deal with domestic issues; Susan’s legacy with live on with others being trained!
- Al’s contact information: email@example.com; Tel: 203-650-3722;
- FTC Recommends Best Practices for Companies That Use Facial Recognition Technologies (bespacific.com)
- Civil liberties watchdogs concerned by FBI facial recognition program (coloradoindependent.com)
- Privacy concerns grow over FBI data gathering (salon.com)
- Shattered Lives: Talking with Al Dressler, Cyber Security Expert (imaginepublicity.com)
- Online Security – Where to Start (bridgetechnical.wordpress.com)