In the wake of the Edward Snowden leaks detailing NSA bulk data collection techniques, warrant-less wiretaps, and other Orwellian-like practices, many people feel as though the tools the US federal government are utilizing in these endeavors are some advanced out-of-reach form of technology. While there is no private sector alternative to wiretaps, many people are not aware of the fact that the same databases that they hear about government agencies such as the National Security Agency using, are the databases that have been used by skilled private investigators for years.
From the beginning, Rick Gurley and his private investigation agency have been sought after by people wanting to get into the private investigation business. And Rick has always been receptive to training investigators how to get into the business, how to set up a private investigation agency, and even how to successfully conduct private investigations. [Read more…]
In November of 2011 RMRI LLC’s Rick Gurley teamed up with Pursuit Magazine to produce and promote a YouTube Video titled “Basic Use of Maltego for Network Intelligence Gathering”. 4 years and 72,000 views later, investigators are still using the screencast to improve their Cyber Investigation skills.
The private investigator answers the phone, it is a regular attorney client. The attorney says that he was just retained by a client who claims that the local police beat him up for no reason. The private investigator asks two key questions, where and when? The attorney explains that is was within the past 30 days and it was at a convenience store. The private investigator knows the store and knows that it has video cameras, the private investigator also knows that he will be having to deal with digital evidence in this case. The private investigator knows that what he does from this point forward will be critical to this case. He knows that part of this case will involve a cyber-investigation. The private investigator also knows how to respond. [Read more…]
I am writing a blog post on a topic that has been very pervasive to society. More and more I have people coming to me that believe they have been targeted by “hackers”. In part, this wholesale notion that “hackers” are waiting in the wings for us, is due to media glamorization of the skilled “hacker” that is just combing through anyone’s computer that they want to at will. Hopefully, this series will give you a more realistic view as to the likelihood that you have been “hacked”. Hopefully this series will also help you to secure your computer and/or network.
We hear it every day; “I think someone hacked my account”. It is our first suspicion whenever something does not work exactly as we believe it should on our computer. Whenever we find out that people know things that we believe they shouldn’t, we immediately think “someone hacked one of my social network accounts”! The paranoia about being “hacked” has become so pervasive in our society that we bypass the most logical options and believe we have been “hacked” if we cannot explain a leakage of information or if our computers don’t respond the way they always do. Don’t get me wrong, a REAL danger of being compromised in our digital world through malicious targeting DOES in fact exist, and we should certainly be cautious about it, but there is a difference between being cautious and being paranoid.
First of all, not everyone is a “hacker”. Contrary to popular myth, it takes a little more to be a “hacker” than to just sit down in front of a computer. I have been in the circles of what one might call some REAL hackers, one of my close associates has two books and a movie out about his exploits as a “hacker”, and now owns a successful computer security company. I have another friend that is a “white hat hacker” that has worked for some of the largest international banks in the world strengthening their security, and a friend of mine that sub-contracted work from me for a while is one of the best computer security expert’s that I have ever meant and who’s skills have saved people lots of money and even saved a few people from going to jail on false charges, and one of my best friends is in charge of IT at a very popular and well to do hotel. I have also dabbled in the “hacking arena” myself, and am known in certain circles for some pretty notorious exploits. [Read more…]