PID Perspectives

Stay in the Know with Our Blog

START READING

Latest Articles

Cybercrime

The Gary McKinnon case

Between 2001 and 2002, a British national gained unauthorized access to 97 U.S. military and NASA computers and other government networks, in search of UFO evidence and other conspiracy theories…

Read More »
Computer Forensics

Understanding the MO of cybercriminals

In a previous article, we have seen how cybercrime is, by nature, difficult to define. However, criminologists have successfully categorized different generations of cybercriminals and constantly observe their evolution compared…

Read More »
Crime analysis

How the Internet reshaped criminal activity

The defining characteristic of cybercrime is that the criminal activity rests upon Internet-connected technology. The Internet is, after all, a set of informational protocols enabling computers to communicate with each…

Read More »
Cybercrime

Kevin Mitnick, the ghost in the wires

Kevin Mitnick is one of the most well-known figures in the history of hacking and cybersecurity. His life story reads like a cyber-thriller, and he influenced how the public and…

Read More »
Crime analysis

Learning link analysis with TXLEAN

Last week, I attended a training session on link analysis with TXLEAN – the Texas Law Enforcement Agency Network. Link analysis is a valuable and powerful tool to fight traditional…

Read More »
Computer Forensics

Learning time series analysis through CDR

In January, I started attending police-led training on CDR analysis through the American Association of Crime Analysts. This topic is particularly fascinating for anyone with a background in working with…

Read More »
Register to access our content

Create Your Account

Focus Topics

Featured Articles

For beginners and non-technical audience
Geek Zone
Life at Negative PID
All topics
Click to access the login or register cheese
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO