SlideShare una empresa de Scribd logo
1 de 30
Forensics Overview
 Bush

   Vannevar Bush: wanted to use
    technology to create an
    automated library system that
    he described as “memex”
   Norbert Wiener: invented the
    field of cybernetics which
    would inspire advances in the
    use of technology to advance
    human lives
   Marshall McLuhan: had the
    idea to make a global village
    interconnected by and                    Weiner
    electronic nervous system


                                          McLuhan
   Began with launch of Sputnik in USSR
   President Eisenhower wanted to bring US
    back to arms race lead created the
    Advanced Research Project Agency (ARPA)
   Second head: Lawrence Robert
     • Wanted to build network system
     • Used idea of packet switching developed
       by Paul Baran at RAND
     • 1969: Created a special computer called
       the Interface Message Processor which
       could used the ARPANET (first internet)
   First ARPANET protocol was Network
    Control Program
     • Later Replaced by Internet Protocol
       (IP)
   When ARPANET retired in 1990, it was
    transferred to the National Science
    Foundations NSFNET
     • Connected with research facilities in
       Europe
     • Established what is today’s internet
   Most common used through the World Wide Web (WWW)
     • A Database in the form of WebPages that can be search through web browsers




   Contain URL’s or Uniform Resource Locators used to located different WebPages
    on the WWW
   Uses Hypertext in order to quickly navigate from on WebPage to another
     • A hypertext is a link to another Webpage
     • Term was coined by Ted Nelson in his book “Literary Machines”
   The World Wide Web is made public through Internet Service
    Providers (ISP)
     • Company that provides internet services (web browsers)
     • Ex: Internet Explorer, Mozilla Firefox
   ISP use IP Addresses to locate and transmit information located
    on the Internet
A  code that defines where a
 certain piece of information
 is located on the internet
 when using an ISP
 • Usually four sets of
   numbers separated by a “.”
 • Numbers can range from 0-
   255 an example of an IP
   address would be
   78.125.0.209
 Domains   are ways to locate IP
  addresses without needing to
  know the IP address itself
 This is done by giving a name to
  a specific Webpage in order to
  locate it
  • Ex: www.bxscience.edu
 Make browsing the internet a lot
  more convenient and quicker
 Domains are split into 3 levels
   Top-level includes the end
    of the web address
     • www.bxscience.edu
   There are many top-level
    domains in a web address
     • .com- for commercial
       purpose
     • .edu- from educational
       institutions
     • .gov- provided by the
       government
     • .org- provided by a
       nonprofit organization
 The second level of a domain
 includes the middle portion along
 with the end portion of the web
 address
  • www.bxscience.edu
 The third level of a domain
 includes the who web address
  • www.bxscience.edu
   A software program that searches the internet for information
    though the use of key words
   Popular Search engines include
      • www.google.com
      • www.yahoo.com
   Search engines can be used to learn more about the different
    fields of forensic science
   Currently the most popular service on the internet
   Works similar to conventional mail except a lot faster
   An email is transmitted using an email address
     • An email address includes a name, word, or phrase that
       identifies who the email is being sent to followed by an
       “@” along with the internet webpage address that
       provides the email service
     • Ex: name/word/phrase@bxscience.edu
   Makes forensic scientist communicate and exchange
    information a lot faster
   The analysis of events on
    the internet that can be
    used to solve a crime
   Analyze recent activity on
    the internet even if the
    internet history has been
    deleted
   This is done through
    Windows Sap Files
     • Data created while on
       the internet and deleted
       when getting offline
     • Deleted data is stored in
       an erased file on the
       computer
   Forensic Scientist locate and
    analyze the deleted data on the
    internet from these files
   Also look at recent emails and
    bookmarks for possible
    evidence for the crime
 Hacking   is the unauthorized intrusion of computers
  and the internet
 It is considered to be a felony in the United States
 Hackers are able to do what ever they please on
  the internet as long as the computer they hack
  remains online
 Forensic Scientists track hackers by finding their IP
  addresses
   Today you can’t go on the internet
    without a hacker trying to enter your
    computer
   Special software be used to prevent
    Hacking
     • Firewalls
     • Antivirus
   Firewalls follow you where ever you go
    on the internet
     • A firewall is a program that
       separates secure and un secure
       areas on the internet to prevent
       hackers from intruding your
       computer while on the internet
   Antivirus
     • Prevent virus’ that
       hackers attempt to
       spread from reaching
       your computer
     • A computer virus is a
       program that can
       multiply itself in
       another computer
       and cause damage
       to the computer’s
       memory and other
       data
Network Security Audit
Ensure that your network conforms to industry best practices. A
network security audit will identify holes and vulnerabilities, and provide
remedy against exploitation. A network security audit includes
assessment and remedy for:

Network Infrastructure
Public Footprint
Perimeter Devices and Policies
Remote Access
Wireless Connectivity
Servers, Workstations & Mobile Devices
Domain Policies and Data Policies
Audit Measures
Backup
Emergency Response & Disaster Recovery
Information Handling
Corporate Forensics
•HR & Employee Relations Investigations
•Incident Reporting Software
•Compliance Investigations
•Insurance Fraud Investigations
•Corporate Security Investigations
•Ethics Investigations
•Privacy Investigations
   US v. Miller
     • 45 year old man named Mark Wayne Miller
     • Chatted with underage girls through the internet under
       an assumed name and photo of a random young
       male
     • Convinced many of these girls to allow him to engage
       in sexually explicit content while he recorded through
       a webcam
     • He then sold the footage
     • Girl sends love note to address he had used during
       chats
     • Address was from old job that knew where Miller was
       living
     • Investigators inspect the content of Millers internet
       visits on his computer and discover his actions
     • Arrested and sentences to 35 years to life in prison
   US v. Heckenkamp
     • Discovered for hacking and damaging the computers
       of several high-tech companies by Jerome T.
       Heckenkamp
     • Had gain unauthorized access to
       EBay, Qualcomm, Exodus Communications, Juniper
       Networks, Lycos, and Cygnus Solutions computers
     • Investigated by FBI Computer Intrusion Squad and
       Computer Hacking and Intellectual Property Unit in
       US Attorney Office in Northern District of California
     • Led a warranted search of Heckenkamp’s computer
       taking a copy of his hard drive
     • Discovered recent activities and hackings that he had
       done on the internet
     • Sentenced to 8 months in prison and 8 months of
       electronic monitoring
   US v. Iffih
     • Hacked several computers including those
       controlled by NASA
     • Investigators found a full trail of all his hackings
       when inspecting his computer
     • Charged for three counts
        Intercepting login names and passwords of a
         NASA computer and gaining control of the
         computer
        Hacked into an interstate and foreign commerce
         website owned by Zebra Marketing Online
         Services
        Purposely caused an interference in the US
         Government communication system causing
         messages to be transmitted very slowly
     • Was sentences to 10yrs in prison along with a
       $250,000 fine
FNC Products
FNC Bushwhacker Program
Have you ever been hacked? Have you been a victim of Identity
Theft? Has your computer ever been infected with a
virus, malware, or spyware? Do you know who is reading your
personal information, spying on your cell phone conversations and
text messages? The Internet is a fantastic tool that we all have come
to rely on for a vast variety of needs but the Internet is a cesspool of
cyber-crime and hackers bent on evil intent. From child predators
that prey on kids in chat rooms to corporate espionage where
corporate secrets are pilfered and sold for sizeable profits, cyber-
crime is real and the cyber-criminals are very good at what they do.
How good are you at preventing them from practicing their evil
trade? The FNC Bushwhacker Program teaches you how to become
the hunter instead of the prey. It also teaches you how to block
cyber-criminals from accessing your personal information, protect
your children, and catch the bad guys when they attempt to make
you a victim. Everyone should become a student of the FNC
Bushwhacker program. It is that important! FNC Bushwhacker
Program comes in two parts. The second part is called the FNC
Bushwhacker PLUS Program is an in depth course that makes you
literally bulletproof to cyber-crime of all types. It provides all of the
resources you need to become an “amateur internet sleuth” and this
is a must instructional experience.
FNC Products-cont
FNC Corporate Protect
From denial-of-service and web page defacements, to information theft that can
cost your company millions of dollars, the motives and scope of attack may
vary but the solution is the same. Understand the threat and implement
appropriate countermeasures. FNC Corporate Protect is a 1-day workshop
designed to create security awareness and give business owners the unique
skills required to protect the information assets of their organization. In this
workshop you will learn what hackers know. You will learn what they can
do, how they do it, and most importantly, how you can minimize or eliminate
your vulnerabilities to these threats and attacks. The premise of the FNC
Corporate Protect is simple: you need to understand the threats to your
business; you need to know what you can do to eliminate your vulnerabilities.
As each exploit technique is taught, you will perform the task individually and
then you will implement and test an appropriate countermeasure.
FNC Products-cont
Corporate Protect – cont

Areas covered in FNC Corporate Protect include:
 • Network footprinting, port scanning, and enumeration techniques
 • Specific operating system vulnerabilities
 • Web server vulnerabilities
 • Application level exploits, worms, viruses and Trojans
 • Network vulnerabilities, sniffing, wireless sniffing, IP spoofing, and
PPTP/VPN breaking

Two other critical areas presented in FNC Corporate Protect are Intrusion
Detection and Incident Response. As the names imply, these two areas
address the tools techniques designed to give you the advantage of being
prepared to deal with hacks if and when they occur. Being able to detect a hack
and having a response plan in place will greatly improve your security
awareness and further reduce your vulnerability. This course is delivered by
ForensicsNation’s senior practicing security consultants, who bring real world
experience to the classroom.
FNC Products-cont
Personal Protect
Workshop Contents
•Antirootkit
•Antivirus Scans
•Antivirus Programs
•Backup Utilities
•Cloud-Enhanced Whitelisting (Cloud-Powered Reputation)
•Disk Encryption
•Gamer Mode
•Host-Based Intrusion Prevention System (HIPS)
•Internet Browsers
•Internet Security Training
•Password Managers
•Removable Media Control
•Secure hard Drive Wiping
•Software Firewalls
•Spyware Detection and Removal
•Spyware Prevention
•System Optimization and Privacy Cleaning Tools
•Virtualization Techniques
•Vulnerability Scanners
•Vulnerability and Protection Techniques for Microsoft Office , PC
Technician, Networking, Security, Web Design, Graphic Design, Data
Management, Programming and Accounting
FNC Products-cont
Personal Protect - cont

FNC Personal Protect is for families and individuals that want to secure their
personal computers from hackers and intrusions of all kinds.

It also teaches you how to protect your cell phone from spyware and secure all
of your personal and financial information.

Social Networking on sites such as Facebook and twitter open up
vulnerabilities for hackers to access personal information.

FNC Personal Protect teaches how to secure these networks and protect
yourself from hackers.

FNC Personal Protect provides you with a free online encrypted chat room that
hackers cannot access. Now you can chat online feeling secure and safe.
FNC Corporate Protect is a 1-day workshop designed to create personal
computer security awareness.
FNC Products-cont
Pinpoint Protect Child Watch

Our children are our most valuable asset and yet very little are done to protect
them from cyber-predators and criminal elements. Not a day goes by that
ForensicsNation is not working on a child predator investigation and the trending
tells us it is getting worse.

Cyber-predators truly believe that they can remain invisible as they prey on kids
and this is where they are very WRONG! ForensicsNation has caught some of
the most notorious child predators. Read “The Confessions of a Child Predator:
http://www.amazon.com/dp/B007BB97KU

Pinpoint Protect Child Watch combines GPS technology along with the
prevention techniques of ForensicsNation and acts as an electronic babysitter.
FNC Products-cont
Pinpoint Protect Guardian

A good many people have jobs and professions that pose
certain risks. From workers that work alone in remote
environments to professions dealing in money and
valuables such as jewelry, etc; ForensicsNation’ Pinpoint
Protect Guardian Program provides protection where and
when you need it most.

But we take it another step further…for individuals that
hunt in remote wilderness locations, travelers to remote or
dangerous areas of the world, college students away from
home for the first time; ForensicsNation’s Pinpoint Protect
Guardian Program provides protection and much more.
Corporate Mailing Address:
546 South Main Street
Lock Box 304
Cedar City, Utah 84720
435-249-5600
435-867-1988 Fax
support@neternatives.com
http://ForensicsNation.com

Más contenido relacionado

La actualidad más candente (20)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009Cyber Crime Evidence Collection Ifsa 2009
Cyber Crime Evidence Collection Ifsa 2009
 
History of intermet ppt uls
History of intermet ppt ulsHistory of intermet ppt uls
History of intermet ppt uls
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Security Threats
Security ThreatsSecurity Threats
Security Threats
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Internet basics
Internet basicsInternet basics
Internet basics
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
EDUCATIONAL TECHNOLOGY 1
EDUCATIONAL TECHNOLOGY 1EDUCATIONAL TECHNOLOGY 1
EDUCATIONAL TECHNOLOGY 1
 
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
Legal, Ethical and Societal Issues in Media and Information - Media and Infor...
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Internet Applications
Internet ApplicationsInternet Applications
Internet Applications
 
Hacking
HackingHacking
Hacking
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 

Destacado

Red Sea Life under water
Red Sea Life under waterRed Sea Life under water
Red Sea Life under waterBlogger
 
Tsahim sudalgaa найз нөхөд сараа
Tsahim sudalgaa найз нөхөд сарааTsahim sudalgaa найз нөхөд сараа
Tsahim sudalgaa найз нөхөд сарааnaranbatsarantuya
 
пивень катя
пивень катяпивень катя
пивень катя137nvk
 
Inleiding birdie leadership nederlands
Inleiding birdie leadership nederlandsInleiding birdie leadership nederlands
Inleiding birdie leadership nederlandsrudifrancken18
 
ขมิ้นชัน+..
ขมิ้นชัน+..ขมิ้นชัน+..
ขมิ้นชัน+..preeyanuch2
 
Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...
Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...
Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...Nordic Agency AB
 
Presentation on IDJSR in 2nd Virtual World congress of Dental Students
Presentation on IDJSR in 2nd Virtual World congress of Dental StudentsPresentation on IDJSR in 2nd Virtual World congress of Dental Students
Presentation on IDJSR in 2nd Virtual World congress of Dental StudentsIDJSR
 
可计算性,以及生命、宇宙和一切的答案
可计算性,以及生命、宇宙和一切的答案可计算性,以及生命、宇宙和一切的答案
可计算性,以及生命、宇宙和一切的答案gigix1980
 
Sát thủ đầu mưng mủ
Sát thủ đầu mưng mủSát thủ đầu mưng mủ
Sát thủ đầu mưng mủJUN Production
 
Ryan robinson city demographer presentation
Ryan robinson city demographer presentationRyan robinson city demographer presentation
Ryan robinson city demographer presentationGreenlights
 
Ochrona praw autorskich w internecie
Ochrona praw autorskich w internecieOchrona praw autorskich w internecie
Ochrona praw autorskich w internecieevribadi
 
3 5常見的鹽
3 5常見的鹽3 5常見的鹽
3 5常見的鹽leearain
 

Destacado (20)

CCskolanPechaKucha
CCskolanPechaKuchaCCskolanPechaKucha
CCskolanPechaKucha
 
Red Sea Life under water
Red Sea Life under waterRed Sea Life under water
Red Sea Life under water
 
Tsahim sudalgaa найз нөхөд сараа
Tsahim sudalgaa найз нөхөд сарааTsahim sudalgaa найз нөхөд сараа
Tsahim sudalgaa найз нөхөд сараа
 
Hipi jenifer
Hipi jeniferHipi jenifer
Hipi jenifer
 
La amistad
La amistadLa amistad
La amistad
 
пивень катя
пивень катяпивень катя
пивень катя
 
Inleiding birdie leadership nederlands
Inleiding birdie leadership nederlandsInleiding birdie leadership nederlands
Inleiding birdie leadership nederlands
 
Einas
EinasEinas
Einas
 
ขมิ้นชัน+..
ขมิ้นชัน+..ขมิ้นชัน+..
ขมิ้นชัน+..
 
Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...
Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...
Influence: пойдем со мной к звездам: как вовлекать других людей в свою Вселен...
 
A viajar![1]2-AM&A
A viajar![1]2-AM&AA viajar![1]2-AM&A
A viajar![1]2-AM&A
 
Presentation on IDJSR in 2nd Virtual World congress of Dental Students
Presentation on IDJSR in 2nd Virtual World congress of Dental StudentsPresentation on IDJSR in 2nd Virtual World congress of Dental Students
Presentation on IDJSR in 2nd Virtual World congress of Dental Students
 
可计算性,以及生命、宇宙和一切的答案
可计算性,以及生命、宇宙和一切的答案可计算性,以及生命、宇宙和一切的答案
可计算性,以及生命、宇宙和一切的答案
 
Wawasan 2020
Wawasan 2020Wawasan 2020
Wawasan 2020
 
Sát thủ đầu mưng mủ
Sát thủ đầu mưng mủSát thủ đầu mưng mủ
Sát thủ đầu mưng mủ
 
Ryan robinson city demographer presentation
Ryan robinson city demographer presentationRyan robinson city demographer presentation
Ryan robinson city demographer presentation
 
Ochrona praw autorskich w internecie
Ochrona praw autorskich w internecieOchrona praw autorskich w internecie
Ochrona praw autorskich w internecie
 
出版学会プレゼンアップ用
出版学会プレゼンアップ用出版学会プレゼンアップ用
出版学会プレゼンアップ用
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
3 5常見的鹽
3 5常見的鹽3 5常見的鹽
3 5常見的鹽
 

Similar a FNC Forensics Overview

Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crimejuliakad84
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptxChapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptxborith10b
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web TechnologyAashish Jain
 
Internet
InternetInternet
InternetNICT
 
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptxLesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptxArnoldoCimafranca2
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyDr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyDr. Jayarama Reddy
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpointcarlyxxjo55
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
Internet and Its Services - what kind of service do access thru the Internet
Internet and Its Services - what kind of service do access thru the InternetInternet and Its Services - what kind of service do access thru the Internet
Internet and Its Services - what kind of service do access thru the InternetKriz Motlhala
 
ICT....(Muskan Rasool)
ICT....(Muskan Rasool)ICT....(Muskan Rasool)
ICT....(Muskan Rasool)MUSKII123
 
Internet tech & web prog. p1,2,3-ver1
Internet tech & web prog.  p1,2,3-ver1Internet tech & web prog.  p1,2,3-ver1
Internet tech & web prog. p1,2,3-ver1Taymoor Nazmy
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 

Similar a FNC Forensics Overview (20)

Internet
InternetInternet
Internet
 
Software. intranet. e crime
Software. intranet. e crimeSoftware. intranet. e crime
Software. intranet. e crime
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptxChapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
Chapter2_2018 The Internet, the Web, and Electronic Commerce.pptx
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to Web Technology
Introduction to Web TechnologyIntroduction to Web Technology
Introduction to Web Technology
 
Internet
InternetInternet
Internet
 
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptxLesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
Lesson 2- Online Systems,Platforms, Online Security, Ethics.pptx
 
Computer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama ReddyComputer networking Dr. Jayarama Reddy
Computer networking Dr. Jayarama Reddy
 
Computer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama ReddyComputer networking by Dr. Jayarama Reddy
Computer networking by Dr. Jayarama Reddy
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
Internet and Its Services - what kind of service do access thru the Internet
Internet and Its Services - what kind of service do access thru the InternetInternet and Its Services - what kind of service do access thru the Internet
Internet and Its Services - what kind of service do access thru the Internet
 
Internet
InternetInternet
Internet
 
ICT....(Muskan Rasool)
ICT....(Muskan Rasool)ICT....(Muskan Rasool)
ICT....(Muskan Rasool)
 
Internet tech & web prog. p1,2,3-ver1
Internet tech & web prog.  p1,2,3-ver1Internet tech & web prog.  p1,2,3-ver1
Internet tech & web prog. p1,2,3-ver1
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 

Más de forensicsnation

Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshopforensicsnation
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)forensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
06.understanding you workshop
06.understanding you workshop06.understanding you workshop
06.understanding you workshopforensicsnation
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
07.the power of observation workshop
07.the power of observation workshop07.the power of observation workshop
07.the power of observation workshopforensicsnation
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) newforensicsnation
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview newforensicsnation
 
08.body language workshop
08.body language workshop08.body language workshop
08.body language workshopforensicsnation
 

Más de forensicsnation (12)

Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
FNC Personal Protect Workshop
FNC Personal Protect WorkshopFNC Personal Protect Workshop
FNC Personal Protect Workshop
 
FNC Free Seminar (public)
FNC Free Seminar (public)FNC Free Seminar (public)
FNC Free Seminar (public)
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
06.understanding you workshop
06.understanding you workshop06.understanding you workshop
06.understanding you workshop
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
07.the power of observation workshop
07.the power of observation workshop07.the power of observation workshop
07.the power of observation workshop
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
01.fnc free seminar (public) new
01.fnc free seminar (public) new01.fnc free seminar (public) new
01.fnc free seminar (public) new
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
 
08.body language workshop
08.body language workshop08.body language workshop
08.body language workshop
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

FNC Forensics Overview

  • 2.  Bush  Vannevar Bush: wanted to use technology to create an automated library system that he described as “memex”  Norbert Wiener: invented the field of cybernetics which would inspire advances in the use of technology to advance human lives  Marshall McLuhan: had the idea to make a global village interconnected by and Weiner electronic nervous system  McLuhan
  • 3. Began with launch of Sputnik in USSR  President Eisenhower wanted to bring US back to arms race lead created the Advanced Research Project Agency (ARPA)  Second head: Lawrence Robert • Wanted to build network system • Used idea of packet switching developed by Paul Baran at RAND • 1969: Created a special computer called the Interface Message Processor which could used the ARPANET (first internet)
  • 4. First ARPANET protocol was Network Control Program • Later Replaced by Internet Protocol (IP)  When ARPANET retired in 1990, it was transferred to the National Science Foundations NSFNET • Connected with research facilities in Europe • Established what is today’s internet
  • 5. Most common used through the World Wide Web (WWW) • A Database in the form of WebPages that can be search through web browsers  Contain URL’s or Uniform Resource Locators used to located different WebPages on the WWW  Uses Hypertext in order to quickly navigate from on WebPage to another • A hypertext is a link to another Webpage • Term was coined by Ted Nelson in his book “Literary Machines”
  • 6. The World Wide Web is made public through Internet Service Providers (ISP) • Company that provides internet services (web browsers) • Ex: Internet Explorer, Mozilla Firefox  ISP use IP Addresses to locate and transmit information located on the Internet
  • 7. A code that defines where a certain piece of information is located on the internet when using an ISP • Usually four sets of numbers separated by a “.” • Numbers can range from 0- 255 an example of an IP address would be 78.125.0.209
  • 8.  Domains are ways to locate IP addresses without needing to know the IP address itself  This is done by giving a name to a specific Webpage in order to locate it • Ex: www.bxscience.edu  Make browsing the internet a lot more convenient and quicker  Domains are split into 3 levels
  • 9. Top-level includes the end of the web address • www.bxscience.edu  There are many top-level domains in a web address • .com- for commercial purpose • .edu- from educational institutions • .gov- provided by the government • .org- provided by a nonprofit organization
  • 10.  The second level of a domain includes the middle portion along with the end portion of the web address • www.bxscience.edu  The third level of a domain includes the who web address • www.bxscience.edu
  • 11. A software program that searches the internet for information though the use of key words  Popular Search engines include • www.google.com • www.yahoo.com  Search engines can be used to learn more about the different fields of forensic science
  • 12. Currently the most popular service on the internet  Works similar to conventional mail except a lot faster  An email is transmitted using an email address • An email address includes a name, word, or phrase that identifies who the email is being sent to followed by an “@” along with the internet webpage address that provides the email service • Ex: name/word/phrase@bxscience.edu  Makes forensic scientist communicate and exchange information a lot faster
  • 13. The analysis of events on the internet that can be used to solve a crime  Analyze recent activity on the internet even if the internet history has been deleted  This is done through Windows Sap Files • Data created while on the internet and deleted when getting offline • Deleted data is stored in an erased file on the computer
  • 14. Forensic Scientist locate and analyze the deleted data on the internet from these files  Also look at recent emails and bookmarks for possible evidence for the crime
  • 15.  Hacking is the unauthorized intrusion of computers and the internet  It is considered to be a felony in the United States  Hackers are able to do what ever they please on the internet as long as the computer they hack remains online  Forensic Scientists track hackers by finding their IP addresses
  • 16. Today you can’t go on the internet without a hacker trying to enter your computer  Special software be used to prevent Hacking • Firewalls • Antivirus  Firewalls follow you where ever you go on the internet • A firewall is a program that separates secure and un secure areas on the internet to prevent hackers from intruding your computer while on the internet
  • 17. Antivirus • Prevent virus’ that hackers attempt to spread from reaching your computer • A computer virus is a program that can multiply itself in another computer and cause damage to the computer’s memory and other data
  • 18. Network Security Audit Ensure that your network conforms to industry best practices. A network security audit will identify holes and vulnerabilities, and provide remedy against exploitation. A network security audit includes assessment and remedy for: Network Infrastructure Public Footprint Perimeter Devices and Policies Remote Access Wireless Connectivity Servers, Workstations & Mobile Devices Domain Policies and Data Policies Audit Measures Backup Emergency Response & Disaster Recovery Information Handling
  • 19. Corporate Forensics •HR & Employee Relations Investigations •Incident Reporting Software •Compliance Investigations •Insurance Fraud Investigations •Corporate Security Investigations •Ethics Investigations •Privacy Investigations
  • 20. US v. Miller • 45 year old man named Mark Wayne Miller • Chatted with underage girls through the internet under an assumed name and photo of a random young male • Convinced many of these girls to allow him to engage in sexually explicit content while he recorded through a webcam • He then sold the footage • Girl sends love note to address he had used during chats • Address was from old job that knew where Miller was living • Investigators inspect the content of Millers internet visits on his computer and discover his actions • Arrested and sentences to 35 years to life in prison
  • 21. US v. Heckenkamp • Discovered for hacking and damaging the computers of several high-tech companies by Jerome T. Heckenkamp • Had gain unauthorized access to EBay, Qualcomm, Exodus Communications, Juniper Networks, Lycos, and Cygnus Solutions computers • Investigated by FBI Computer Intrusion Squad and Computer Hacking and Intellectual Property Unit in US Attorney Office in Northern District of California • Led a warranted search of Heckenkamp’s computer taking a copy of his hard drive • Discovered recent activities and hackings that he had done on the internet • Sentenced to 8 months in prison and 8 months of electronic monitoring
  • 22. US v. Iffih • Hacked several computers including those controlled by NASA • Investigators found a full trail of all his hackings when inspecting his computer • Charged for three counts  Intercepting login names and passwords of a NASA computer and gaining control of the computer  Hacked into an interstate and foreign commerce website owned by Zebra Marketing Online Services  Purposely caused an interference in the US Government communication system causing messages to be transmitted very slowly • Was sentences to 10yrs in prison along with a $250,000 fine
  • 23. FNC Products FNC Bushwhacker Program Have you ever been hacked? Have you been a victim of Identity Theft? Has your computer ever been infected with a virus, malware, or spyware? Do you know who is reading your personal information, spying on your cell phone conversations and text messages? The Internet is a fantastic tool that we all have come to rely on for a vast variety of needs but the Internet is a cesspool of cyber-crime and hackers bent on evil intent. From child predators that prey on kids in chat rooms to corporate espionage where corporate secrets are pilfered and sold for sizeable profits, cyber- crime is real and the cyber-criminals are very good at what they do. How good are you at preventing them from practicing their evil trade? The FNC Bushwhacker Program teaches you how to become the hunter instead of the prey. It also teaches you how to block cyber-criminals from accessing your personal information, protect your children, and catch the bad guys when they attempt to make you a victim. Everyone should become a student of the FNC Bushwhacker program. It is that important! FNC Bushwhacker Program comes in two parts. The second part is called the FNC Bushwhacker PLUS Program is an in depth course that makes you literally bulletproof to cyber-crime of all types. It provides all of the resources you need to become an “amateur internet sleuth” and this is a must instructional experience.
  • 24. FNC Products-cont FNC Corporate Protect From denial-of-service and web page defacements, to information theft that can cost your company millions of dollars, the motives and scope of attack may vary but the solution is the same. Understand the threat and implement appropriate countermeasures. FNC Corporate Protect is a 1-day workshop designed to create security awareness and give business owners the unique skills required to protect the information assets of their organization. In this workshop you will learn what hackers know. You will learn what they can do, how they do it, and most importantly, how you can minimize or eliminate your vulnerabilities to these threats and attacks. The premise of the FNC Corporate Protect is simple: you need to understand the threats to your business; you need to know what you can do to eliminate your vulnerabilities. As each exploit technique is taught, you will perform the task individually and then you will implement and test an appropriate countermeasure.
  • 25. FNC Products-cont Corporate Protect – cont Areas covered in FNC Corporate Protect include: • Network footprinting, port scanning, and enumeration techniques • Specific operating system vulnerabilities • Web server vulnerabilities • Application level exploits, worms, viruses and Trojans • Network vulnerabilities, sniffing, wireless sniffing, IP spoofing, and PPTP/VPN breaking Two other critical areas presented in FNC Corporate Protect are Intrusion Detection and Incident Response. As the names imply, these two areas address the tools techniques designed to give you the advantage of being prepared to deal with hacks if and when they occur. Being able to detect a hack and having a response plan in place will greatly improve your security awareness and further reduce your vulnerability. This course is delivered by ForensicsNation’s senior practicing security consultants, who bring real world experience to the classroom.
  • 26. FNC Products-cont Personal Protect Workshop Contents •Antirootkit •Antivirus Scans •Antivirus Programs •Backup Utilities •Cloud-Enhanced Whitelisting (Cloud-Powered Reputation) •Disk Encryption •Gamer Mode •Host-Based Intrusion Prevention System (HIPS) •Internet Browsers •Internet Security Training •Password Managers •Removable Media Control •Secure hard Drive Wiping •Software Firewalls •Spyware Detection and Removal •Spyware Prevention •System Optimization and Privacy Cleaning Tools •Virtualization Techniques •Vulnerability Scanners •Vulnerability and Protection Techniques for Microsoft Office , PC Technician, Networking, Security, Web Design, Graphic Design, Data Management, Programming and Accounting
  • 27. FNC Products-cont Personal Protect - cont FNC Personal Protect is for families and individuals that want to secure their personal computers from hackers and intrusions of all kinds. It also teaches you how to protect your cell phone from spyware and secure all of your personal and financial information. Social Networking on sites such as Facebook and twitter open up vulnerabilities for hackers to access personal information. FNC Personal Protect teaches how to secure these networks and protect yourself from hackers. FNC Personal Protect provides you with a free online encrypted chat room that hackers cannot access. Now you can chat online feeling secure and safe. FNC Corporate Protect is a 1-day workshop designed to create personal computer security awareness.
  • 28. FNC Products-cont Pinpoint Protect Child Watch Our children are our most valuable asset and yet very little are done to protect them from cyber-predators and criminal elements. Not a day goes by that ForensicsNation is not working on a child predator investigation and the trending tells us it is getting worse. Cyber-predators truly believe that they can remain invisible as they prey on kids and this is where they are very WRONG! ForensicsNation has caught some of the most notorious child predators. Read “The Confessions of a Child Predator: http://www.amazon.com/dp/B007BB97KU Pinpoint Protect Child Watch combines GPS technology along with the prevention techniques of ForensicsNation and acts as an electronic babysitter.
  • 29. FNC Products-cont Pinpoint Protect Guardian A good many people have jobs and professions that pose certain risks. From workers that work alone in remote environments to professions dealing in money and valuables such as jewelry, etc; ForensicsNation’ Pinpoint Protect Guardian Program provides protection where and when you need it most. But we take it another step further…for individuals that hunt in remote wilderness locations, travelers to remote or dangerous areas of the world, college students away from home for the first time; ForensicsNation’s Pinpoint Protect Guardian Program provides protection and much more.
  • 30. Corporate Mailing Address: 546 South Main Street Lock Box 304 Cedar City, Utah 84720 435-249-5600 435-867-1988 Fax support@neternatives.com http://ForensicsNation.com