LabCode|8| : Identity Fraud

Identity fraud may occur when someone steals personal information, opens credit card accounts in the victim's name without permission, and charges merchandise to those accounts. Conversely, identity fraud does not occur when a credit card is simply stolen. Stealing one’s credit card may be consumer fraud, but is not identity fraud. Identity fraud is a synonym of unlawful identity change. It indicates unlawful activities that use the identity of another person or of a non-existing person as a principal tool for merchandise procurement.
Protect yourself against identity fraud
Don’t throw out anything with your name, address or financial details without shredding it first.
If you receive an unsolicited email or phone call from what appears to be your bank or building society asking for your security details, never reveal your full password, login details or account numbers. Be aware that a bank will never ask for your PIN or for a whole security number or password.
If you are concerned about the source of a call, ask the caller to give you a main switchboard number for you to call them back on. Alternatively, hang up and call your bank back on the legitimate phone number printed on your bank statements.
Check your statements carefully and report anything suspicious to the bank or financial service provider concerned.
Don’t leave things like bills lying around for others to look at.
If you’re expecting a bank or credit card statement and it doesn’t arrive, tell your bank or credit card company.
If you move house, ask Royal Mail to redirect your post for at least a year.
It is particularly helpful to check your personal credit file 2-3 months after you have moved house.
What should you do if you’ve been a victim of identity fraud?
Act quickly – you mustn’t ignore the problem. Even though you didn’t order those goods or open that bank account, the bad debts will end up under your name and address.
If you believe you’re a victim of identity fraud involving plastic cards (e.g. credit and debit cards), online banking or cheques, you must report it to your bank as soon as possible. Your bank will then be responsible for investigating the issue and they will report any case of criminal activity to the police. The police will then record your case and decide whether to carry out follow-up investigations.
If you think you’re a victim of another kind of identity fraud, you must report the matter to the relevant organisation. Depending on their advice, you should then alert your local police force.
You should report all lost or stolen documents – such as passports, driving licences, plastic cards, cheque books – to the relevant organisation.
The credit reference agencies will contact lenders on your behalf where fraudulent applications have been made or fraudulent credit accounts opened in order to restore your credit history to its former state.

LabCode|7| : Identity theft

Identity theft happens when fraudsters access enough information about someone’s identity (such as their name, date of birth, current or previous addresses) to commit identity fraud. Identity theft can take place whether the fraud victim is alive or deceased.
If you’re a victim of identity theft, it can lead to fraud that can have a direct impact on your personal finances and could also make it difficult for you to obtain loans, credit cards or a mortgage until the matter is resolved.


Techniques for obtaining and exploiting       personal information for identity theft

Identity thieves typically obtain and exploit personally identifiable information about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. Examples include:
  • Rummaging through rubbish for personal information (dumpster diving)
  • Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized
  • Using public records about individual citizens, published in official registers such as electoral rolls
  • Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketing, housebreaking or mail theft
  • Common-knowledge questioning schemes that offer account verification and compromise: "What's your mother's maiden name?", "what was your first car model?", or "What was your first pet's name?", etc.
  • Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards
  • Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports
  • Observing users typing their login credentials, credit/calling card numbers etc. into IT equipment located in public places (shoulder surfing)
  • Stealing personal information from computers using breaches in browser security or malware such as Trojan horse keystroke logging programs or other forms of spyware
  • Hacking computer networks, systems and databases to obtain personal data, often in large quantities
  • Exploiting breaches that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers
  • Advertising bogus job offers in order to accumulate resumes and applications typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details
  • Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers' systems
  • Infiltrating organizations that store and process large amounts or particularly valuable personal information
  • Impersonating trusted organizations in emails, SMS text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form (phishing)
  • Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions
  • Obtaining castings of fingers for falsifying fingerprint identification.
  • Browsing social networking websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities
  • Diverting victims' email or post in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims' names
  • Using false pretenses to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights (pretexting)
  • Stealing cheques (checks) to acquire banking information, including account numbers and bank routing numbers
  • Guessing Social Security numbers by using information found on Internet social networks such as Facebook and MySpace
  • Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites.
  • Befriending strangers on social networks and taking advantage of their trust until private information are given.


    well now you know what to do to avoid Identity theft :) see you later

LabCode|6|: General packet radio service (GPRS)



General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM). GPRS was originally standardized by European Telecommunications Standards Institute (ETSI) in response to the earlier CDPD and i-mode packet-switched cellular technologies. It is now maintained by the 3rd Generation Partnership Project (3GPP).
The advantages of GPRS are as wide as your imagination takes you. Once activated the connectivity provides you 24X7 presence 365 days. The world is in your plams, just a click away.
  • Enables you to use internet any where you want
  • Connect it to your laptop or desktop
  • Stay connected even in remote areas.
  • Download your favourite games or ringtones on your cell phone and visit your favourite web sites.
  • Enables you to use all the internet applications
  • Offers you several new applications which were not available on GSM network
  • Ensures you better speed than GSM network
  • Enjoy a continuous wireless internet connection
  • Receive and send information as per your requirement.
  • Offers you flexibility as much as an internet on your PC

If you have to always stay connected, activate GPRS on your handset. Wherever you go take along whatever you need. You can carry your office and work conveniently by using GPRS. Once again the cell phone is evolving and emerging as the most important communication and connectivity tool. Activate GPRS today and keep in touch always.

I found that video talking about one of thise tools and explain its uses, it's a great video from
analyticalsurvival youtube channel where you can learn a lot about geolocation ,communication, and survival skills.


Remember, know how a tool work make it easy to use it as an evidence.   :) see you later




ActionCode|4| : What is an evidence?

In the next " Crime Scene Procedure" we will talk about the investigators roles, the word "evidence" will be used, so it will be better to define it first.
 

   Evidence is a piece of information that supports a conclusion. The classic example is from the law court: means, motive and opportunity. If the defendant had the means to commit the crime (say, owned a weapon to commit the murder), a motive or reason why he or she would want to commit the crime (would inherit $35,000,000 with the victim dead), and the opportunity to commit the crime (was alone with the victim when he died with the expectation of getting away undetected), and the evidence (there's that word again) proved the above, then it would be a reasonable conclusion that the defendant committed the crime. Of course, the court requires more evidence: for example, that the crime was committed with the weapon (which requires forensic and ballistic evidence), and that the defendant was the one that used the weapon beyond reasonable doubt. Nonetheless, the point is clear. For a conclusion to be acceptable as true, there must be evidence to support it.

Scots Law -wikipedia-
   An important part of the Law of evidence is that of corroboration in Scots law. This is a vital element of the law to protect the accused from unjustly being convicted. Each essential fact (facta probandum ) of a case must be corroborated by two independent pieces of evidence and one witness alone cannot corroborate an essential fact, it must be corroborated by a second independent source. Essential facts are those listed in the indictment and used to charge the accused and the sources of evidence come in many forms, such as documentary, DNA, forensic and report evidence or from a scientist or forensic pathologist.
   Corroboration will normally include direct evident, such as an eye witness and could include circumstantial evidence, which is evidence that has a relationship to the crime and can assist in 'proving' the essential fact also known as indirect evidence. Two pieces of indirect evidence which both relate to the same incident, may mean that direct evidence is not required, this is known as evidential facts and they do not require corroboration. The essential facts will vary with each case and the complainer is likely to lose, if an essential fact which is vital to their case cannot be proven.

if you want to read more about "evidence" check this article :  public.wsu.edu/~taflinge/evidence.html
                          ( it's old but well written :) )

You can support us by living a comment and following us on:

 twitter: twitter.com/AgentBida

 facebook: facebook.com/pages/Police-Code/805859146133739?ref=hl

ActionCode|3| : Crime Scene Procedure (part1: first step)

 In the police agent life, there is a lot of difficult moments where he needs to use everything he knows to react correctly and send a criminal to jail. Remember that the criminal's lawyer will be happy to find a problem in the procedure and win a new easy case (and make a lot of money and clients of course). So how the police agent must react to the discovery of new crime scene ??
 The agent need to understand that by approaching victims appropriately, officers will gain their trust and cooperation. Victims may then be more willing to provide detailed information about the crime to officers and later to investigators and prosecutors, which, in turn, will lead to the conviction of more criminals. Remember that you are there for the victim, the victim is not there for you.




 In this "Crime Scene Procedure" first part, we will talk about how a police agent must react to  fresh crime scene from the discovery to the arrival of investigators step by step.


1) Ask for medical assistance:
(sometimes when victims are lucky and had not been physically attacked or so traumatized the agent conduct them to police station and skipall these steps)
there are many cases:

first case:
If victim is alive and can communicate:in this case the agent need to establish a good contact with the victim when wating to the assistance arrival.The agent can help victims by understanding the three major needs they have after a crime has been committed: the need to feel safe; the need to express their emotions; and the need to know “what comes next” after their victimization. The information in this handbook is designed to show you how to meet these needs.  

  • Victims' Need To Feel Safe
    People often feel helpless, vulnerable, and frightened by the trauma of their victimization. As the first response officer, you can respond to victims' need to feel safe by following these guidelines:
  1.     Introduce yourself to victims by name and title. Briefly explain your role and purpose.
  2.     Reassure victims of their safety and your concern by paying close attention to your own words, posture, mannerisms, and tone of voice. Say to victims, “You're safe now” or “I'm here now.” Use body language to show concern, such as nodding your head, using natural eye contact, placing yourself at the victim's level rather than standing over seated victims, keeping an open stance rather than crossing your arms, and speaking in a calm, sympathetic voice.
  3.     Ask victims to tell you in just a sentence or two what happened. Ask if they have any physical injuries. Take care of their medical needs first.
  4.     Offer to contact a family member, friend, or crisis counselor for victims.
  5.     Ensure privacy during your interview. Conduct it in a place where victims feel secure.
  6.     Ask simple questions that allow victims to make decisions, assert themselves, and regain control over their lives. Examples: “Would you like anything to drink?”; “May I come inside and talk with you?”; and “How would you like me to address you, Ms. Jones?”
  7.     Assure victims of the confidentiality of their comments whenever possible.
  8.     Ask victims about any special concerns or needs they may have.
  9.     Provide a “safety net” for victims before leaving them. Make telephone calls and pull together personal or professional support for the victims. Give victims a pamphlet listing resources available for help or information. This pamphlet should include contact information for local crisis intervention centers and support groups; the prosecutor's office and the victim-witness assistance office; the State victim compensation/assistance office; and other nationwide services, including toll-free hotlines.
  10.     Give victim's—in writing—your name and information on how to reach you. Encourage them to contact you if they have any questions or if you can be of further help.
  • victims Need To Express Their Emotions
    Victims need to air their emotions and tell their story after the trauma of the crime. They need to have their feelings accepted and have their story heard by a non judgmental listener. In addition to fear, they may have feelings of self-blame, anger, shame, sadness, or denial. Their most common response is: “I don't believe this happened to me.” Emotional distress may surface in seemingly peculiar ways, such as laughter. Sometimes victims feel rage at the sudden, unpredictable, and uncontrollable threat to their safety or lives. This rage can even be directed at the people who are trying to help them, perhaps even at law enforcement officers for not arriving at the scene of the crime sooner. You can respond to victims' need to express their emotions by following these guidelines:
  1.     Avoid cutting off victims' expression of their emotions.
  2.     Notice victims' body language, such as their posture, facial expression, tone of voice, gestures, eye contact, and general appearance. This can help you understand and respond to what they are feeling as well as what they are saying.
  3.     Assure victims that their emotional reactions to the crime are not uncommon. Sympathize with the victims by saying things such as: “You've been through something very frightening. I'm sorry”; “What you' re feeling is completely normal”; and “This was a terrible crime. I'm sorry it happened to you.”
  4.     Counter any self-blame by victims by saying things such as, “You didn't do anything wrong. This was not your fault.”
  5.     Speak with victims as individuals. Do not just “take a report.” Sit down, take off your hat, and place your notepad aside momentarily. Ask victims how they are feeling now and listen.
  6.     Say to victims, “I want to hear the whole story, everything you can remember, even if you don't think it's important.”
  7.     Ask open-ended questions. Avoid questions that can be answered by “yes” or “no.” Ask questions such as “Can you tell me what happened?” or “Is there anything else you can tell me?”
  8.     Show that you are actively listening to victims through your facial expressions, body language, and comments such as “Take your time; I'm listening” and “We can take a break if you like. I'm in no hurry.”
  9.     Avoid interrupting victims while they are telling their story.
  10.     Repeat or rephrase what you think you heard the victims say. For example, “Let's see if I understood you correctly. Did you say. . .?”; “So, as I understand it, . . .”; or “Are you saying. . . ?”

  • Victims' Need To Know “What Comes Next” After Their Victimization
    Victims often have concerns about their role in the investigation of the crime and in the legal proceedings. They may also be concerned about issues such as media attention or payment for health care or property damage. You can help relieve some of their anxiety by telling victims what to expect in the aftermath of the crime. This will also help prepare them for upcoming stressful events and changes in their lives. You can respond to victims' need to know about what comes next after their victimization by following these guidelines:
  1.     Briefly explain law enforcement procedures for tasks such as the filing of your report, the investigation of the crime, and the arrest and arraignment of a suspect.
  2.     Tell victims about subsequent law enforcement interviews or other kinds of interviews they can expect.
  3.     Discuss the general nature of medical forensic examinations the victim will be asked to undergo and the importance of these examinations for law enforcement.
  4.     Explain what specific information from the crime report will be available to news organizations. Discuss the likelihood of the media releasing any of this information.
  5.     Counsel victims that lapses of concentration, memory losses, depression, and physical ailments are normal reactions for crime victims. Encourage them to reestablish their normal routines as quickly as possible to help speed their recovery.
  6.     Give victims a pamphlet listing resources available for help and information. This pamphlet should include contact information for local crisis intervention centers and support groups; the prosecutor's office and the victim-witness assistance office; the State victim compensation/assistance office; and other nationwide services, including toll-free hotlines.
  7.     Ask victims whether they have any questions. Encourage victims to contact you if you can be of further assistance.

second case:if victim can't communicate:

then the agent need check the signs of life: Look to see if the chest is rising and falling,Listen for breaths from the mouth and nose, Feel on your cheeks respiration's from the mouth and nose;If these are absent, there are no signs of life; check them for 10 seconds and if absent, immediately start Cardiopulmonary resuscitation (we will talk about CPR later)

2) Confirm or pronounce death (if the victim is dead)


3)Conduct a scene walk through  

4)Take steps to preserve and protect area :

 A possible scene of a crime must be treated with the utmost care so as to not contaminate or destroy evidence. The following minimum protocol will be adhered to in order to protect the scene of a crime:
  1.     establish a perimeter to protect the scene
  2.     evacuate non-involved persons
  3.     prevent unauthorized persons from entering the crime scene or contaminating any evidence
  4.     prevent any damage or further damage
  5.     maintain an accurate "scene log" to record the names and the times of everyone who enters and/or leaves the scene
  6.     for court purposes, record names and times of any individuals who enter the scene who do not have a bona fide requirement to do so and advise the Correctional Manager of this fact
  7.     maintain control of the scene until relieved by a designated officer or by police
  8.     when another officer arrives to assume control of the scene, verbally confirm this as a fact and record the time and the person’s name and rank.
5)Determine the lead investigator.

  Then normally after some questions the agent can live the crime scene, here the role of investigation group begin. we will talk about it later.


You can support us by living a comment and following us on:

 twitter: twitter.com/AgentBida

 facebook: facebook.com/pages/Police-Code/805859146133739?ref=hl

Labcode|5|: Blood Analysis (part 1: Detecting Blood)

The analysis of the properties and effects of serums (blood, semen, saliva, sweat, or fecal matter) is called serology. We'll concentrate here on the principal tests used to identify blood. According to Henry C. Lee, a forensics expert who has assisted law enforcement in over 6,000 major criminal investigations — including that of O. J. Simpson — blood evidence is found most often in "crimes of violence such as homicide, assault, and sexual assault." It may be in the form of fresh liquid, coagulated, dried, or as a small drop or stain, and each form involves a different method of preservation and collection.

In this LabCode article we will learn:
  • What is Blood? (hhh formalities)
  • How to detect blood (using Luminol)?
  • How to make Luminol using domestically chemicals?
  • Where you can buy it?

What is Blood?
Blood constitutes about eight percent of a person's weight (normally about five liters), and it circulates near the surface of the skin. Almost all trauma to the body, therefore, results in the shedding of blood. Its red color makes it readily apparent at crime scenes, and its residues are very difficult to completely remove. Blood residue has even been recovered from 100,000-year-old stone tools.

Laboratory testing can reveal whether a substance is indeed blood, whether the blood is of animal or human origin, and the blood group to which it belongs. This allows investigators to include or exclude persons as perpetrators or victims. The antigens that allow blood group testing, however, deteriorate with age or improper storage.The DNA contained in blood, on the other hand, is less subject to deterioration, and allows near-certain matching of blood residue to individuals with DNA profiling techniques.Through bloodstain pattern analysis, information about events can also be gained from the spatial distribution of bloodstains.
 liquid called plasma makes up about half of the content of blood. Plasma contains proteins that help blood to clot, transport substances through the blood, and perform other functions. Blood plasma also contains glucose and other dissolved nutrients.About half of blood volume is
composed of blood cells:
• Red blood cells, which carry oxygen to the tissues.
• White blood cells, which fight infections.
• Platelets, smaller cells that help blood to clot.

 

How to detect trace of blood?

The most used method is using the Luminol."Luminol (C8H7N3O2) is a versatile chemical that exhibits chemiluminescence, with a striking blue glow, when mixed with an appropriate oxidizing agent. Luminol is a white-to-pale-yellow crystalline solid that is soluble in most polar organic solvents but is insoluble in water.
Luminol is used by forensic investigators to detect trace amounts of blood left at crime scenes, as it reacts with iron found in hemoglobin. It is used by biologists in cellular assays for the detection of copper, iron, and cyanides, as well as of specific proteins by western blot.

Luminol can be sprayed evenly across the area, and trace amounts of an activating oxidant will cause the luminol to emit a blue glow that can be seen in a darkened room. The glow lasts for about 30 seconds, but the effect can be documented by a long-exposure photograph. It is important that the sprayi
ng be evenly applied to avoid a biased impression, such as blood traces appearing to be more concentrated in areas that received more spray. The intensity of the glow does not indicate the original amount present but indicates only the distribution of trace amounts of substances left in the area."-Wikipedia-

here is a video explaning how Luminol is used.



how to make Luminol?

here is a comlete guide to make Luminol using domestically chemicals:

and if you can't make it you can buy it, it is for sale in Amazon for 10$.
See you later :)




ActionCode|2|:The BOPE (SWAT:part 2)

"Batalhão de Operações Policiais Especiais (BOPE; Portuguese: [bataˈʎɐ̃w dʒi opeɾaˈsõjs poliˈsjajs ispeˈsjajs]; literally "Special Police Operations Battalion") is a special forces unit of the Military Police of Rio de Janeiro State in Brazil.
Due to the nature of crime in favelas, BOPE units have extensive experience in urban warfare as well as progression in confined and restricted environments. It also utilizes equipment deemed more powerful than traditional civilian law enforcement."-Wikipedia-


BOPE is composed of over 400 members and was created in 1978,it is believed to be one of the most efficient military forces in Latin America due to the nature of crime in favelas, BOPE units have extensive experience in urban warfare as well as progression in confined and restricted environments. It also utilizes equipment deemed more powerful than traditional civilian law enforcement.
   Specialized in aquatic missions, missions transported by helicopters, missions in jungle and mountain environments, and missions using explosives, the BOPE carries out combat missions on an almost daily basis, taking heavy fire from the drug dealers. The most dangerous movement in an urban offensive is that between positions, when the soldiers are exposed to snipers and to automatic-weapons fire while they are clearly visible among the streets and buildings.
    BOPE team members' duties include: performing hostage rescues and counter-terrorism operations; serving high risk arrest and search warrants; subduing barricaded suspects; and engaging heavily armed criminals. BOPE teams are often equipped with specialized firearms including submachine guns, assault rifles, breaching shotguns, riot control agents, stun grenades, and sniper rifles. They have specialized equipment including heavy body armor, ballistic shields, entry tools and advanced night vision optics.