LP Police - Investigative Database - Criminal Records - Skip Tracing - Law Enforcement from LP Police

"Catch the Bad Guys"

Police License Plate Readers Spark Privacy Concerns Nationwide

Traffic Ticket - Police License Plate Reading Technology

License plate-reading devices fuel privacy debate Technology helps police respond to crimes, violations, but broad use, lack of regulations raise privacy worries. Article Courtesy of:  The Boston Globe Automated License Plate Recognition Video CHELSEA — The high-speed cameras mounted on Sergeant Robert Griffin’s cruiser trigger a beeping alarm every time they read another license plate, automatically checking to see if each car is unregistered, uninsured, or stolen. In a single hour of near-constant beeps, Griffin runs 786 plates on parked cars without lifting a finger. The plate-reading cameras were introduced for police use in Massachusetts in 2008, and quickly proved their worth. The one on … [Read more...]

Help Solve This Tough Case “Any Ideas?”

Investigative Database - Top Stolen Cars

Police admit they're 'stumped' by mystery car thefts  Jeff Rossen and Josh Davis | Article Courtesy of:  TODAY There's a new wave of auto thefts that police can't figure out. So could you be at risk? TODAY National Investigative Correspondent Jeff Rossen looked into it. This is a real mystery. You think when you lock your car and set the alarm, your car is pretty safe. But criminals have designed a new high-tech gadget giving them full access to your car. It's so easy, it's like the criminals have your actual door remote. Police are so baffled they want to see if you can help crack the case. A Long Beach, Calif., surveillance video shows a thief approaching a locked SUV in a driveway. … [Read more...]

Network Vulnerabilities Continue to Worry Security Experts

Network Security - Investigative Database

Irrational' hackers are growing U.S. security fear Article Courtesy of:  Jim Finkle | Reuters (Reuters) - Cybersecurity researcher HD Moore discovered he could use the Internet to access the controls of some 30 pipeline sensors around the country that were not password protected. A hacking expert who helps companies uncover network vulnerabilities, Moore said he found the sensors last month while analyzing information in huge, publicly available databases of Internet-connected devices. "We know that systems are exposed and vulnerable. We don't know what the impact would be if somebody actually tried to exploit them," said Moore, chief research officer at the security firm Rapid7. U.S. … [Read more...]

Cyber Attacks – “Greater Concern than Terrorism”

Cyber Security and Cyber Terrorism

Cybersecurity Starts in High School with Tomorrow’s Hires By Sandrine Rastello & Jeanna Smialek | Article Courtesy of:  Bloomberg Sean Gallup/Getty Images Security breaches experienced by institutions ranging from Facebook Inc. to the Federal Reserve are spurring spending on cybersecurity. Five dozen teenagers hunched over computers in a hotel conference room near Washington, decrypting codes, cleaning malware and fending off network intrusions to score points in the finals of a national cybersecurity contest. A participant in last year’s CyberPatriot contest earned certifications and went from high-school to a job paying $62,000 said Bernie Skoch, the commissioner for the … [Read more...]

Online & Offline Criminal Activities Target Vulnerable Consumer Data

Cyber Security - Identity Theft - Investigative Database

Criminals target the data merchants hold Retailers and restaurants accounted for 24% of compromised data last year, a new study says. Article Courtesy of:  Paul Demery - Chief Technology Editor Retailers face numerous threats to confidential consumer data that criminals can use for online and offline criminal activities, Verizon Enterprise Solutions says in a new report compiled from dozens of international sources. The study notes that 24% of the 621 breaches—which include criminals using various hacking techniques, malicious software downloaded via e-mail and accessing networks with log-in credentials stolen from authorized network users—last year affected multi-channel retailers and … [Read more...]

Big Data & the Boston Marathon Probe

FBI - Investigative Database

Extracting Key Investigative Data from the "Noise" Over Ten Terabytes of Data did not overwhelm federal, local and state investigators.   What follows is a fascinating story involving advanced data access, tracking and retrieval technologies.  Boston probe's big data use hints at the future By Frank Konkel - Article Courtesy of:  FCW Less than 24 hours after two explosions killed three people and injured dozens more at the April 15 Boston Marathon, the Federal Bureau of Investigation had compiled 10 terabytes of data in hopes of finding needles in haystacks of information that might lead to the suspects. The tensest part of the ongoing investigation – the death of one suspect and the capture … [Read more...]

Former “Alien” Apple Employee & Talented Code Breaker Slides over to Rival Google

Nicholas Allegra Google

iPhone Super-Hacker Comex, Let Go From Apple, Goes To Work For Google Article Courtesy of:  Forbes If Apple couldn’t appreciate one of the most talented hackers to ever touch its products, perhaps its biggest competitor can. Nicholas Allegra, a.k.a. Comex, who rose to fame as the 19-year-old creator of the JailbreakMe hacking tools for iPhone and iPad before being hired by Apple, has found a new home: Google. “In other news, I’m going to intern for Google in a few weeks,” Allegra wrote on Twitter Tuesday night. He didn’t immediately respond to my request for more information about what he’ll be doing at Google. But he added on Twitter that he won’t be working on Android, an operating … [Read more...]

IP Blocking Protection is enabled by IP Address Blocker from LionScripts.com.