HomeNews - McAfee Institute

Magazine archive
https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/crimesceneistock000020049073bradcalkins-1200x720.jpg

There are several things that law enforcement must do before diving into an investigation of a crime scene.  There are checklists and a matter of waiting for the proper people to show up to the scene of the crime.  If the crime scene is secure investigators can then go in and begin the investigative process and fill out the proper documents based upon what is observed at the crime scene. A crime scene checklist is...

https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/Law-Firms-Provide-Many-Services-to-the-Area-1280x720.jpg

When someone is arrested, there is a lot of legal fundamentals that go on in the background to ensure that the individual gets the proper fair trial that they are entitled too.  Many times, these cases will start in the state or district courts, and depending on the situation, they can build up to the supreme court, which is the highest level of the judicial system.  The supreme court will only take a certain number...

https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/key-1280x720.jpg

Encrypting passwords or text is a very complicated and confusing process to understand.  There are many steps and technical terms that it goes through to reach one of the three encryption standards.  Whether it is SHA-1, SHA-256, MD-5; they can all protect the privacy of the text that you are trying to keep from the public view. Encryption depending on the level can be complicated to decrypt and is what makes it such an effective...

https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/law-1280x720.jpg

Whenever there is criminal activity associated with a specific currency or individual items that may be sold for criminal intent or involved in a crime, the government allows for a seizure of the money or items.  These days the most of asset seizures that occur are civil based and not criminal based seizures.  If a seizure occurs civilly, then the government can then use the information from the object to show that it was used...

https://blog.mcafeeinstitute.com/wp-content/uploads/2018/08/1518427879_14ba13e8f30051c177a40d929a160c58_прогнози-алткойни-1280x720.jpg

Wallets, as we know them, are kept in our pockets filled with cash and credit/debit cards; but now we may not have a physical wallet for too much longer.  For all of the cryptocurrency that is available these days, we are going to need somewhere to store this currency.  Even though this currency isn’t physical money, there is still a need for a place to put it and claim that it is ours. Virtual wallets...

https://blog.mcafeeinstitute.com/wp-content/uploads/2016/01/online-dating-scam.jpg

There are several different internet sites on the dark web that allow criminals to purchase anything from drugs to hitman.  To access these sites, you must enter the realm of the dark web.  To do so, using a tor browser along with a VPN will completely conceal the identity of the computer that is accessing the dark web.  These are the two primary tools that criminals and you should use if you are trying to...

https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/police-interrogation-room-movie-set-1280x720.jpg

This is very similar to conducting an investigation, but a little more information is necessary to get out of the subject to possibly gather some of this confusing intel.  The intel needed is confusing, because there is so much of it and is relatively complicated to someone who does not know what it is that they are looking for. The first thing to remember is when you are asking questions to the subject remember to...

https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/mist2-1280x720.jpg

When a bitcoin purchase or trade is made, there are slight amounts of the information left behind that can lead investigators to the owner of the virtual currencies.  When you start looking deeper into this information, then you have the chance at finding the address and tracking down where the money is headed. One tool that you can use is bitcoin block explorer which summed up is a bitcoin tracker.  You insert the unparsed address,...

https://blog.mcafeeinstitute.com/wp-content/uploads/2019/06/mist-3-1280x720.jpg

There are different websites online that record all the bitcoin transactions that are occurring at any given moment in time.  If you can figure out the exact time and location of a sale, this can very easily lead you to the potential person making the transaction.  Every once in a while, though the people performing these transactions will attempt to hide their identity.  To do this, there are a few different tools that criminals will...