Sunday, October 10, 2010

Australian Military Hit By Escalating Cyber Attacks

Australia's military is under siege from a rapidly increasing number of cyber attacks as alleged foreign spies try to break into the defence force's secure computer networks, a news report said Saturday.

The military's electronic espionage unit Defence Signals Directorate released figures to The Age newspaper showing the level of cyber attacks had soared from 200 a month last year to more than 700 a month this year. more

monstersandcritics.com




 
 
 
 
 
 
 
 
 
 
 
 
 
 
PJL 9th October 2010

Saturday, October 9, 2010

Iran Acknowledges Espionage at Nuclear Facilities

Iran acknowledged Saturday that some personnel at the country’s nuclear facilities were lured by promises of money to pass secrets to the West but insisted increased security and worker privileges have put a stop to the spying. more

dailycaller.com










PJL 9th October 2010

Learning Measure.com

Another training provider that is worth taking a look at for those that are interested in keeping their Engineering Courses for Continuing Education up to date is Learning Measure .com.

Those involved in Technical Surveillance Counter-Measure work combined with Electronic Security Consultancy, will find this training provider to be a valuable resource at $5 (US) per month or $60 (US) subscription fees annually.

LearningMeasure.com provides training and consulting services to businesses and individuals in several technical areas through their network of consultants.



PJL 9th October 2010

Thursday, October 7, 2010

Cryptome Hack Under Investigation

Whistleblowing site's founder claims attacker was retaliating against posting of sensitive documents.

Conflicting reports swirl continue to swirl around the identity of a hacker who broke into and defaced whistleblowing site Cryptome late last week. more


PJL 7th October 2010

Unclaimed Money & Superannuation Seeker

Another interesting online search is the unclaimed money and lost superannuation search using online tools that assist in tracking down your unclaimed money & superannuation funds.

There are businesses that specialise in searching for unclaimed money & lost superannuation for their clients and they mainly use the following web sites that I am going to show you.

If you are patient and have some online skills, you will certainly be in a good position to find your lost assets by processesing a claim for unclaimed money or lost superannuation.

There a few requirements when placing an application to claim your assets by providing identification. At some stage in the claiming process you may have to provide certified copies of a birth certificate, Medicare card, passport and even bank statements.

Please view the 2 web sites below from the text links that I recommend you should visit and commence searching for your unclaimed money and lost superannuation.

Super Seeker

Unclaimed Money

Thanks for coming back to our blog and reading our tips. Please feel free to contact me at any time if we can help you or your business with anything at all.

Lynch Investigations & Countermeasures Pty Ltd Contact Details














PJL 7th October 2010

The Growing Economic Espionage Risk Of Fibre Tapping

Corporate data centres, with their vast stores of business-sensitive information, present a tempting target for criminal groups.

Unfortunately for the would-be cyber crook, today’s enterprise security systems are so sophisticated that hacking into an enterprise datacentre is nigh on impossible.

But what if there were another way to get at this valuable data that circumvented most traditional security software? more

cicentre.net



 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
PJL 7th October 2010

U.S. Dept. of Defense Confirms NCIS Espionage Investigation Of Shell

On 19 June 2010 I received a strange email claiming that in 2006, U.S. authorities launched an investigation into alleged industrial espionage by Shell Oil.

Shell was implicated by their attorneys, the law firm of Vethan and Waldrop, and Matt Waldrop, principle partner of the law firm. Shell had been attempting to gain unlawful access to technical material that had been classified by the Navy Dept., Office of Naval Research in 2001. This material was the IP of a former employee. Shell was apparently trying to ‘muscle’ their way into gaining ownership of the IP material. This material was classified under DoE/DoD nuclear weapons classification authorities. more

royaldutchshellplc.com


















PJL 7th October 2010

Facebook & Twitter Used In Stock Fraud

Facebook and Twitter social networking sites were used to tout stocks in a classic "pump and dump" fraud of about $7 million that was uncovered during a cocaine-trafficking probe, U.S. prosecutors said on Tuesday.

Investigators discovered the fraud in a two-year probe of suspected trafficking by longshoremen and others of 1.3 tons of cocaine worth $34 million through the Port of New York and New Jersey officials said. more


PJL 7th October 2010

Espionage Theory In Raid

An overnight break-in in which burglars ransacked Aurora Energy's Hobart head office has puzzled police and company chiefs.

Only the second-floor commercial section of Aurora was targeted by the thieves, who cracked a secret safe and stole a small sum of cash. more


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
PJL 7th October 2010

Wednesday, October 6, 2010

ASTIC Signals Defenses®, LLC Will Be Exhibiting

ASTIC Signals Defenses will be demonstrating its patented SD Technology at Booth Number: 4306. SD Technology allows both government and commercial organizations to cost effectively convert conventional office space into US Department of Defense (DoD) grade secure work environments.

The demonstrations will include protection against both radio frequency and infrared/LASER attacks against your facilities. more

prnewswire.com
















Signals Defenses

PJL 6th October 2010

Saudi Prince Accused Of Murdering Servant



PJL 6th October 2010

Tuesday, October 5, 2010

Cihaner Confesses To Wiretapping Prime Minister

Erzincan’s chief public prosecutor confessed to having wiretapped, albeit accidently, the prime minister on Saturday during the “32. Gün” (32nd Day) debate program aired by private TV station Kanal D. more  

todayszaman.com





TSCM Bug Sweep Services - Lynch Investigations & Countermeasures Pty Ltd
PJL 5th October 2010

Die Hard - Mctiernan Gets One Year In Prison In Wiretapping Case

DIE HARD director JOHN MCTIERNAN has been sentenced to one year in prison for lying to authorities investigating Hollywood private detective ANTHONY PELLICANO.

The filmmaker initially pleaded guilty to lying to federal agents in 2006 about the investigation of Pellicano, who was convicted in 2008 of 76 wiretapping counts and sentenced to 15 years in prison. more

contactmusic.com

 
 
 
 
 
 
 
 
 
 
 
 
 


TSCM Bug Sweeping Services - Lynch Investigations & Countermeasures Pty Ltd 
 
PJL 5th October 2010

Monday, October 4, 2010

Belanglo Body May Be Overseas Backpacker

DETECTIVES are preparing a worldwide search to identify the young woman whose skeletal remains were found in the Belanglo State Forest.

Investigators have been unable to find a match for the DNA sample that was extracted from the teeth and jaw area. Searches of the national missing persons archives have all been unsuccessful.

The Sunday Telegraph has been told the next phase of the investigation will involve Interpol. more

dailytelegraph.com

 
 
 
 
 
 
 
 
 
 
 
Grim task ... Police search the area were human bones were found in the Belanglo State Forest last month.. Pic: Peter Rae Source: The Sunday Telegraph
 
PJL 4th October 2010

Fraud Factories: Rep. Alan Grayson Explains The Foreclosure Fraud Crisis



PJL 4th October 2010

Sunday, October 3, 2010

Keady Back In Court On Wiretapping Allegations

Former Shirley Town Administrator Kyle Keady appeared yesterday in Ayer District Court for a pretrial hearing in regards to charges he illegally taped people in and around Shirley Town Hall. more

lowellsun.com






PJL 3rd October 2010

Former Spy Accused Of Espionage From Prison

An ex-CIA spy slipped messages to his son from prison through paper napkins wadded into balls, despite the best efforts of the intelligence agency to monitor his communications, government prosecutors said in a pretrial filing. more





cbsnews.com

PJL 3rd October 2010

Saturday, October 2, 2010

Newsletter September 2010

September 2010 has been a busy month. An interesting request this month was unclaimed money searches which we were successful in locating unclaimed money for various clients. Anybody in need of this service, please feel free to contact us at any time.

All we need to search for unclaimed money is a date of birth, old and current address information and a full name. We will also need proof of identity for the person we are searching for unclaimed money for.

We created a new web page for our web site that can be sent to clients who need an accurate quotation for a bug sweep (TSCM) service. Our new TSCM Quotation Information Worksheet is detailed and allows a client to input specific details about a site where an inspection is needed. Once the TSCM Quotation Information Worksheet is filled in by a client and returned to us, we will submit an accurate quotation to the client. Anybody needing the new TSCM Quotation Information Worksheet, should contact us so we can forward that on via email.

Lynch Investigations & Countermeasures Pty Ltd upgraded their TSCM equipment to compliment further assistance to corporate clients in need of electronic eavesdropping detection. We now sweep and office environment to 20 GHz with spectral analysis, including our thorough physical inspection and comprehensive risk management reporting. We have had the new equipment out on a few tasks this month and it is performing nicely.

We are also still handing surveillance work and inquiries for Family Law matters. With couples separating, surveillance remains demanding due to child custody concerns with court orders in place, allowing us to provide surveillance to ensure the conditions of those court orders are being complied with.

There are still those locating inquiries coming in with some clients needing searches completed to satisfy the court's requirements for substitute service. At times when warrants are in place and a change of name by deed poll has occurred, it is understandable why substitute service is necessary. Please get in contact with us about data searches for legal locating tasks as needed.

That rounds it up for this last month's brief overview and the first day of October 2010. We look forward to communicating with you all again at the end of this month or early next month in November 2010.







PJL 2nd October 2010

The Stuxnet Outbreak - A Worm In The Centrifuge

It sounds like the plot of an airport thriller or a James Bond film. A crack team of experts, assembled by a shadowy government agency, develops a cyber-weapon designed to shut down a rogue country’s nuclear programme.

The software uses previously unknown tricks to worm its way into industrial control systems undetected, searching for a particular configuration that matches its target—at which point it wreaks havoc by reprogramming the system, closing valves and shutting down pipelines. more 

economist.com









Tim Marrs

PJL 2nd October 2010

Wiretapping The Internet

On Monday, The New York Times reported that President Obama will seek sweeping laws enabling law enforcement to more easily eavesdrop on the internet.

Technologies are changing, the administration argues, and modern digital systems aren't as easy to monitor as traditional telephones. more

schneier.com






 
 
 
 
 
 
 
 
 
 
 
PJL 2nd October 2010

Friday, October 1, 2010

4 Tips For Improving Your SEO Copywriting

When Search Engine Optimization (SEO) is mentioned, a few obvious things immediately pop into your mind, such as: Google rankings, link building, and conversion rates. One element that is often forgotten is copywriting – when building an authoritative site, you will want to optimize your copywriting content. It is very effective in getting Google’s attention, but you should also optimize for your human readers as well.

Some writers write first and then optimize later, while others optimize as they go. Here are four SEO copywriting tips that have made many client websites successful.


1.Title – Use the keyword you are targeting in the title of your content. The closer to the beginning of the title the better, but the main key here is that they appear somewhere. It is recommended that the title and the title tag are variations of each other and never the same.

2.Meta Description – The meta description is the snippet that human readers see underneath your Google result, below the title. This description can determine whether a person clicks through or not. If your page, post, or article pops up for their query, the meta description with a properly placed keywords could seal the deal for a lucrative click through. Keep meta descriptions under 165 characters so the full description is visible in the search result.

3.Keyword Frequency (not to be confused with keyword density) – is the number of times your keywords appear on the page. Keyword density is the ratio of keywords to the rest of the words on the page. Use your keywords often, but only when appropriate. One of the many skills of an SEO copywriter is knowing HOW to write for keywords, while keeping a natural flow of language. If your keyword frequency is crossing the line into spam-hood, your keyword density will be ~ 5%. Don’t mindlessly repeat keywords just to optimize. This will only achieve the opposite results.

4.Page Links – Search engines always want to know who you are “connected to,” which pages, websites, and content you are associating yourself with. If you are fraternizing with a less than reputable website, Google will know. For SEO purposes, linking to other pages matters. So be careful who you link with.

These SEO copywriting tips are generally considered current best practices. Focus on balancing these rules with your content, and you will please both the search engine spiders and the humans that read it.

b2cmarketinginsider.com

Author: Ben Finklea, CEO of Volacci, a search marketing firm.


 
 
 
 
 
 
 
PJL 1st October 2010

Private Eye May Sue Fraser-Kirk

A private investigator has released a statement saying claims made about him during the Kristy Fraser-Kirk court case are "untrue" and "malicious". more

abc.net.au











PJL October 1st 2010

Museveni Passes Law On Telephone Tapping

President Yoweri Museveni has signed into law the Regulation of Interception of Communications Bill, 2010, giving powers to security officials to listen into private communication if they have sufficient reason to suspect the communication is in aid of criminal activity. more

monitor.co.ug

















PJL 1st October 2010

Tuesday, September 28, 2010

FBI Employees Caught Cheating Like College Students on an Exam

A Department of Justice Investigation has found widespread cheating among FBI employees on an important exam. more

gawker.com

PJL 28th September 2010

Wiretapping Facebook?

The Obama Administration aims to make it easier for the FBI to wiretap online communications, from social networking sites like Facebook to communications on BlackBerrys. The FBI claims their ability to track “bad guys” is increasingly moving away from the telephone and onto the internet. more

scpr.org












Chip Somodevilla/Getty Images

President Obama is considering extending wiretapping abilities to Facebook, Skype and even BlackBerry smartphones

PJL 28th September 2010

Monday, September 27, 2010

Spying at Work — Espionage, Who, How, Why, How To Stop It



PJL 27th September 2010

FBI Activists in Midwest as Domestic Surveillance Expands

Apparently last week’s unflattering report by the Justice Department’s Inspector General on the Federal Bureau of Investigation’s improper surveillance of nonviolent protesters during the past decade fell on deaf ears. more

informant.kalwnews.org












PJL 27th September 2010

ANC's Block Under Investigation

A key former Northern Cape official implicated in the buying of R112.2 million in equipment from city businessman Gaston Savoi has gone to ground following a Cape Times exposé of his involvement in the deals – which are under investigation by the Hawks. more









 
 
 
 
 
 
 
 
 
 
 
PJL 27th September 2010

How To Conduct Overseas Investigation Operation

1. I have in the course of my work conducted private investigation outside my country. In this article, I shall try to discuss a few pointers on how to run a successful overseas operation based on my experience and exposure in such assignments. more

emmettcarradine.coolblogz.com


PJL 26th September 2010

TrapCall

Always know who's calling.

TrapCall unmasks blocked and restricted calls, blacklists harassing callers, and can even record your incoming calls. There is no software to install, and it works on any mobile phone.

Watch this quick video to see how easy TrapCall really is!



PJL 26th September 2010

Saturday, September 25, 2010

FBI Joins Investigation Into MI6 Spy's Death

The bureau has employed face recognition technology at US airports in a bid to establish whether Gareth Williams travelled in and out of the US any stage with a couple answering the description of two people Scotland Yard have appealed to come forward in connection with his deathmore

telegraph.co.uk
















Mr Williams, a computing and maths prodigy whose funeral on Friday was attended by Sir John Sawers, the head of MI6, had made regular trips to the United States Photo: SWNS

PJL 25th September 2010

Missing Syrian Blogger Detained For Espionage

A missing 19-year-old Syrian blogger, Tal El- Melouhy, is being held in a prison near the capital Damascus on espionage charges, local media outlets reported Tuesday. more

monstersandcritics.com













PJL 25th September 2010

Audio & Video Recording Law Enforcement





PJL 25th September 2010

Greek Ferry Disaster Crash Scene Investigation Part 2



PJL 25th September 2010

10 Small Business SEO Tips

Being a small business means being in need of tight money management. For this reason, small budgeted means of marketing, such as website often becomes the first choice of marketing means.

Unfortunately, launching your website without having appropriate search engine optimization will just take your money straight into the garbage can.

Hence, here are few affordable tips of SEO that helps you ensuring your website marketing success: more




PJL 25th September 2010

Thursday, September 23, 2010

FBI Spied & Lied, Misled Justice Department on Improper Surveillance of Peace Groups

The Justice Department Inspector General (IG) discovered improper FBI spying investigations were frequently opened based upon “factually weak” justifications.

The FBI classified some investigations relating to nonviolent civil disobedience under its "Acts of Terrorism" classification.

People associated with advocacy groups were generally predicated on suspicion that the individual might potentially commit a crime. more







 
 
 
 
 
 
 
networkworld.com
 
PJL 23rd September 2010

Suspect Arrested After Four Month Investigation Into Internet Threats

The La Quinta Police Department, a contracted department through the Riverside County Sheriff’s Department out of their Indio station arrested a man for threats made through the internet to a female La Quinta High School student. more

examiner.com










Arrested for criminal threats via the internet

Photo by: Riverside County Sheriff's Department
 
PJL 23rd September 2010

TSCM & VoIP Vulnerabilities

There are a lot of businesses we service with our Technical Surveillance Counter-Measure (TSCM) services that could be taking advantage of there IP infrastructure and encrypting VoIP communications to secure VoIP telephone.

It is easy enough to inspect a VoIP telephone and to connect a Time Domain Reflectometer to a data cable to check for taps, bridges or splices along the cable, although to run these tests involves disconnecting any power source from the data cables so the Time Domain Reflectometer can be used to inject a signal into the data cable for further analysis.

It is practical to use an encrypted data transmission pathway for VoIP secure telephone communications.

With encrypted data transmissions, one doesn't need to continually check data cables that need power isolated in a Technical Surveillance Counter-Measures inspection.

There are some problems with VoIP latency and encrypted data transmission makes the latency period slightly longer for data transfer, although this is improving.

Here is an interesting article below relating to hacking IP voice & video in real time which shows you how easily the process is undertaken.

Regular TSCM servicing can't guarantee protection against real time hacking of the IP infrastructure; this is why encrypted data transmissions should be used.

PJL
=============================================

Corporate video conferences can still be easily hacked by insiders using a freeware tool that allows attackers to monitor calls in real-time and record them in files suitable for posting on YouTube. more



















PJL 23rd September 2010

Tuesday, September 21, 2010

Technical Surveillance Counter-Measures (TSCM) Quotation

Please find a web site link below that leads to our new Technical Surveillance Counter-Measures (TSCM) Quotation Information Worksheet. The form can be completed online or offline, what ever way you wish to use is fine with us.

By creating the Technical Surveillance Counter-Measures Information Worksheet, allows our business to give accurate quotes for a site inspection nominated by you for our Bug Sweeping (TSCM) services.

We look forward to hearing from you and responding to your service needs.

TSCM Quotation Information Worksheet



TSCM Bug Sweeps - Lynch Investigations & Countermeasures Pty Ltd

Thank you PJL 21st September 2010

Indictment of Private Investigators Hired by Oleg Deripaska's Aide to Spy on Michael Cherney

On Sunday, Tel Aviv Magistrates Court charged two private investigators, Rafael Pridan and Maxim Gurevich, with the illegal wiretapping of Businessman Michael Cherney. The two had been hired by an aide to Russian aluminum tycoon Oleg Deripaska, Cherney's ex-partner. more














prnewswire.com

PJL 21st September 2010

US Charges Two Over Nuclear Espionage

A US scientist and his wife have appeared in a US federal court over espionage charges, which include passing on secret information to Venezuela.

Nuclear physicist Pedro Leonardo Mascheroni and his wife, Marjorie Roxby Mascheroni, now face a total of 22 charges. If convicted, they could be sentenced to life in prison.

Both the defendants are US citizens, who once worked at Los Alamos National Laboratory in New Mexico.

The Federal Bureau of Investigation says it had the couple under surveillance for the past two years. more

presstv.ir



PJL 21st September 2010

MI5: Cyber Espionage On The Rise But Can Be Easily Beaten

MI5 says the Internet has made the threat of espionage by foreign countries higher than ever before, but insisted it is "relatively straightforward" to block attempts to steal data; MI5 has previously written to the bosses of big British companies to warn them of the threat online, particularly from hackers with links to the Chinese intelligence services. more

homelandsecuritynewswire.com















PJL 21st September 2010

Autopsy: Defected Russian Spy Chief Choked On Meat

A former top Russian spy who defected to the U.S. after running espionage operations from the United Nations choked to death on a piece of meat, a Florida medical examiner says.

Sergei Tretyakov, 53, also had a cancerous tumor in his colon when he died June 13, according to an autopsy report obtained by The Associated Press through a state open records request. Tretyakov's sudden death had led to some Internet speculation that he had been killed. more



















PJL 21st September 2010

The Security Risks & Ways to Decrease Vulnerabilities in a 802.11b Wireless Environment

This document explains topics relating to wireless networks. The main topics discussed include, what type of vulnerabilities exist today in 802.11 networks and ways that you can help prevent these vulnerabilities from happening. more



















PJL 21st September 2010

Sunday, September 19, 2010

Afghanistan Insurgents Killed While Placing An IED



PJL 19th September 2010

Missile Hit On A Moving Tank



PJL 19th September 2010

The Small Business Fraud Prevention Manual

The Small Business Fraud Prevention Manual


















ACFE

PJL 19th September 2010

Major Supply Group Of Cocaine Busted

The Rowan County Sheriff’s Office Special Investigations Unit began an investigation involving a group believed to be a major supplier of powder cocaine in western Rowan County. The investigation began in June and involved the use of surveillance and undercover detective purchases of cocaine. more
















foxcharlotte.com

PJL19th September 2010

Saturday, September 18, 2010

Federal Investigation Snares 7 With Ties To Drugs & Human Smuggling

Seven people are in federal custody after a two-year investigation allegedly tied them to a multimillion-dollar drug- and human-smuggling ring based in Whatcom County. more























PJL 18th September 2010

Large-Scale Search Planned For Missing Man



PJL 18th September 2010

Friday, September 17, 2010

Irish Republicans Used Cameras To Spy On MI5

British government officials in Northern Ireland have ordered 20 trees cut down outside a spying installation, after a number of surveillance cameras were discovered hidden among the tree branches. more









intelligencenews.wordpress.com

PJL 17th September 2010

Recording a Meeting

Do you have a right to protect yourself by recording meetings you attend?

Not according to the South Australian Supreme Court. It has just held that the Chairman of a meeting and the meeting itself can prohibit the use of recording devices at the meeting.

If the wannabe recorder indicates that he still intends to record the meeting, the Chairman can adjourn the meeting. more


 
 
 
 
 

claytonutz.com
 
PJL 17th September 2010

Wednesday, September 15, 2010

The Investigation of William Mandel by Sen. Joseph McCarthy



PJL 15th September 2010

Two Men Face Federal Charges In Armoured Car Robbery

Federal authorities charged two men Monday with taking $130,000 at gunpoint from an armored car courier last month.

Court documents allege that within hours of the Aug. 30 hold-up, Deangelo Colston and Gerald Jones, both 20, began spending handfuls of $20 bills on a car, clothing, tattoos and a trip to Worlds of Fun. more

kansascity.com

















(Photo credit flickr.com)

PJL 15th September 2010

Tuesday, September 14, 2010

Crime Scene Investigation & Forensic Anthropology



PJL 14th September 2010

Mixed Reactions To Civil Rights Photographer's FBI Ties

In many ways, civil rights photographer Ernest Withers would have been the perfect FBI informant, said leaders of the movement whom he photographed during quiet moments in their hotel rooms, at strategy meetings and in the midst of powerful street protests. more



















washingtonpost.com

PJL 14th September 2010

London Police Are Sued Over The News Of The World Phone Hacking Investigation

Three men who suspect their mobile phones were hacked by reporters at Rupert Murdoch's News of the World newspaper are suing U.K. police, alleging they didn’t properly investigate the case. more


 









bloomberg.com

PJL 14th September 2010

New Hampshire Police Bust Facebook Burglary Ring

Up until last week, the potential for place-based social networks enabling burglary had been (to the best of my knowledge) mostly hypothetical; while the possibility was recognized and much discussed, I hadn't seen any reports of burglars actually victimizing people after determining they were away from home by looking at their online profiles. more  















mediapost.com


PJL 14th September 2010

Monday, September 13, 2010

The Secrets of Countersurveillance

Almost any criminal act, from a purse-snatching to a terrorist bombing, involves some degree of pre-operational surveillance. In fact, one common denominator of all the different potential threats — whether from lone wolves, militant groups, common criminals or the mentally disturbed — is that those planning an operation all monitor their target in advance. more

















stratfor.com

PJL September 13th 2010

Fraud Squad Probes Perth Housing Scam

The Major Fraud Squad has been called in to investigate a scam after a Perth man's home was sold without his knowledge.
Roger Mildenhall was living overseas when he found out last week that his property in Karrinyup which, was worth almost $500,000, had been sold in June. more


 

 
 
 
 
 
 
Roger Mildenhall was living overseas when he found out that his property had been sold (7pm TV News WA)
 
abc.net.au
 
PJL 13th September 2010

Sunday, September 12, 2010

Wichita Prostitution Ring Linked To Massage Parlors

Ten people have been arrested and charged with participating in a prostitution network utilizing numerous massage parlors around Wichita, police officials said Friday. more























kansascity.com

PJL September 12th 2010

Greek Ferry Disaster Crash Scene Investigation Part 1



PJL 12th September 2010

Saturday, September 11, 2010

Police Find Meth Lab Searching For Stolen Xbox

It was just another ordinary September day in St. Augustine, Florida, until an unnamed 24-year-old man's Xbox was stolen. The investigation resulting from the theft led to the discovery of a methamphetamine lab next door. more














escapistmagazine.com

PJL 11th September 2010

Shooter Kills 2 Kraft Workers At North East Philadelphia Plant

A woman who had just been suspended from her job returned to the Kraft Foods baking plant in Northeast Philadelphia Thursday night and opened fire with a .357 Magnum handgun, killing two co-workers and wounding a third, police said. more



philly.com

PJL 11th September 2010

Friday, September 10, 2010

Update Regarding Police Officer Death Investigation



PJL 10th September 2010

Commissioner Pays Tribute To Fallen Officer



PJL 10th September 2010

Policeman Fatally Shot In Bankstown Siege



PJL 10th September 2010

Court Allows Warrantless Cell Location Tracking

The FBI and other police agencies don't need a search warrant to track the locations of Americans' cell phones, a federal appeals court ruled on Tuesday in a precedent-setting decision. more



















PJL 10th September 2010