Law Enforcement Search Results

How To: Keep Law Enforcement Out of Your Android Device

With protests springing up across America, there's a chance you may have your first interaction with law enforcement. Many demonstrators will have their phones in-hand to film the action, which, sadly, could prompt an officer to demand the device and any self-incriminating data it may contain. Before this happens, you should know there are tools at your disposal to protect your data in such situations.

How To: 8 Passcode Tips for Keeping Hackers & Law Enforcement Out of Your iPhone for Good

There has been significant debate over law enforcement's right to access our digital devices in recent years. New tools from Grayshift and Cellebrite are popping up faster than ever to help government agencies, as well as traditional hackers, break into iPhones. If you're concerned, you can take steps right now to beef up your passcode and prevent outsiders from gaining access to your device.

How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More

Hardware hacks are something I feel we don't get enough of at Null Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick on how to hack normal radios to scan frequencies that are normally non-listenable. This little hack allowed us to scan frequencies belonging to law enforcement, and even frequ...

How To: Join law enforcement

Careers in law enforcement range from police officers and state troopers, to FBI agents and crime scene investigators. Get a job in law enforcement with tips from a former highway patrolman in this free video series on law enforcement careers.

How To: Rural surveillance

If you are law enforcement or find yourself in an emergency situation you may need to know how to properly conduct surveillance in a rural area. You will have to gather information without being scene and will need different techniques when out in the wilderness.

How To: Identify gang graffiti

During a Laneway Revitalization project some gang graffiti was encountered and replaced with vibrant art work. The event organizer is a Toronto Police Officer who volunteers for the not for profit organization-The Ontario Gang Investigators Association. In this video an explanation of gang graffiti is offered. The organization Notogangs.org is comprised of sworn members of all areas of law enforcement who network regularly in the mandate of the prevention, intervention and suppression of crim...

How To: Quickly Turn Off Face ID on Your iPhone

While Apple's tech used for Face ID on the iPhone is impressive, it's debatable whether it's more convenient than Touch ID. There are also concerns that your face could be used to track shopping patterns or be seen during mass surveillance by intelligence agencies. More importantly, it could be easier for law enforcement, and even thieves, to force you to unlock your iPhone.

How To: Recover deleted photos from an iPhone

This is kind of scary! This video demonstrates just how easy it is to hack into an iPhone to access the data on it - including recovering deleted photos. You only think you've deleted those naughty photos you sent to your girlfriend.... Fortunately, there is a way... However, this particular process requires software available only to law enforcement. But that's never stopped a hacker - or a jilted ex - before!

How To: Disable the 'Unlock iPhone to Use Accessories' Notification in iOS 11.4.1 & Higher

If you're on iOS 11.4.1 or iOS 12 and go more than an hour without unlocking your iPhone, an "Unlock iPhone to Use Accessories" message will appear whenever you connect your iPhone to a computer or other device that tries to use the Lightning cable's data lines. This is to protect you, but it can be annoying if you have no reason to believe that law enforcement or criminals will have access to your iPhone.

How To: Quickly Disable Touch ID on Your iPhone for Extra Security in a Pinch

In the US, law enforcement officials can make you unlock your smartphone with a fingerprint, but they can't force you to input a password or PIN, which would violate your Fifth Amendment rights. To help you from ever being in a scenario where you're forced to put your finger on the Touch ID sensor, Apple has a built-in way for you to disable biometrics on your locked or unlocked iPhone in mere seconds.

How To: Get yourself out of thumbcuffs

Daniel Martin, a magician and escape artist, explains his technique for getting out of thumbcuffs. Disclaimer: We're pretty sure it's not illegal to know HOW to escape from thumbcuffs... but we're 100% sure it's illegal to actually escape when detained by law enforcement (just sayin').

How To: Master Newton's second law of motion with NASA

The second law of motion. Force equals mass times acceleration. F=MA. Learn the facts about Newton's second law of motion from the National Aeronautics and Space Administration, otherwise known as NASA. The United States government's most infamous agencyand the powerhouse of space exploration explains motion theory.

How To: Master Newton's third law of motion with NASA

Learn everything you need to know about Newton's third law of motion from none other than NASA. The National Aeronautics and Space Administration is the United States government's most infamous agency and powerhouse of space exploration. Why wouldn't you want to learn Newton's laws of motion from them?

How To: Keep Data-Thieving USB Accessories from Connecting to Your iPhone in iOS 11.4.1 & Higher

While privacy and security are cornerstones of Apple's ecosystem, your iPhone isn't bulletproof. Creating a strong passcode will protect you from most threats, but there exist tools that can break through even the toughest passcodes via the Lightning port. Luckily, Apple has implemented a new security feature to disable your Lightning port and keep your data safe and secure.

Hack Like a Pro: Digital Forensics Using Kali, Part 1 (The Tools of a Forensic Investigator)

Welcome back, my greenhorn hackers! Lately, much of the discussion here on Null Byte has revolved around evading detection and not getting caught hacking. Several of you have written me asking for a series on evading detection and forensics, and while I began a series 5 months ago on just that, we have changed hacking platforms from BackTrack to Kali, which has a much more highly developed forensic toolset.

How To: Apply Newton's laws of motion to cruise with NASA

See how Newton's laws of motion apply to an aircraft's cruise performance with this educational video from NASA -- the National Aeronautics and Space Administration, the leading resource for space exploration. There's no better place to learn about aerospace and Newton's three laws of motion and how they apply to aeronautics than NASA.

Prev Page