Hackpads are smart collaborative documents. .

Sarah Cortes

1313 days ago
1348 days ago
Unfiled. Edited by Wang Yu , Andrew , Jude Mwenda , Sarah Cortes 1348 days ago
Wang Y Interview questions & contacts
  • Resources
Andrew  MIT Police
Crimelogs will be posted dating back at least one month. Older crimelogs are available upon request by visiting the MIT Police Department administrative offices. Please be aware that some requests for crimelogs may take as much as 2 business days to process.
Crimelogs are also available for visual inspection by visiting the MIT Police Department administrative offices on the first floor at 301 Vassar St., Cambridge, during regular business hours, Monday through Friday.
Administrative Captain David Carlson
Administrative Sergeant Jamie DiGregorio
Andrew Danger Assessment
DV Danger and lethality assessment, http://www.ncdsv.org/publications_danger.html
Sarah C Jacqueline Campbell Danger Assessment http://www.dangerassessment.org/DATools.aspx, online version of the 
Cambridge Police
Perhaps contact Joe Murphy for the interview
Sarah C Harvard Police Logs
Andrew  Local Forensic Firms
Andrew Advocates
 - Transition House-
 - Emerge-
 - Melnea Cass
 MIT- Sarah Rankin
 Harvard- Alicia Oeser
  • TO DO: crawl MIT and Cambridge police daily logs and look at quantity of incidents for harassments, domestic violence, identity fraud, threats (and maybe with keywords of Internet, mobile phone, stalking, text message, email, 209A, restraining order, GPS-related things)
Wang Y
  • Questions
Andrew Target audience: forensic experts, law enforcement officers, maybe advocates
Wang Y
  • Which of the following best describes your area of expertise
  • Digital forensics
  • Digital advocacy
  • Law enforcement
  • Security analyst
  • DV Advocate
  • Other
Wang Y
  • How many years have you worked within the specified area of expertise
  • Less than 2 years
  • More than 2 but less than 5 years
  • More than 5 years
  • Can you tell me the last 5 cases you encountered? (Notice the time interval)
  • On average how many of those cases have been reported to the police?
  • Less than 20 percent of the cases
  • Less than 50 percent but more than 20 percent of the cases
  • Less than 70 percent but more than 20 percent of the cases
  • More than 70 percent 
  • In your experience, which of the following devices is the most commonly used in digital surveillance?
  • Mobile phone
  • Laptop
  • Tablets
  • In your experience, which of the following operating systems is the commonly used in digital surveillance?
  • Microsoft Windows
  • Linux
  • Mac OS X
  • Apple iPhone IOS
  • Android OS
  • Please describe the process of dealing with an infected device.
  • How do you determine device infection? Does the output fit into any danger assessment framework?
  • Please list the top 5 tools used to resolve digital surveillance occurrences or risks
  • Briefly describe the process on how you would go about detecting an infected device and determine the risk associated
  • Briefly describe steps to neutralize risk posed by infected devices
1. have you received reports from somebody that he/she is being stalked by his/her computers/mobile phones?
2. what did you do after you received these reports? Please list the steps.
3. please tell us the devices and technologies involved in these cases.
4. from whom can we get information about how to deal with cases of digital stalking/surveillance?
5. do you know any online/offline resources or database recording such cases, or provide solution to such cases?
6. How serious do you think digital stalking / surveillance is currently?
7. what do you want to know more digital stalking/surveillance?
8. can we see some case records? Is there a database to query? Can we have the statistics results or even some case details.
1367 days ago
Unfiled. Edited by Andrew 1367 days ago

Contact Support

Please check out our How-to Guide and FAQ first to see if your question is already answered! :)

If you have a feature request, please add it to this pad. Thanks!

Log in