Tag: digital forensics

  • The Password Problem No One Is Answering

    Why “They Just Hacked It” Is Not a Serious Explanation Consider the following password: Uk$&5SlV[sSkGlAqP@.%ysP&!5M)vv6iD!D^~j5,0.nAN^#[JbxX9t?DHhVa15U_i6lBdsPJXjMAe8k28Znbr3ygwB_9Rap0[e That is a 100-character password, composed of uppercase letters, lowercase letters, numbers, and special symbols—drawn from the full printable ASCII character set. This password is not used alone. It is paired with Google Authenticator, Google’s official time-based one-time password (TOTP)…

  • Request for FCC Investigation – Potential Unlawful Call Activity and Government Impersonation Involving NCIC

    To: consumercomplaints@fcc.govCc: enforcement@fcc.gov; cyber@fbi.gov; ic3@fbi.gov; civilrights@usdoj.govSubject: Request for FCC Investigation – Potential Unlawful Call Activity and Government Impersonation Involving NCIC Date: December 15, 2025 Dear Sir or Madam, I am writing to formally request that the Federal Communications Commission review and investigate a pattern of telephone call activity that raises serious concerns regarding potential violations…