News

COVID-19 WORKPLACE COMPLIANCE REGULATIONS

Workplace: ‘No mercy’ for firms flouting Covid-19 regulations

The move to level three lockdown regulations will bring new risks for workers but, writes Legalbrief, the Trade, Industry and Competition Department plans to close down companies that flout Covid-19 regulations to protect the well-being of employees. According to Business Report, Lionel October, the Director-General of the department, told Parliament’s Portfolio Committee on Trade and Industry on Friday that the government had adopted a ‘no mercy’ approach to firms that did not adhere to the regulations. ‘The essential workers are most exposed. People working in the health sector and people working in the retail sector are vulnerable. We are adopting an approach where worker safety and protection is imperative. We are adopting an approach where we are saying there is no mercy. If people do not implement these regulations properly, they will close down. The social contract is that we will have an opening of the economy on condition of protective measures being in place to protect employees,’ October said.

Full report in Business Report

 

Gauteng Premier David Makhura reiterated the threat in a Business Day report. The provincial government is working with various sectors in Gauteng to ensure they are compliant with requirements such as sanitation, social-distancing and wearing masks. Gauteng is the economic heart of SA and ordinarily contributes more than a third of the country’s GDP, but its economy faces devastation as a result of the lockdown. Makhura, who has met with businesses, said he expects that everything would be in place, but that if ‘a business doesn’t comply, we will simply shut that business down’ and that workers’ rights would not be placed at risk. The province has focused on getting the retail sector and the transport industry compliant with the measures imposed. It will also focus on other sectors, such as manufacturing and mining, which employ large numbers of people. He said workers should raise any non-compliance issues if they are required to go back to work.

Full Business Day report

 

Organised business has added its voice to calls for domestic firms to take steps to ensure that their workplaces are Covid-19-ready, reports Mining Weekly. In welcoming the easing, Business Unity SA (Busa) president Sipho Pityana said it was critical that businesses, big and small, played their part in ensuring workplaces were ‘corona-ready when employees return to work under level three’. Business Leadership SA CEO Busi Mavuso added that, during a meeting between business, the President and some Cabinet members on 21 May, an understanding developed that further transition through the lockdown levels will only occur if business is able to demonstrate that it can operate safely and protect workers. Mavuso said the pressure was now on business to innovate and adapt to the crisis.

Full Mining Weekly report

MediaClone’s NVMe Economic Solution Forensic Imaging NVMe SSD

 

Forensic Imaging of NVMe SSD to SATA becomes much in need. The NVMe SSD comes in 3 form factors: M.2, 2.5”(SFF-8639), and PCIe storage controller. NVMe SSD as Evidence drives are extremely fast but can be very expensive. So there is a need for forensic imager units that can support all the NVMe form factors and the flexibility to forensically image NVMe SSD to SATA drives.  MediaClone offers one of the best products in the market today, handle NVMe SSD challenging f/w and deliver one of the most economical solutions.

 

SuperImager Desktop NVMe/SATA units:

http://www.media-clone.net/SuperImager-Plus-Desktop-NVMe-SATA-Forensic-lab-p/sil-0006-00a.htm

 

Here are the key benefits:

·       A standalone unit – no licensing scheme

·       Mix and cross copy of NVMe SSD and SATA drives using the same unit

·       Extremely high speed – NVMe speed can reach up to 100GB/min

·       Multiple Ports – 4 NVMe + 4 SATA ports (SAS optional)

·       Complete Forensic application, with many features

·       MediaClone Proven Forensic technology

 

MediaClone’s New NVMe Line of Products for Forensic and IT needs

NVMe SSDs are already being used today in many laptops and they will become more popular storage devices in the near future, all because of their incredible speed and low power.

Forensic investigators already encounter the need to capture data from NVMe SSDs, and IT professionals also have an increased need to clone NVMe SSDs.

Implementation of NVMe cloning and imaging is not trivial, since the SSDs connect directly to the PCIe bus. Also the NVMe drives are not compatible with SAS, SATA or USB storage protocols, and hot-plugging NVMe SSDs is a challenge.

Here is what MediaClone has to offer:

Please contact us for further information and pricing.

Social Media Investigator Events

We will be hosting a range of Social Media Investigator courses with certification upon completion of Social Media Investigator Level 1 & Level 2.

These hands-on, fast-paced, 5 & 3 day training courses, teach an array of social media investigative techniques, from mining the Dark Web to the effective use of free social media and open source intelligence-type tools and methodologies.

COURSES:

• Social Media Investigator Level 1
5 Days
• Social Media Investigator Level 2*
5 Days
• Dark Web Investigations:
A course for investigators *
3 Days
• Bitcoin, Blockchain & Cryptocurrency
Investigations: A course for
investigators *
3 Days

At the end of successfully completing the Social Media Investigator Level 2 Training, attendees will become a Certified Social Media Investigator.

* Social Media Investigator Level 1 Required.

DATES:

1 – 5 OCTOBER 2018
Social Media Investigator Level 1
8 – 12 OCTOBER 2018
Social Media Investigator Level 2
15 – 17 OCTOBER 2018
Dark Web Investigations
18 – 20 OCTOBER 2018
Bitcoin, Blockchain & Cryptocurrency Investigations

VENUE: 133 ALTHEA STREET, DIE HOEWES, CENTURION.

TIMES: 8:00 – 16:00

WHO SHOULD ATTEND?

• Law Enforcement
• Military
• Intelligence Analysts (All Agencies)
• Cyber Security Professionals
• Risk Managers
• Human Resource Departments
• Corporate Security Professionals
• Risk Analysts
• Financial Investigators
• Lawyers
• Forensic Investigators
• Heads of Forensic Investigation
Departments
• Professional Recruiters
• Customs & Immigration  Investigators

BOOK ONLINE HERE or email: michelle@forensicworx.com

We are happy to announce the release of Version 2.2.1.

We are happy to announce the release of Version 2.2.1.

The iNPUT-ACE team has been hard at work making another round of improvements based on user feedback. Here are some of the upgrades you can look forward to utilizing after you complete the update:

File List Changes: Adjustable Width, Reordering, & Group Number Indicator

We have made the File List width adjustable to help you find files in the list more efficiently and track what file pertains to which piece of evidence. Just drag the list out to make it wide enough to read the entire file name and then slide it back when you don’t need the expanded view and want the space dedicated to the playback window. That’s the second high point of the adjustable File List: now you can create a bigger playback window to view the evidence, so details are easier to identify and track through the video. We have also added this functionality to the metadata section in the interrogate tab!

It is common for a single case to involve multiple video files. That’s why we have added a seamless drag and drop experience for groups/file reordering to make it easier for users to organize their data and key evidence. And once you have all your files added to your project, you can now check the counter next to the group to make sure they are all accounted for.

To add another layer of organization and ease of use, when you playback video, the file name will be highlighted in orange in the File List making it recognizable at-a-glance.

To see a short clip of these options in action visit our blog update on the release here.

Narrative Report: Improved Add Page Option

The improved function of the Add Page option in the Narrative Report tool now adds a blank page to your report without impacting the existing content. We have also made some changes to the Narrative Report tool that will make building your reports smoother. Try it out today to see how your feedback is making this tool better with every update!

Project: Loading/Saving Time Improvements

We understand the impact time can have on a case and on your day in general, so we have made significant improvements to the loading/saving function to run faster. Your projects will save or open in just a matter of minutes.

As always, offline users can get the latest version from, download.input-ace.com/release.

A big thank you to all of our users, your insights and feedback are helping us make great improvements, keep sending them to us under Help > Submit Feedback. Please update your iNPUT-ACE software and start taking advantage of all the improvements today.

Copyright © 2018 iNPUT-ACE, All rights reserved.

Determining speed from video for Use of Force and Traffic Reconstruction

Published on December 15, 2017

Kelly Watt

Its amazing the problems video presents to users who are not familiar to the numerous ways CCTV, dash-cam and body-cam recording devices distort the true data. https://inputace.wistia.com/medias/0cqbvl88k9 Most proprietary video players distort or change video when the DVR is compressing it, especially when multiple videos are running through 1 DVR, or when a higher quality is taxing the bit-rate.

Images can be stretched as aspect ratios are not accurate, colors distorted, loss of details/edges, strange artifacts show in the image, and/or data is sometimes removed in this process. Often times image frames are dropped or even removed completely from the playable video players. We reviewed one case showing 4 frames per second in this demonstration, when the original frames were 30 frames per second. Also, frame rates can be inconsistent. In one case we showed the original recording with a frame rate starting at 1 frame per second, then jumping to 10 frames per second and showing varying rates. When viewing a use of force scenario it may appear that an officer lunges at the suspect in custody and slammed him against a wall, but after reviewing the inconsistency of the frame rates the story is much different.

Compressed image frames called Predictive frames, or “P” frames, literally ignore changing data. They ignore pixels from the previous frames, only to capture movement. Objects can appear or disappear as a result, distorting what actually occurred causing very poor quality image frames. In order to better understand these video clips or images, we may need to enhance or clarify by removing the “P” frames and matching the “I” frames to better see what had occurred. DVR players interfaces can also cause users headaches with limited functionality or ability to read critical meta data. Investigators screen record video from DVR players or snip screen shots which offer distort results. Traffic Investigators may count image frames with the assumption that frames rates are consistent, presenting results that are not true. Learn more about how you as an officer, investigator, accident reconstructionist or forensic engineers can prevent mistakes during investigations by using the software experts use; iNPUT-ACE.

This demo will show how iNPUT-ACE is able to read proprietary files, extract raw original data in a meaningful way that help you better understand issues that occur when viewing video from DVR’s and proprietary readers. The demo will also show you some good workflows for a better understanding of how speed and frame rates impact our understanding of events in use of force and traffic reconstruction. For a product demonstration, please visit our website or email sales@input-ace.com. Kelly Watt

Engineer “Testimony Dismissed” – be careful with Video

 

Prosecuting attorney Jonathan Hak offers a dire warning to experts who rely on video evidence without the requisite training or the slightest understanding of the effects of digital video compression. Hak, who specializes in admissibility issues relating to video evidence, authors a blog dedicated to helping experts avoid career-ending mistakes on the stand.

 

Hak’s latest paper offers an insightful and articulate dissection of a forensic engineering analysis of video evidence and of the excoriating judicial decision that followed. The paper describes in detail the work of a forensic engineer who, without any training in video examinations, video compression, deinterlacing, or image timing analysis, nevertheless opined on the meaning of the video images.

 

 

In Patel v. City of Madison, Alabama and Parker in the United States District Court for the Northern District of Alabama (Case 5:15-CV-0253-VEH), the Plaintiff claimed he was seriously injured during an altercation with police. Mr. Patel hired a Forensic Engineer to analyze the video in order to conduct measurements to prove his case. To rebut the Plaintiff’s expert, the police hired Grant Fredericks, a Certified Forensic Video Expert with over 30 years of experience as a video analyst. Fredericks employed the powerful iNPUT-ACE video analysis software to demonstrate to the court that all of the Plaintiff’s opinions were in error.

 

iNPUT-ACE provides a simple user interface that exposes potential frailties in video evidence; it provides accurate data relating to image timing; it guides biomechanical engineers and traffic crash experts through the discovery of critical elements of video compression; and it helps to direct examiners to hidden detail in video images. Most importantly, iNPUT-ACE offers a comprehensive training program to quickly build video examination competency among non-video experts.

 

Jonathan Hak provides a detailed analysis in his case study of how the engineering expert ventured outside of his area of expertise, diving head first into the deep end of video examination without the assistance of a tool like iNPUT-ACE and without the accompanying training.

 

https://tinyurl.com/yc5atd5p

 

The clear take-a-way from Hak’s article is that anyone who intends to comment about video evidence in an expert report, or who intends to offer expert testimony at trial, must have undertaken appropriate training, using appropriate tools.

 

The trial judge noted that the Defendants’ expert employed proper techniques and tools to support his analysis of the video and his rebuttal of the engineer’s evaluation of the video images. Grant Fredericks leveraged the power of iNPUT-ACE to quickly and accurately examine and interpret the reliability of the video images. “When uninformed and misleading (intended or not) expert evidence is presented to the trier of fact, we run the risk of the trier reaching the wrong conclusion and therefore a miscarriage of justice occurs,” writes Hak.

 

iNPUT-ACE takes this caution seriously, providing a comprehensive hands-on and web-based video training program for non-video experts. Visit one of our video Investigator Training classes in a city near you or call us for a web demonstration to see how iNPUT-ACE can raise your level of competency when dealing with video evidence.

 

https://input-ace.com/events/

 

Kelly Watt

Tips for Monitoring Kids’ Social Media

The American Academy of Pediatrics (AAP) recently released findings from a comprehensive study on the impact social media has on kids and families. Although there are real benefits to kids using sites like Facebook, including increased communication, access to information and help in developing a sense of self, there can be serious downsides to all this online sharing too.

Social networking is on the rise, and the study found that 22 percent of teenagers log onto their favorite social media sites more than 10 times a day, and that 75 percent own cell phones. This level of engagement online increases the risks of cyberbullying, “Facebook depression” (a new phenomenon where “de-friending” and online bullying lead to symptoms of depression), exposure to inappropriate content, and sexting.

Just as we prepare our kids for life in the real world, we should prepare them for life in the online world. Read on for tips that every parent should keep in mind.

To safely encourage an internet-savy child check out these Kid-Friendly Social Networking Sites

No Underage Facebooking
Did you know that no one under the age of 13 is permitted to join Facebook? However, there is no real way for Facebook to truly enforce it, because anyone can lie about their year of birth. You need to make sure that your child stays away from Facebook until 13 AND until you are comfortable with him or her having an account. There are measures put in place, such as reporting an underage child, but ultimately, it should be the parent who has the say on when and if that account gets created.

Check Privacy Settings 

Check that your privacy settings for the Internet and Facebook are set to the strictest levels. Depending on which browser you are using, you can adjust the settings directly from the options tab and adjust levels around cookies, third party sites and more. This not only protects the computer user, but also the computer from the threat of viruses. Checking your Facebook privacy settings is easy as well. Simply go here to ensure that you are up to speed on its privacy policy and make any changes you deem necessary.

Use Filtering Software 
There are software suites you can purchase to monitor your child’s Internet usage; many even enable you to view the exact keys that were typed, time spent online and all computer activity in general. Popular programs such as Net Nanny and PureSight PC let you monitor social media sites, block chats, filter content and much more. You can even monitor your child’s cell phone with a software program like My Mobile Watchdog.

Create Ground Rules
If your kids are old enough to be using the computer on their own, they are old enough to understand that there are rules they need to abide by. Breaking them should not have a lesser consequence than if they broke a rule in the offline world. The best way for families to agree on ground rules is to create a contract that all parties must sign. The Family Online Safety Institute (FOSI) encourages parents and kids to have an open discussion about what these rules mean, and offers a good example of a contract here.

Get To Know What Your Child’s Habits Are

You don’t need to be a super sleuth and spy on your kid’s every online move, but it is important to be aware of the kinds of sites he is frequenting and the people he is associating with. You get to know the friends he’s hanging out with at school, and his online friends shouldn’t be any different. One of the contract rules should be that you have full access to his Facebook friends and can take a look whenever you wish.

Another fantatsic tool to use is Tomoko Discovery, an enterprise online evidence authentication platform that solves simple and complex challenges, from collection to preservation of  Evidence from social media and online sources.  Their groundbreaking technology makes Tomoko Discovery the only platform that offers the preservation of evidence through Authenticated Desktop and Webcam Recording.

Since 2016, Tomoko Discovery has made it easier for people to securely collect and preserve Court Admissible Evidence from social media and online sources.
Today, more than 1000 users trust Tomoko Discovery. Click here for further info: https://tomokodiscovery.com/

Source & For Further Tips: https://www.parenting.com/gallery/social-media-monitoring-kids

Social Media Challenges and Concerns for Families

By: Gwenn Schurgin O’Keeffe, MD

INTRODUCTION
“What’s the harm?” That’s the age-old rhetorical question parents ask when trying to
convince themselves that the new shiny toy or gizmo on the block is safe for their children.
In the age of electronics, this question has been asked about every new device:
video cassette recorders, televisions, radios, Walkmen, MP3 players, cell phones
used as phones, smart phones, tablets, gaming systems, apps, and now social media.
As with issues in the nondigital world, safety with social media is a balance between
common sense and understanding the rules of what one is using. Social media is a
tool. Like all tools, whether there is harm or not depends on how it is used. Used
correctly, there should not be a need for concern. Used incorrectly, problems could
arise.
Technology is faceless so it is tempting to forget that issues can occur from its use.
Technology seems like a mere tool, an extension of the ability to connect and communicate.
With a device in hand, we forget that there are people at the other end. With
interactions with people, however, complications can arise from miscommunications
to true harm, such as privacy breaches and bullying.
With face-to-face connections, we are not so brazen. We take more care in how we
interact. We are careful in our choice of words and our mannerisms. We teach our
Pediatrics Now, PO Box 5336, Wayland, MA 01778, USA
E-mail address: DrGwenn@pediatricsnow.com
KEYWORDS
 Social media  Cyber-bullying  Sexting  Family media plan  Texting
 Applications  Games
KEY POINTS
 Social media is everywhere and used by adults and children.
 Social media can have a positive impact on child development in terms of fostering
communication, socialization, and learning.
 Social medial can have a negative impact on child development with such issues as
bullying, sexting, and inappropriate content contributing to additional issues.
 Social media can have positive and negative issues on family health and needs to be used
within a family with attention and care with a focus on the ages of the children at home.

Access the full PDF here: PDF

A powerful solution to assist in securely collecting and preserving social media and online information is Tomoko Discovery. Click here for further info: https://tomokodiscovery.com/

The 112 secret sexting codes kids are using on social media which parents need to know

With so much interaction done online, it’s increasingly tricky to know when your child is potentially in danger.

The line between trusting your child (and respecting their privacy) and policing them out of concern is a fine one for parents to tread.

As such, police have shared a list of ‘secret texting codes’ children are using.

These codes are also regularly used by sex pests looking to groom children online.

The list of abbreviations includes codes for ‘get naked on cam’, ‘parents are watching’, and ‘see you for sex’.

A spokesman for Newry and Mourne PSNI, said: “As a follow up to the text talk post just to clarify that this was an American resource and indeed some of the codes may not be being used here but it is something to be aware off if you see cryptic messages on your kids devices.

“Also prevention is better than cure so speak to your kids about their online activity, what they are using and respect the age limits of social media platforms – is it proper to set up a kid with a Facebook account at eight years old?

 A powerful tool to securely collect and preserve this social media and online info is Tomoko Discovery. Click here for further info: https://tomokodiscovery.com/

“What is an appropriate age to give your child a smart phone or device and data or wifi access?

“There are hundreds of text talk codes – a simple online search will reveal what any codes you spot actually mean.”

Here is a further list of abbreviations regularly used by children:

  • 143 – I love you
  • 2DAY – Today
  • 4EAE – For ever and ever
  • ADN – Any day now
  • AFAIK – As far as I know
  • AFK – Away from keyboard
  • ASL – Age/sex/location
  • ATM – At the moment
  • BFN – Bye for now
  • BOL – Be on later
  • BRB – Be right back
  • BTW – By the way
  • CTN – Can’t talk now
  • DWBH – Don’t worry, be happy
  • F2F or FTF – Face to face
  • FWB – Friends with benefits
  • FYEO – For your eyes only
  • GAL – Get a life
  • GB – Goodbye
  • GLHF – Good luck, have fun
  • GTG– Got to go
  • GYPO – Get your pants off
  • HAK – Hugs and kisses
  • HAND – Have a nice day
  • HTH – Hope this helps / Happy to help
  • HW– Homework
  • IDK – I don’t know
  • IIRC – If I remember correctly
  • IKR– I know, right?
  • ILY / ILU– I love you
  • IM– Instant message
  • IMHO – In my honest opinion / In my humble opinion
  • IMO – In my opinion
  • IRL– In real life
  • IWSN – I want sex now
  • IU2U – It’s up to you
  • IYKWIM – If you know what I mean
  • J/K– Just kidding
  • J4F – Just for fun
  • JIC– Just in case
  • JSYK – Just so you know
  • KFY – Kiss for you
  • KPC – Keeping parents clueless
  • L8– Late
  • LMBO – Laughing my butt off
  • LMIRL – Let’s meet in real life
  • LMK– Let me know
  • LOL – Laugh out loud
  • LSR – Loser
  • MIRL – Meet in real life
  • MOS – Mum over shoulder
  • NAGI– Not a good idea
  • NIFOC– Nude in front of computer
  • NM – Never mind
  • NMU – Not much, you?
  • NP – No problem
  • NTS – Note to self
  • OIC – Oh I see
  • OMG – Oh my God
  • ORLY – Oh, really?
  • OT– Off topic
  • OTP– On the phone
  • P911– Parent alert
  • PAW – Parents are watching
  • PCM– Please call me
  • PIR – Parent in room
  • PLS or PLZ– Please
  • PPL – People
  • POS – Parents over shoulder
  • PTB– Please text back
  • QQ – Crying. This abbreviation produces an emoticon in text. It’s often used sarcastically.
  • RAK – Random act of kindness
  • RL – Real life
  • ROFL – Rolling on the floor laughing
  • RT – Retweet
  • RUOK – Are you okay?
  • SMH – Shaking my head
  • SOS – Someone over shoulder
  • SRSLY – Seriously
  • SSDD – Same stuff, different day
  • SWAK – Sealed with a kiss
  • SWYP – So, what’s your problem?
  • SYS – See you soon
  • TBC – To be continued
  • TDTM– Talk dirty to me
  • TIME – Tears in my eyes
  • WYCM – Will you call me?
  • TMI– Too much information
  • TMRW – Tomorrow
  • TTYL– Talk to you later
  • TY or TU– Thank you
  • VSF – Very sad face
  • WB – Welcome back
  • WTH – What the heck?
  • WTPA – Where the party at?
  • WYCM – Will you call me?
  • YGM – You’ve got mail
  • YOLO – You only live once
  • YW – You’re welcome
  • ZOMG – Oh my God (sarcastic)
  • 182 – I hate you
  • 420 – Marijuana
  • ADR – Address
  • CD9 – Code 9 – it means parents are around
  • ILU – I Love You
  • KOTL – Kiss On The Lips
  • LMIRL – Let’s Meet In Real Life
  • NIFOC – Nude In Front Of The Computer
  • P999 – Parent Alert
  • PAL – Parents Are Listening -or- Peace And Love
  • RU/18 – Are You Over 18?
  • WYRN – What’s Your Real Name?

SOURCE:https://www.coventrytelegraph.net/news/coventry-news/112-secret-sexting-codes-kids-13867956