ICORP Investigations continue to grow throughout the United States. ICORP Investigations specialize in surveillance. Investigations include workers compensation investigations, high liability claims investigations, cheating spouse investigations and disability investigations. For more information please visit our website.
Here are the list of states ICORP Investigations private investigators are now licensed in.
State License #
New York 11000133551
New Jersey 8387
Florida A 1200112
Meet the groundbreaking new encryption app set to revolutionize privacy and freak out the feds.
Updated Monday, Feb. 4, 2013, at 12:21 PM ET
For the past few months, some of the world’s leading cryptographers have been keeping a closely guarded secret about a pioneering new invention. Today, they’ve decided it’s time to tell all.
Back in October, the startup tech firm Silent Circle ruffled governments’ feathers with a “surveillance-proof” smartphone app to allow people to make secure phone calls and send texts easily. Now, the company is pushing things even further—with a groundbreaking encrypted data transfer app that will enable people to send files securely from a smartphone or tablet at the touch of a button. (For now, it’s just being released for iPhones and iPads, though Android versions should come soon.) That means photographs, videos, spreadsheets, you name it—sent scrambled from one person to another in a matter of seconds.
“This has never been done before,” boasts Mike Janke, Silent Circle’s CEO. “It’s going to revolutionize the ease of privacy and security.”
True, he’s a businessman with a product to sell—but I think he is right.
The technology uses a sophisticated peer-to-peer encryption technique that allows users to send encrypted files of up to 60 megabytes through a “Silent Text” app. The sender of the file can set it on a timer so that it will automatically “burn”—deleting it from both devices after a set period of, say, seven minutes. Until now, sending encrypted documents has been frustratingly difficult for anyone who isn’t a sophisticated technology user, requiring knowledge of how to use and install various kinds of specialist software. What Silent Circle has done is to remove these hurdles, essentially democratizing encryption. It’s a game-changer that will almost certainly make life easier and safer for journalists, dissidents, diplomats, and companies trying to evade state surveillance or corporate espionage. Governmentspushing for more snooping powers, however, will not be pleased.
By design, Silent Circle’s server infrastructure stores minimal information about its users. The company, which is headquartered in Washington, D.C., doesn’t retain metadata (such as times and dates calls are made using Silent Circle), and IP server logs showing who is visiting the Silent Circle website are currently held for only seven days. The same privacy-by-design approach will be adopted to protect the security of users’ encrypted files. When a user sends a picture or document, it will be encrypted, digitally “shredded” into thousands of pieces, and temporarily stored in a “Secure Cloud Broker” until it is transmitted to the recipient. Silent Circle, which charges $20 a month for its service, has no way of accessing the encrypted files because the “key” to open them is held on the users’ devices and then deleted after it has been used to open the files. Janke has also committed to making the source code of the new technology available publicly “as fast as we can,” which means its security can be independently audited by researchers.
The cryptographers behind this innovation may be the only ones who could have pulled it off. The team includes Phil Zimmermann, the creator of PGP encryption, which is still considered the standard for email security; Jon Callas, the man behind Apple’s whole-disk encryption, which is used to secure hard drives in Macs across the world; and Vincent Moscaritolo, a top cryptographic engineer who previously worked on PGP and for Apple. Together, their combined skills and expertise are setting new standards—with the results already being put to good use.
According to Janke, a handful of human rights reporters in Afghanistan, Jordan, and South Sudan have tried Silent Text’s data transfer capability out, using it to send photos, voice recordings, videos, and PDFs securely. It’s come in handy, he claims: A few weeks ago, it was used in South Sudan to transmit a video of brutality that took place at a vehicle checkpoint. Once the recording was made, it was sent encrypted to Europe using Silent Text, and within a few minutes, it was burned off of the sender’s device. Even if authorities had arrested and searched the person who transmitted it, they would never have found the footage on the phone. Meanwhile, the film, which included location data showing exactly where it was taken, was already in safe hands thousands of miles away—without having been intercepted along the way—where it can eventually be used to build a case documenting human rights abuses.
One of the few people to have tested the new Silent Circle invention is Adrian Hong, the managing director of Pegasus Strategies, a New York-based consulting firm that advises governments, corporations, and NGOs. Hong was himself ensnared by state surveillance in 2006 and thrown into a Chinese jail after getting caught helping North Korean refugees escape from the regime of the late Kim Jong Il. He believes that Silent Circle’s new product is “a huge technical advance.” In fact, he says he might not have been arrested back in 2006 “if the parties I was speaking with then had this [Silent Circle] platform when we were communicating.”
But while Silent Circle’s revolutionary technology will assist many people in difficult environments, maybe even saving lives, there’s also a dark side. Law enforcement agencies will almost certainly be seriously concerned about how it could be used to aid criminals. The FBI, for instance, wants all communications providers to build in backdoors so it can secretly spy on suspects. Silent Circle is pushing hard in the exact opposite direction—it has an explicit policy that it cannot and will not comply with law enforcement eavesdropping requests. Now, having come up with a way not only to easily communicate encrypted but to send files encrypted and without a trace, the company might be setting itself up for a serious confrontation with the feds. Some governments could even try to ban the technology.
Janke is bracing himself for some “heat” from the authorities, but he’s hopeful that they’ll eventually come round. The 45-year-old former Navy SEAL commando tells me he believes governments will eventually realize that “the advantages are far outweighing the small ‘one percent’ bad-intent user cases.” One of those advantages, he says, is that “when you try to introduce a backdoor into technology, you create a major weakness that can be exploited by foreign governments, hackers, and criminal elements.”
If governments don’t come round, though, Silent Circle’s solution is simple: The team will close up shop and move to a jurisdiction that won’t try to force them to comply with surveillance.
“We feel that every citizen has a right to communicate,” Janke says, “the right to send data without the fear of it being grabbed out of the air and used by criminals, stored by governments, and aggregated by companies that sell it.”
The new Silent Circle encrypted data transfer capability is due to launch later this week, hitting Apple’s App Store by Feb. 8. Expect controversy to follow.
This article arises from Future Tense, a collaboration among Arizona State University, the New America Foundation, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter.
I just want to thank Lifehacker for inviting me to their Ask an Expert Q & A regarding private investigators. I also want to thank the people who participated in the chat session. I hope you enjoyed it as much as I did.
To read the transcript of the chat session, please head to Lifehacker
Every Monday, Lifehacker brings in an expert for an hour to answer questions via chat. Next Monday, November 12, 2012 at 3pm, Lifehacker will be kicking off “Spy Week,” dedicated to all things James Bond and mystery. ICORP Investigations Vice President, Steven Santarpia, will be joining Lifehacker to answer your questions pertaining to private investigations. Licensed Private Investigator Steven Santarpia has been a private detective for over 10 years and has worked many different types of investigations including infidelity/cheating spouse, industrial espionage, skip tracing and insurance claims.
More information to come including the link to join the chat session on Monday. To view past chats, visit Lifehacker.com.
For more information regarding ICORP Investigations, please visit their website.
245 Park Ave, 24th Floor
New York, NY 10167
Publicly available code allows hackers to disable Wi-Fi in a range of products.
by Dan Goodin - Oct 26 2012, 1:50pm EDT
The iPhone 4 and a slew of older devices from Apple, Samsung, HTC, and other manufacturers are vulnerable to attacks that can make it impossible to send or receive data over Wi-Fi networks, a security researcher said.
Proof-of-concept code published online makes it trivial for a moderately skilled hacker to disable older iPhones, HTC Droid Incredible 2s, Motorola Droid X2s, and at least two-dozen other devices, including Edge model cars manufactured by Ford. The Denial-of-Service vulnerability stems from an input-validation error in the firmware of two wireless chips sold by Broadcom: the BCM4325 and theBCM4329. The US Computer Emergency Readiness Team has also issued an advisory warning of the vulnerability.
“The only requirement to exploit the vulnerability is to have a wireless card that supports [the] raw inject of 802.11 frames,” Andrés Blanco one of the researchers from Core Security who discovered the vulnerability, told Ars. “The Backtrack Linux distribution has almost everything you need to execute the POC provided in the advisory.”
The Core Security advisory said that Broadcom has released a firmware update that patches the “out-of-bounds read error condition” in the chips’ firmware. Device manufacturers are making it available to end users on a case-by-case basis since many of the affected products are older and already out of service.
Blanco said the exploit makes it impossible for an affected device to send or receive data over Wi-Fi for as long as the DoS attack lasts. Once the malicious packets subside, the device will work normally. Other device functions are unaffected by the Wi-Fi service interruption. He said it’s possible the bug could be exploited to do more serious things.
“We are not sure that we could retrieve private user data but we are going to look into this,” he said.
Every couple argues, and every argument affects their intimacy as well as the emotional distance between them. Some disagreements leave only minimal or temporary scars that fade with time. The couple’s love continues to deepen, seemingly undamaged. Unfortunately, escalating or stinging arguments can leave deep and lasting fissures that damage relationships.
Many areas of conflict can determine the fate of a relationship, but the most crucial one is each partner’s underlying attitude is towards the other. Whether unconscious or intended, that core set of thoughts is often deeply embedded, pervasive, and negatively biased. As the argument heats up, one or both of the partners will fall back into this default position, dooming any hope of successful resolution.
Default positions are most likely to intensify in established relationships. The longer people have been together, the more they are likely to repeat established patterns. These ritualistic interactions usually emerge slowly in intimate relationship but can explode early on if any differences are pronounced and passionate. Because they are often intertwined with positive aspects, they can often stay invisible too long, causing much greater problems down the line. They are also deeply defended against rational inquiry, and can be notably resistant to change.
When these internal, fixed attitudes are not identified and corrected, the partners in an intimate relationship do not realize how much power they have to affect their disputes. They do know that most of their arguments leave them drowning in whirlpools of confusion, often not remembering what they were arguing about, or why their resolutions didn’t hold.
Negative default positions are often relationship destroyers. No matter how much a more typical relationship partner loves and values another, he or she will not be able to survive continuous onslaughts of negative default positions. It is the classic “I can’t win for losing” conundrum.
Anytime either partner comes from a core experience of a basic negative attitude towards the other, all disagreements will eventually be twisted into a one-sided criticism that defies reality. Those pre-determined expressions of invalidation will doom the targeted partner to a life of defending his or her basic worth. Unless martyrdom is the goal, that person will eventually leave the relationship.
If you can identify your own fixed, negative default positions, you can replace them with a far more successful set of skills that can turn frustrating, repetitive conflicts into positive resolutions. When you have mastered that new process, you can create a deeper intimacy through embracing each other’s differences and opening up to the possibilities of deeper intimacy.
Examples of Negative Default Positions
Wipe-outs are verbal invalidations that erase a partner’s estimated value in the moment. The partner using a wipe-out will use any interaction to exaggerate faults and minimize any positive contribution. Any attempts by the target of a wipe-out to rectify a misunderstanding, make-up for a mistake, or just to create a quality interaction, are met with challenges. These continuously criticized partners live in the tragedy gap of never feeling “good enough.”
Negative Default Position:
She’s such a loser. I wonder what excuse she’ll use this time.
She: “Hi honey. Dinner is going to be a little late. I got stuck in the market talking to our next door neighbor and lost track of time. How are you?”
He: “What do you mean, how am I? What’s that, your attempt to cover up breaking the deal again? I might as well never believe anything you tell me because you can’t keep your word. Why do I ever expect you’re going to do what you say?
She: “Hey, you’re being really mean. Let up. It’s no big deal, 15 minutes. Why are you so angry?”
He: “Don’t lay this on me just to get out of it. Just because it’s a small example doesn’t mean you get to minimize it. Don’t bother. I’m going out to get a hamburger.”
Some relationship partners are so concerned with being controlled that they won’t let their partners have the final say in anything. They will argue, invalidate, or dismiss any comment that might put them in the one-down position, even if their partners are correct. Their core feeling is that their partners will dominate them if they are not kept in their places. Because of their fear of being less-than, they don’t allow in any information that might change their minds.
Negative Default position:
He would run my whole life if I allow him to.
He: “I just saw Tim and Jean at the park and they want us to join them later for a BBQ? I told them we were free tonight. How about it, sweetheart? It’s a beautiful night and we haven’t been out all week. Might warm us up a little.”
She: “You always spring these things on me. I already have something I have to do tonight. Tell them thanks but maybe some other time.”
He: “You told me this morning that you were looking forward to the weekend because you didn’t have any obligations. You didn’t tell me you already had something you had to do.”
She: “Just because I told you I didn’t have any obligations doesn’t mean I wanted you to find one for me.”
He: “But you told me that you like this couple and wished we could spend more time with them. I don’t understand.”
She: “Just don’t make plans for me without asking first, okay? I’m not some kind of plug-in partner whenever you want to do something.”
Unfortunately, there are intimate partners who are so afraid that their desires will be thwarted that they imagine the worst possible outcome and pre-defeat their needs. Any partner behavior that smacks of a potentially positive outcome will be met with a rapid invalidation. They would rather live an unfulfilled life than risk disappointment or disillusionment. They usually attract positive people who want to save them from their continuous expectations of doom. Those locked-in expectations of loss can defeat even the most ardent of rescuers.
Nothing ever works out for the better, so why even try?
She: “Hi, honey. I’ve got great news. I got the promotion and the raise. We can finally plan that great vacation we’ve always wanted.”
He: “Does that mean you’ll have to work longer hours. You’re never home as it is.”
She: “Well, probably for a while. But why are you focusing on that? This is the opportunity of my life to finally make it and you were all for it. What’s the problem?”
He: “I’m not trying to spoil your deal. I just know that things don’t come for free and we’ll have to make sacrifices. I don’t want to count on something without knowing what it’ll cost. And it always does, you have to admit. So we get to go on a great vacation. They’ll take it out on you some way, and we’ll be the losers.”
Successful Default Positions
It is not possible for couples to eliminate all default positions. Everyone needs a confident and secure platform to fall back on when they are in a conflict situation. If relationship partners understand each other’s core attitudes and evaluations, they know what to expect in a disagreement. Until those core evaluations are clearly seen and changed when necessary, the couple will drown in repeated disagreements and are doomed to repeat them.
For positive conflict resolution, both partners must be willing to re-evaluate their default positions on a regular basis. They must strike a balance between validating each other’s positions while being while simultaneously being realistic about their differences. When couples are willing to openly communicate their core default positions to one another, they can evaluate together whether they are relationship supportive or destructive.
If a couple understands the danger of extreme negative default positions, they can begin making them more realistic. They must also reevaluate what they truly feel inside as a disagreement begins. Negative extreme positions highly correlate with eye-rolling, extreme doubt, and words of invalidation or defense. They are impervious to new data. It is similar to a courtroom situation where the gavel has come down and no new discovery is allowed.
Successful default positions have several things in common:
They are objective
They are flexible
They search for old negative patterns that hurt the relationship
Both partners are eager to rid themselves of any locked-in prejudices that can keep them from learning more about each other. They are interested and intrigued by where their fixed biases were formed, and why they have continued to use them.
Examples of Successful Default Positions
Most partners get into trouble when they argue because each loses perspective and holds more tightly to their own reality. As the disagreement takes on energy and fear of loss, they are more likely to fall prey to an old pattern that erases any reality but their own.
Intimate partners, as they strive to be deeply heard and validated by the other, can feel the negative energy begin to destroy that possibility, and stop it before it takes hold.
Successful default position:
You are important to me. Your way of looking at any situation matters to me. I never want to win at your expense or erase what you are feeling and thinking. Our best solution to any argument is a new truth forged out of mutual respect for each of our positions.
He: “I just don’t like that restaurant. The food tastes old, the waiters are rude, and the prices are too high. Don’t ask me to go there again.”
She: “I think you’re being really rigid about this. We’ve had good times there before. You’ve even recommended it to our friends. Why should one bad night make you want to cross them off our list forever?”
He: (heating up) “You’re not listening to me. I had a lousy time tonight. Why can’t you just accept that I’m angry and stop trying to change my mind?”
She: (Realizing they are losing objectivity) “Hold on, sweetheart. I think we’re sliding. My default position in the past was to make everything nice and yours has been to not get ripped off. We need to listen to each other. The food was bad tonight and I shouldn’t be making excuses for it.”
He: (relaxing) “And I shouldn’t be so goddamn opinionated. I had a day filled with stupid, rude people and I’m way overreacting. Sorry, babe. Let’s call the manager and tell him how we felt about it. He’s a great guy.”
When couples begin to differ, they often become rigid in their positions. As the argument heats up, that rigidity has to wipe out any other data in order to survive. What could have been an opening for seeing the world from more than one perspective quickly becomes a top-down need to win. As each partner stiffens, the other pushes back, mocks a giving-in, or disconnects. Both seem to fear that one opinion will stand at the expense of the other.
With the loss of flexibility, both partners are likely to forget that they can damage their intimacy if either of them is sacrificed. Childhood patterns of submission or rebellion increase, and maturity diminishes.
Successful default position:
I trust you. I know that you want me to feel heard and validated. Even if we are disagreeing in the moment, I know we will find a way to stay open to each other’s way of thinking. I need to stay flexible and not jump to conclusions because staying close is better.
She: “I am really upset about the way you treated my mom today. She didn’t do anything to hurt you and you were so rude. She left upset and now I’m going to have to fix it. I want you to call her and apologize. At least tell her you were just in a bad mood and didn’t mean it. And you need to do it tonight so I can get some sleep.”
He: (surprised and rebellious) “Your mom is the most overly sensitive person I’ve ever known. I didn’t do anything that bad. She loves being a martyr and sets me up. Why aren’t you calling her and telling her that she overreacted to me? Why is it always my fault? You cater to her.”
She: (getting angrier and more rigid) “There you go again, making it someone else’s problem. Why don’t you ever own up to your contribution when things go wrong? My mom tried to be nice even after you were so critical. I’m not backing down here. You were wrong and you need to admit it.”
He: (realizing that they were slipping into negative default positions) “This isn’t good. We’re both hardening and making the other person the bad guy. I know you want everyone to be okay and I love that about you. It’s just hard when you want me to be the fall guy and I know that your mom isn’t helping.”
She: (taking a breath and listening) “You’re right. I do always defend her and that ends up making the problem between us. It shouldn’t be that way. I guess I trust you to do the right thing more than I trust her and it’s hard for me to listen to her complain about you. That’s not fair to you. I need your help to figure out a better way to handle this.”
What Are Your Default Positions?
Here are some questions that will help you identify and change your automatic default positions if they are turning your conflicts into disconnects and destroying the love between you.
When you and your partner begin to argue, what emotions and thoughts are behind your words?
As a conflict between you heats up, what facial expressions would you see if you were to look into a mirror?
Once you are locked into an argument, what do you believe your partner is thinking about you?
When you are arguing with your partner, do you remind yourself of people from your past that modeled that behavior?
Which of your default positions bring you closer or turn you farther away from your partner?
Once you are backed into a corner, can you alter your position?
Have you practiced the same default position in other close relationships?
Does your default position in your relationship truly reflect the way you feel about your partner?
It is a very helpful starting point for positive change if you and your partner honestly answer these questions and then share your answers. Come out from behind any negative default positions. Encourage each other to integrate what you consistently feel inside with how you present yourself in a conflict interaction. That process may uncover deeper heartaches between you at first, but you will become closer over time. Ignoring them will cause much more damage in the long run. What you can see, you can change.
Private Investigators in NY specializing in surveillance investigations. Investigations include cheating spouse/infidelity, family law and insurance investigations. All surveillance video shot in crystal clear High Definition video. Also, our clients can view their surveillance video the very next day from our case management system. With so much riding on your investigation, why settle for anything less. Find out why we are an leader in the private investigation industry.
ICORP Investigations is licensed in New York, New Jersey, Pennsylvania, Connecticut, Colorado, Maryland and Florida.
Please visit our NYC Website.
ICORP Investigations provide expert computer forensic investigations, e-discovery, and preventative forensics to businesses, individuals and attorneys worldwide.
Types of Cases
- Wrongful termination lawsuits
- Employee theft of trade secrets, customer/marketing/sales data
- Copyright/patent/intellectual property infringement
- Divorce and other family-law matters
- Illegal internet activity or pornography
- Sexual harassment lawsuits, threats, or hostile workplace claims
- Use of business computers for personal work or outside ventures
- Industrial espionage and software piracy
- Breach of contract or violation of fiduciary duties
How can ICORP help you.
This afternoon the NYPD debuted their “all-seeing” Domain Awareness System, which syncs the city’s 3,000 closed circuit camera feeds in Lower Manhattan, Midtown, and near bridges and tunnels with arrest records, 911 calls, license plate recognition technology, and even radiation detectors. Mayor Bloomberg dismissed concerns that this represented the most glaring example of Big Brother-style policing. “What you’re seeing is what the private sector has used for a long time,” Bloomberg said. “If you walk around with a cell phone, the cell phone company knows where you are…We’re not your mom and pop’s police department anymore.”
The system was developed with Microsoft and paid for by the city for $30 to $40 million, and has already been in use for six months. The feeds compiled by the system are kept for thirty days, then erased.
In a live demonstration of DAS, the NYPD’s director of policy and planning for counterterrorism, Jennifer Tisch, showed reporters how the system responded to a recent report of a suspicious package. A description of the package (a closed “Jack Daniels” box) was shown next to its location. Video feeds within 500 feet of the package’s location that showed the location several minutes before the package was reported to police, so that the system’s operator could determine who or what placed the package there.
In another example, a radioactive isotope—Technetium-99—was detected and the officer at the helm is shown a description of the isotope. “I want to stress that this isotope has both medical and industrial uses,” Tisch said, before adding that it would be the officer’s judgement call as to whether the isotope meant that it was a terrorist threat or someone who had recently undergone “some sort of medical procedure,” as the mayor put it. “It takes some judgement to use technology,” Bloomberg added, presumably including on-the-spot radiography in his assertion.
Reports of suspicious cars can be followed up with license-plate scanners, which will track and beam back the location of the vehicle to the system so that the police can follow it in real-time—video feeds will also show delayed images to help the officers determine if the car is in a caravan. Arrest and driving records are shown alongside the camera image. “This system is the ultimate in domain awareness,” Tisch said.
Regarding the department’s recent request for information from Twitter for a threat made by one of its users, Kelly said that social media monitoring “is not done at this location,” and that “[The NYPD] only monitors social media for specific investigations. That’s the world we live in.”
The City will receive 30% on the profits Microsoft will make selling it to other cities, although Mayor Bloomberg declined to say if that money would go back into the NYPD. “Maybe we’ll even make a few bucks.”