All posts by admin

Computer Forensic Examiner Uncovers Digital Evidence of Criminal Activity

Nowadays, people are shifting towards the digital age, as many things have gotten digitized so it has become easier for humans to adopt digital environments. In this electronic age, computer permeates almost every part of our lives. The uses of computers, mobile phones, and other digital devices increase day by day, so it creates paths to criminal cases involving computers and the internet.  All of the bank transactions and records of our business activities are recorded electronically. The internet has made sweeping changes to how we work and live. In the digital age, everything is just a click away. From shopping to communicating, and now learning, almost everything can be done online. This changing trend has encouraged more and more cyber crimes or computer crimes to take place in the whole world.

So to fight cybercrime, an appropriate strategy needs to be designed. Computer forensic services Dallas primarily finds application in the field of forensic investigation of both criminal and civil litigations. They know how to gather and preserve the evidence, and can present the information.  They gather evidence in the form of documents, files, audio, videos, photos, images, emails, deleted financial statements and records by analyzing electronically stored information. They have extensive knowledge of computer systems and programs and the ability to retrieve information from them. Often, they can retrieve data that has been deleted from the device. To do this work they make use of particular computer forensics software and other tools. Digital forensic tools are designed to provide detailed reports of all the evidence and facts retrieved and preserve them in an organized manner to help find a successful resolution to the case and make informed decisions based on it.

A forensics specialist provides many services related to digital forensics, these include deleted data recovery, e-discovery, mobile phone forensics, cell site analysis and a range of other services. They work closely with their clients and inform them of any evidence that they uncover. They have a good understanding of all legal requirements. Preservation of evidence is also an important part of an investigation. The security and authenticity of the information are analyzed very carefully and handled only by the computer forensics expert. Once these steps are properly completed they make a report on the findings. All of the evidence is carefully analyzed and contain key issues that are relevant to that specific situation. The goal here is to put together everything that is relevant to that case and prove to be successful.

Choosing computer forensic services Dallas helps to ensure that the evidence is gathered, documented, and secured in a manner acceptable to the courts. At ICFECI, we are here to help you with your digital investigative needs. Feel free to contact us at 214-384-3246 for any questions you may have.

Know the Importance of Cell Phone Forensic Services

Cell phone forensics services is a branch of digital forensics also known as Mobile device forensics. Therefore, the forensic services rendered covers all types of mobile devices such as smartphones, tablets, iPad, GPS and drone units which have an internal storage memory and communication ability, etc. Mobile device forensics is generally done to recover any evidence from cell phones.

If there is criminal evidence hidden in the device like deleted files of recorded conversations, pictures, videos, text messages, emails, call history, contact lists, etc., inside the device, the cell phone examiner will be able to rectify and recovery them.

These devices prove to be a valuable source for many on-going investigations. Only an experienced and skilled person should look into the phone’s memory.

How to investigate a Cell phone?

The evidence found in the device main categories:

1) Seizer

2) Identification

3) Acquisition

4) Examination

5) Reporting.

Exploration inside the device requires a certain level of expertise.  When attempting to recover the deleted content such as contact details, emails, pictures, videos requires access inside the phone and the cell phone may be locked. Therefore the cell phone needed to be password free and pin codes or pattern free.  Otherwise, password or pin codes must be cracked.

While the Cell Phone Forensic Services Texas starts with handling the report in the best possible way by keeping them safe and under special measures. The cell phone examiner maintains the security of the device as well as examines it completely. There is forensic software which helps in the investigation of a locked device.

Forensic software is used to extract data, the software generates reports about all data contained in the cell phone and can also extract cloud data, cell tower data and location metadata.  Even internet search histories and browsing histories may be available with the last up to date record.

The bridge between the data found in the context and form meaning to the information must be established. For even small vital evidence, the forensic investigator of ICFECI needs to build an understanding of the facts by correlating evidence on chat messages, call logs, and location metadata.

How an investigation proceeds?

As every investigation is unique, so the forensic investigator must have definite procedures for different cases. Each of the above-mentioned categories has specific roles in the process of production of digital evidence. Also, the standard of the investigation is to be matched with the legal authorities.

Now you can have your own investigation with the help of ICFECI. You will no longer be a suspect or a victim of a mobile phone. You can contact us anytime you wish. We are here to help! We are only a text or phone call away -214-384-3246.

Investigation and detection of a Fraud

To investigate fraud, it is important to know why anyone commits a con in the first place. It is not new that your known employee turned into a scammer and end up in an investigation. Daily we see news of individuals involved in schemes and scams, hence the allegations of frauds.

It can be psychological or physiological that one wishes to scam another beside the real need of finances. One out of every 5 people gets involved in fraudulent activity. It is almost impossible to predict why and how a fraudster performs or commits a scam. Neither is it possible to know the person who will scam you nor to know when you will be involved in such activity.

Research shows that people under peer pressure or troubled family often ends up in major scams. Some confidently perform a bad activity to loot others and some follow their leaders to scam. There are people who get motivated to perform harm to others by the means of laundering money of the organisation for self-profit.

Donald R. Cressey, a Criminology expert coined a term ‘Fraud Triangle’ for people who scam in the workplace based on 3 major factors: perceived unshareable financial need, perceived opportunity, and rationalization. All of those factors arFe interrelated and lead to fraudulent behaviour.

According to Mr. Cressey, the fraud triangle originated from his hypothesis:

“Trusted persons become trust violators when they conceive of themselves as having a financial problem which is non-shareable, are aware this problem can be secretly resolved by violation of the position of financial trust, and are able to apply to their own conduct in that situation verbalizations which enable them to adjust their conceptions of themselves as trusted persons with their conception of themselves as user of the entrusted funds or property.”

How to Investigate Corruption?

It is important for the investigators to personally connect with the case and form a theory. All data, documents and records are to be equally checked and from them, a hypothesis can be drawn.  The available hypothesis is to be tested against the facts.

How do ICFECI handle any Investigation?

The investigators analyse every possible data, documents, records, and evidence.  Our investigators provide consultation to the clients as well as interview suspects and witnesses. We deal in all type of Fraud Investigations Dallas whether it is health and insurance, securities, bank, tax, public corruption, mortgage, and even Ponzi schemes.

Dan James is an experienced Certified Fraud Examiner and chief investigator in Dallas Texas that handles all white-collar crime. His expertise in developing evidence and gathering information helps many with critical cases.  

Regardless of the difficulty, our Certified Fraud Examiner Dallas has provided essential evidence to help resolve cases in favour of our accused clients.

If you are worried about facing charges of fraud and want help from a professional to investigate those allegations, contact us now at ICFECI 214-384-3246.

Finding the Best Private Investigator for Your Situation

Finding yourself in the middle of a situation is no big deal. These things often happen to the most decent people. However, avoiding your situation and taking things for granted would neither be decent for you nor for the other party. In such cases, it is important for you to understand that not doing what you are supposed to do would only worsen the problems. Clearing things would be better than your doubts gnawing at you all the time. It is understandable that all the situations can’t be confronted and sometimes you need to maintain security for such things.

It has been noted several times that people often get caught while investigating someone secretly and this often caused them more trouble. It is important for people to understand that doing these things on their own is risky and this is where private investigator Dallas comes in.

Hiring such professionals not only makes the task easy but also keeps you away from all the hassle and risks. These professionals act in complete confidentiality and follow a strict code of conduct to extract the best possible information without letting anyone know about their intentions or work.

There are various agents who work as a Private Investigator Dallas but you want only the best one for you. However, finding the best among them all could be a tricky business. The availability of so many agents and agencies could be a little confusing but a detailed analysis could, however, show you a different picture and you will understand the difference.

Why Choose ICFECI for Private Investigator Services?

When it comes to private investigator Dallas, ICFECI stands as the most prominent and most preferred destination for many people like you. The reason behind it is our unmatched performance and greater efficiency even when the situations are repulsive.

Our experienced professionals first understand your requirements and then act on the case with unparalleled dedication to provide you with all the necessary evidence and proof that you need to present your case. They also make sure that confidentiality is maintained throughout the investigation process to get proper proof for your case.

Confidentiality is the most important aspect for any private investigation to be successful. This is why our expert investigators start with you. Our professionals also make it a point to you that you do not share any information regarding the investigation with anyone, not even your family members.

They might even ask you not to tell anyone that you have hired a private investigator. These things are for your own good as any leaked information might raise an alarm.

All the investigators at ICFECI know how to collect necessary evidence all the while being within the limits of the law. We will develop facts that will help you make an informed decision regarding your circumstances.

Why You Need a Certified Fraud Examiner for your Business

Running a business is not an easy task. There are a lot of things that one should take care of in order to run the business smoothly. The one thing that the business owner should give the most important is security, especially when there are so many people who want to take advantage through unfair means. The cases of frauds are a common sight among all kinds of businesses. The business owner should make sure that there are no loopholes in their system that could be a potential cause of fraud. This is, however, easy to say but hard to accomplish.

Certified Fraud Examiner

It is also important to note that all the fraud cases are not always caused due to negligence. The cause of the fraud is as important as the fraud but that can be dealt later. The topmost priority should be dealing with the investigation of the fraud. The certified fraud examiners or the CFEs are the professional investigators who have undergone rigorous training for the sole purpose of investigating fraud cases.

A CFE provides investigation services for different types of cases. We at ICFECI offer investigation services for various types of frauds and white collar crimes including:

  • Health and insurance fraud
  • Securities, mortgage, bribery, and cases of public corruption
  • Bank fraud and bankruptcy frauds
  • Ponzi schemes
  • Tax frauds

There are various certified fraud examiner Dallas that you can hire for your business for the following purposes:

Prevention of Fraud

A certified fraud examiner is well accustomed with the working of a business or an organization. A CFE is well trained to identify the frauds by analyzing financial records and can also detect cases of theft if any. ICFECI is a renowned agency offering services to businesses in need of a certified fraud examiner. Our unabated success is due to our years of experience in this field. Our team comprises of experts who set strict deadlines for themselves to ascertain an early detection of fraud. It is better to hire a CFE before you start regretting it.

Compiling Evidence to Present in the Court

A CFE gathers all the evidence regarding the fraud and also determines the amount of financial loss (if any) and compiles it all to present it to the court of law. The services of ICFECI are remarkable at this point as our investigator has the support of a team which also includes our forensic team and this helps our investigator to work faster.

Litigation Services and Consultancy

A certified fraud examiner is also compatible to provide litigation and consultancy services. Our experienced CFEs are always ready to provide litigation and testifying services in case of need. Additionally, our expert investigators also offer consultancy services to the clients and their attorneys.

In the situation where you have discovered fraud in your company or if you are facing any charges of fraud, feel free to contact us and discuss the matter openly. We are always here to help you.

Damaged Cell Phones, a “Silent” Witness What is a Certified Cellular Master Technician, Level 3? Certified Cell Phone Examinations

The extent of most people’s forensic knowledge of electronic devices comes from watching television and movies. We often see phones are damaged, dramatically, in order to destroy evidence. Whereas this makes an excellent plot twist, the truth is actually much more dramatic—in most cases, data recovery from damaged cellular phones and USB memory drives is possible.

ICFECI has the ability to “put Humpty Dumpty back together again.” Approximately 35% of cellular devices examined by ICFECI have been purposefully damaged. Other issues may involve accidental screen damage, water damage or electrical power damage to the cellular devices. Regardless, any damage, intentional or not more than likely will not prevent forensic recovery of data, texts, photos, browsing history and usage.

Depending on the degree of damage, teardowns for recovery of digital devices is doable. In addition, complete disassembly and reassembly of cellular phones, tablets, computers, and USB memory sticks, albeit complicated, generally yield the secrets of the device.

ICFECI has a Certified Cellular Master Technician, Level 3, on staff for repairs and data extraction from cellular and USB flash memory devices, all manufacturers, any age, and in any condition. ICFECI provides Certified Cellular Examination and analysis using court-validated digital forensic services with tools. Additionally, ICFECI offers Chip-Off and JTAG Extraction and Analysis.

If you, your client, or loved one has a digital device involved in a legal matter, rest assured, ICFECI’s goal is the forensically sound recovery of data.  Our certified technicians can bring digital devices back to life. Don’t hesitate to contact ICFECI when you need a busted device to tell its own story.

The Justice Department Has Opened a Criminal Investigation

Problems occur when people are somehow negligent of the most obvious things, which is a natural human error. It is normal to be in the middle of a problem. Everyone faces situations which are complex and not under control. People often think that their situation is going to make them look like a compromised personality and this mentality is totally flawed. The situations never cause any harm to the general image of a person. However, not facing a situation in a determined manner will surely be a wrong indication.

Criminal Investigation Service Texas

There are certain legal procedures, which often seem to be getting a little out of hands. People often think to give up on those and live in peace. Whereas, the best solution lies in facing the problem with determination and planning.

However, it is very hard to handle the legal procedures by a common person or a defendant and this is why people require professional help for such cases. It is because of the requirement of these professional services that the number of keyword searches for ‘criminal investigation service, Fort Worth’ are rising by the time you are reading this article.

The basic task of the criminal investigators is to provide as much evidence as possible to help the defendants so that they can represent their case in the best possible manner. Even individuals requiring help are seeking professional help for such cases. The basic idea behind such services is to bring justice by providing enough evidence to save an innocent.

ICFECI is widely known and accepted as one of the leading service agency for criminal investigations. Our dedicated team members make it a point to collect all the relevant information regarding the case and hand it over to the defendant in order to make sure the justice is not compromised.

Our investigators have years of experience which makes them experts in this regard, with full knowledge of current scenarios and procedures. The list about the advantages of hiring our Criminal investigation service Fort Worth is endless. However, here are the main advantages that you should definitely know:

  • Our experienced investigators are dedicated and committed to uncovering evidence. They use their experience to guide them through and keep an open mind for unconventional things.

  • We combine traditional methods with modern techniques. We conduct pre-investigation trials, gather information and evidence, examine and/or investigate people linked to the case. Then we prepare a digital presentation which is comprehensive and is also accepted as proof.

  • We have all the necessary resources, reach, manpower and infrastructure to extract evidence even in the most twisted and complicated cases.

  • We make it our top most priority to provide the evidence within the time frame.

  • Our criminal investigator works with a team to collect all the related information and to channelize the most important evidence for the presentation.

  • We are outright honest and we don’t believe in false assurances.

Apart from the listed points, there is a lot more to mention. Feel free to contact us for any further information or assistance regarding any of our services.

Role of Modern Private Investigator

With the increasing crime rates in the country, it is important that we ourselves adopt some preventive measures so as to live a secured life.  It requires reliable and easily reachable services that can help in providing ultimate security. Here comes the role of a private investigator. There are many issues that an investigator deals with; they include area surveillance, child custody, and computer forensics and background investigations. The private investigators possess excellent approaches and effective skills to carry out all type of work which requires special attention to perform the work effectively. The Private investigators perform all their tasks confidentially by maintaining the privacy of information so that information does not leak out in any case.

Private Investigation

A private investigator helps you find documents that pertain to, government agencies’ filings, court records, property ownership records in connection with vehicle registrations, the authenticity of witness statements. Investigator means somebody who performs detailed examination and searches for the facts. Facts are needed to support a point somebody is attempting to make. Without these types of facts, the person may not be able to substantiate their point of view beyond the reasonable doubt. To help the individual prove their point beyond a reasonable doubt the work of a private investigator is vital, for through their efforts and skill in uncovering facts a point will be substantiated or fail to stand up.

So to put them together, the private investigator operates on behalf of individuals who need to prove their point of view to police groups or other governmental law enforcement services, when the individual lacks the skills to carry out the work themselves. Of course, private investigators are also called in by corporations who want to gather evidence on perhaps an employee or any other person. Insurance companies also use the services of private investigators if they suspect that a policyholder has made a fraudulent claim. The private investigator may spend months working on a case drawing together the facts that they will present to the people or organizations that employ them so that they can decide if their suspicions were justified or not. They are highly qualified, smartly trained and rich in intelligence. They have fine-tuned their researching skills to manipulate a variety of databases and know the ins and outs when it comes to accessing tPhe important records.

Private Investigation

Many of these private investigators often specialize in a particular field. Some may focus on intellectual property theft, for example, they help clients stop illegal activity, investigate and document acts of piracy, and provide intelligence for prosecution and civil action, where others may deal in developing financial profiles and asset searches. These investigators are always required to keep detailed notes, and they have to be prepared to testify in court regarding any of the investigations carried out by them. Private investigators assist attorneys, businesses, and the public, with legal, financial problems.

The team of investigators works for their clients with full attention to the case. They also collaborate with the police department and the law enforcement investigators when necessary, which will enable them to combined forces to achieve the goals. The main focus of their investigation is to find out the truth and thus bring criminal activities to justice. Hire the best private investigator by visiting us at www.icfeci.com. Get answer to all your queries with us.

THEN THEY CAME FOR ME

As a criminal investigator, I am sometimes called on to piece together the stories of those who cannot speak for themselves—the very young and the very old. I believe in the sanctity of life. A recent spate of cases I’ve worked, combined with an uptick in news coverage for these kinds of cases, has me worried. I wonder, are we heading down a slippery slope that will take us back in time to the dark days of the Holocaust?

criminal defense investigator

The inevitable question that is asked in abuse, neglect and death cases of the very young and very old is HOW CAN THIS HAPPEN?

The Holocaust Museum, in Washington DC is a haunting and often disturbing look back in history. It’s a physical place that endeavors to answer the question with relics and artifacts. It does so much more. It challenges us to look at ourselves.

First, it’s important to understand that the slippery slope I mentioned above doesn’t start with a widespread killing mechanism. The Nazis started with sorting humanity in Germany and growing those programs in the countries that were subsequently conquered. At first there were simple charts, genealogy in nature. Your life had value if you could “prove” your “purity.” Next came medical examinations of hair and eye color. Something as common as brown eyes, or dark hair could lower your status.

The Nazis then determined who could serve in the military, and that was mandatory. The non-pure were sorted into two groups: those who could work, and those who could not. Those who could not work, included the elderly, sick and disabled.  The year was 1939, the program was dubbed  “T4”. And ultimately 90,000 disabled where euthanized. A mere 80 years ago.

From that point, the killing machine was in full force.  We know the end of the story.  The “Final Solution” ultimately killed 11,000,000 people.  Of course we know the tragic plight of the Jews , estimated at 6,000,000 deaths.  But the killing spread from the disabled, and very young, Jews, then Roma “gypsies”, homosexuals, Jehovah’s Witnesses, ex-convicts, and others who resisted occupation (political dissidents).  Add in the Soviet prisoners of war, and the number exceeds a staggering 17,000,000. And, remember, it started with “mercy killings” of the disabled. (The Nazis even produced a propaganda film in which a German man kills his sick wife to encourage ordinary people to join the “cleaning” of the German race.)

A growing number of countries, including the US, have legalized assisted suicide. Although on the surface it seems reasonable to allow people who suffer from physical pain and diminished quality of life to end their lives, there is a recent shift in the “right to die” movement.  People with treatable and manageable conditions such as depression are making petitions to die. Some European countries have dealt with cases of rapists and murderers who want to die rather than face prison.

Here in the US, we face some troubling realities.  We are living longer. Our elderly are covered by Medicare, and this government insurance program approves and declines medical procedures on our aging population. Two startling statistics arise in consideration of care: 1) 5% of patients at the end of life consume 50% of the costs for Medicare, and 2) in the last 6 months of life, it’s estimated almost 30% of a person’s lifetime healthcare costs are spent. Are we at the point where cost considerations are the slippery slope I’ve mentioned?

I’m concerned also about so-called partial birth procedures. At what point do those go from voluntary  and used to spare a mother’s life to compulsory? I can see in the not-so-distant-future when, again, costs could mandate these lives aren’t cost effective.

It’s easy to say, I’m young and healthy. My insurance wouldn’t do that. The US appears to be moving to “Medicare for All.” If, and when, we become a single payer system, will all life be valued and protected? Or will we begin sorting ourselves?

German pastor Martin Niemoller wrote a poem called “First they came…”  It’s been edited and changed over the years, and originally was written to criticize the German intellectuals who did nothing as the Nazis began purging unwanted populations.

“First they came for the socialists, and I did not speak out—Because I am not a socialist.

Then they came for the trade unionists, and I did not speak out—Because I was not a trade unionist.

Then they came for the Jews, and I did not speak out—Because I was not a Jew.

Then they came for me—and there was no one left to speak for me.”

Now, replace the words I bolded, with words that describe yourself, your friends, your religion, your politics, your race, etc. It’s a haunting reminder from just the last century.  Let’s never look back on our society and ask, “HOW DID THIS HAPPEN?”

I’m hopeful we can live in such a way that respects life. All we need do is live by the “do unto others” mantra, and vote for those representatives that will continue our collective respect for life. We must hold each other accountable for the least among us. I’ve already chosen to take a stand for the weak and broken in society. I’m hopeful you will stand with me.

Dangerous Digital Playground – Perverts, Pedophiles and Pimps ARE Hunting for Children

It’s an arduous task protecting children. After it’s too late, devastated parents want to know how their children could have been protected. As a criminal defense investigator, almost one-third of my cases involve sexual exploitation of children.  Sadly, I’ve handled more than 1600 these tragic situations. In the past, I’ve spoken to church and civic groups on this unsettling and disturbing topic.

Digital Forensics Expert

One example of a case that haunts me: I was asked to forensically examine a laptop belonging to a thirteen year old child. The laptop contained the typical social media platforms. Within those social media platforms were pictures, videos and text of an inappropriate and enticing nature, sent directly to the child. There were subsequent text messages and photo exchanges. The end result was tragic.

Everyone seems to understand the dangers of The Internet, and we know that there are plenty of websites that are inappropriate for minors. I want to be very clear. Fewer kids are using email and websites. That means, social media platforms are the playgrounds for perverts, pedophiles and pimps.

WHO?

I use the term “predator” to cover the “3 P’s” of the digital playground: perverts, pedophiles, and pimps.  I define perverts as those who derive sexual gratification from something that is illegal and/or outside the “norms” of society.  Pedophiles are bit more specific—adults who enjoy sexual acts with children. There are other, more specific classes of “-philes” that identify specific age groups of minors.  And, the pimps? These are the “entrepreneurs” of the dark world of sex crimes.  Motivated by money, they profit from their illegal sexual “business.” To keep it simple, I’ll call them predators.

Predators hunt.

Minor children (male and female) are being targeted by predators (male and female). It’s not just opposite sexes to be concerned about. An older female (even an older teen) will befriend a younger girl on social media.  The same is true for boys. This has nothing to do with a child’s sexual orientation. To a predator, a child is an “object,” not a person.

WHAT?

Predators are seeing to “groom” (introduce, foster and normalize) children into sexual activity.  Although many believe this is limited to actual physical sexual acts, it’s much broader and complicated than that. Predators seek photos and videos of children dressed, naked, and “taking direction.” Once a child is groomed into a sexualized situation, the predator has opened the door to personal contact.  This can be a “date” (in the predator’s mind), but I’m seeing any contact feeding human trafficking.  Children are bought, sold, and traded across jurisdictions for sex.

WHERE?

These tragedies are happening across the US, and all over the world. If a community has cell towers, computers, and digital devices—the predators are already there. We have a tendency to think, “This could never happen here.”  It’s happening.  It’s already happened.  And, it will happen again.

WHEN?

Cellphones, tablets  and any type of computer (including game systems) are “open” 24//7. Predators are hunting for children every morning, noon, and night.

HOW?

Most predators make outbound contact with a potential victim on a social media platform by “liking” or commenting on a topic or photo your child is interested in.  Frequently called a “DM” (direct message), the predator will often contact a child via the platform’s messaging plug in features. The messages often start with humor, or a subject a child has expressed interest in via a “fan page,” group, or “friend of a friend.” As I said above, these people are experts in children. From the initial contact, the predators often encourage children to download other apps, such as WhatsApp, SnapChat, or others.  (Predators mistakenly believe these apps are 100% private.) Once contact is established, the process of grooming a child for exploitation begins. Within a few messages, these predators can convince many children to send photos, video, and identifying data.

WHY?

This is the most asked questions by the families of victims. It’s also the hardest to answer. The bottom line is this, some people are evil.

There are people that are sexually attracted to children. There is no polite way to convey this concept. We can indulge in long theoretical discussion of “if” these people were once victimized.  But, the bottom line is this is a horrific crime.

And, the emerging reality—exploitation of children is a business for some predators.  There are people on social media, both male and female, that are actively “recruiting” children into prostitution and human trafficking.  They “pimp” (sell or rent) a minor, male or female for sexual purposes, for money. The bottom line is this, exploitation of children is a crime.

CONCLUSION:

Next time as an adult, you receive a message to be friends, and the messages have inappropriate materials, know that your children are receiving the same. Yes.  This IS happening if your child is on social media. My advice is this: Social media is not the place for children!  If your child must be on social media, monitor what they are doing.

As technology continues to change and expand at a breakneck pace, we have to be vigilant regarding social media. As quick as I can type, there are new websites, apps and social media platforms being released every day.  Know what’s on your home computers, your children’s phones and other devices, and keep the communication in your home flowing both ways.  This is an important topic, and we will circle back around to additional specific strategies in the very near future.`