50 Best Crime News Blogs of 2013

Crime news that is ‘fresh from the beat’ helps police departments and individual law enforcement officers connect with the public.  The ability to communicate in real-time goes both ways, providing opportunities for citizens at-large to make genuine contributions to their own safety.  Police and crime news comes from various sources, including general crime journals analyzing trends in criminal justice and law enforcement.  Crime news blogs narrow the focus even further, exposing crimes as they happen and giving readers the information they need to engage with law enforcement officers during emergencies.  These thought-provoking sites stay on top of social trends in criminal behavior, providing crime information for concerned citizens.

Are you out there looking for CLEWS?

Are you out there looking for CLEWS?

  1. CLEWS – Your Home For Historic True Crime on the World Wide Web.  Genuine accounts of the people and crimes that shaped the historical criminal justice system provide endless fascination for those who study true crime.  Laura James maintains this blog devoted to the true crime genre, focusing on noteworthy cases that have gotten attention in the past.  Links are provided, leading readers to additional resources and to sub-specialty pages that deal with particular types of crimes.  Case studies examine individual characters from the past, as well as historically significant crimes of yore.
  2. Midtown Miscreant – The Midwestern author of this blog addresses social and civil rights concerns impacting an entire generation of Americans.  Mark Smith, the Miscreant, poses interesting questions about past and present crime news, tying current events to the causes and solutions of modern unrest.  Legal updates and commentary about developing legislation allow readers to digest information in easy to understand ways, opening the door for change.  Personal reflections about race and civil rights compliment the crime news found here.
  3. Seattle 911 – This police and crime blog provides detailed updates about crimes and criminals in the Seattle area.  Breaking news about thefts, break-ins, shootings, fires, and other illicit activities is presented in a straightforward crime news format, including pictures from crime scenes and updates as investigations unfold.  Local coverage gives the best indication of the actual outcomes of Seattle cases, assuring citizens that police have their security in mind.  Contributing authors cover domestic incidents leading to injury as well as shootings and other newsworthy crimes.
  4. Photo by J D Mack on Flickr

    Photo by J D Mack on Flickr

  5. The Crime Scene – Following crimes in your area is easy if you live in Southwest Missouri.  This crime news blog is maintained to keep people in the area informed about criminal activity.  Stories about police officers and true life situations they encounter on the job are presented from the law enforcement perspective, alongside questions about ethics and principles of effective policing.  Overall, the content is genuine, advocating for men in blue by presenting their side of the story.  Crime fighting success stories are highlighted too, including details about citizens that prevailed in the face of crime, and refused to be victims.
  6. What the Judge Ate for Breakfast – News from the Wichita court system is found here, keeping Kansas residents up to speed about local legal events and pending criminal cases.  The blog also follows convicted criminals through the penal system, keeping tabs on when and where they serve their time.  Legislative developments linked to the criminal justice system, especially in Kansas, provide additional areas of study for contributors to this blog, stimulating support for stronger state penalties in some cases.  Recent articles include coverage of changes in sex trafficking laws and detailed analysis of court cases working their ways through the Kansas State criminal justice system.  Posts that relate to the same topic, an individual criminal’s quest for clemency for example, are grouped in series’ so readers can easily access the entire group of articles discussing a particular topic.
  7. True Crime Report – One after another, recent crimes are detailed in daily posts about criminals and the creative ways they test the criminal justice system.  If not for the serious nature of some of the crimes, it would be easy to view the revolving door of failed criminals as entertainment.  Contributing authors explore crimes from the headlines, including rape, assault, and even bombings.  Homicides get a lot of attention, due to the severity and high-profile nature of the crimes.  Individual criminals are profiled in a section of the website dedicated to repeat offenders and those with particularly jaded senses of criminal justice.  The updates included do not discriminate by location or type of crime – true crime coverage cannot be scripted.
  8. The Homicide Report – Los Angeles Times local coverage includes a featured blog used to update readers about crimes in the region.  The site serves as database of crimes impacting Los Angeles County residents.  The interactive map feature shows pinpoint crime details, including location, suspects, and other relative information.  There is a focus on violent crime in some posts, but the idea is to promote public safety for less severe crimes too.  A forum on the blog allows readers to share stories and remember loved ones, but it also helps communities plan for better security policies.
  9. New York Post Crime News – Crime news includes locally important New York State police blotter reports, but overall national security is also at play in the nation’s most prominent city, NYC. Criminal activity, as well as warnings and alerts about possible threats are included in this New York blog, which monitors criminal justice channels to provide up to date information about plots and crimes.  Individual criminal profiles include updates about suspects on the run, alerting citizens to potential hazards before problems arise.  New cases are covered as they emerge, so the public remains well-informed about developments occurring close to home.
  10. Dumb Criminals – The theme is carried throughout the content found here, with periodic updates providing glimpses into the less talented lives of failed thieves and criminals.  Posts are organized into categories, allowing ready-access to various types of crimes, and the true stories of unsuccessful criminals.  Arson, robbery, vandalism, fraud, and assault are only a few of the criminal areas of interest, providing great source material for tongue-in-cheek reporting.  Stories involving alcohol impairment are grouped together for full appreciation of the entertainment value provided by drunks.
  11. DumbCrooks – Not everyone is cut out to be a criminal, so the failure rate is high for upstart criminals lacking talent and experience committing crimes.  You could argue that crime is dumb by all accounts, but some cases stand out for having particularly silly features.  Recent entries at Dumb Crooks include features about the fate of failed criminals, like one who plunged to his death fleeing from police and another whose own checking account information was on the hold-up note used at the bank.  Despite the head-scratching antics of certain ‘professional’ criminals, the cases getting attention are real.
  12. Photo by J D Mack on Flickr

    Photo by J D Mack on Flickr

  13. U.S News on NBC NEWS.com – Crime news from across the country dominates the content of this major news source blog, but there are also international stories posted discussing how world events impact American criminal justice.  The site features contributions from experts in criminal sociology, as well as reports from field writers covering developing stories.  Content changes hourly, keeping readers refreshed and interested.  Criminal and civil cases are followed through the justice system, with article series’ that focus on particular criminals and events.
  14. Federal Bureau Of Investigation Blog – Information available on the World Wide Web comes from all kinds of sources, so why not go directly to one of the country’s largest law enforcement agencies for up to date crime information?  The FBI maintains a thoughtful resource used to update members of the public and other law enforcement agencies about progress on current cases.  New cases are opened regularly, prompting examination by contributors to the FBI blog.  Dozens of categories are used to break-down crimes by type, including those against certain types of victims.  By clicking on category links, readers enter pages of crime news devoted to certain crimes.
  15. Computer Crime Research Center – As technology advances, so does criminal behavior that exploits the technology.  Where there is something to be gained from copying, stealing, pirating, or otherwise misappropriating technological advances, criminals find a way to illegally pursue unjust rewards. As a result, dedicated blogs like this one strive to keep pace with emerging technology and the criminals it attracts.  Cybercrime and internet security solutions are discussed in articles gleaning input from cyber-crime experts and industry heavy-hitters with something at stake in the field.
  16. Coptalk.INFO – This site contains practical information designed to help regular citizens navigate among opportunists and criminals. Advice about safety and real-life case studies enlighten readers about crime and police work, encouraging them to cooperate with law enforcement officials.  Recent posts detail step-by-step procedures to follow when you get pulled over on the road, and updates about widespread scams known to lure people in.  The site also explores social issues and the impact they have on crime trends.  Readers interested in the local crime scene find additional information among the dozens of frequently answered questions archived on the site.
  17. Mafia Families – Criminology fascinates readers, who sometimes get caught up in particular crime news topics.  Mafia activities and the famed connections between immigrant families is a steady source of interest for crime buffs, so crimes attributed to organized groups are heavily scrutinized online.  This blog takes general information about reputed crime families, and offers it alongside current events reporting; especially happenings related to La Cosa Nostra and other crime families.  Individual members of high-profile families are discussed in terms of the traditional family structures of organized crime.
  18. Crime in America: the name says it all

    Crime in America: the name says it all

  19. Crime in America – All kinds of crime commentary is shared on this site, compiled in easy to find categories that compare crimes of similar types and those sharing similar victims.  Topics include general information about crime, as well as specific break-downs of individual city crime rates and statistical trends.  The information can be dissected in a variety of ways, to shed light on certain areas of criminal justice.  Crime news can be searched in the same way.  Users clicking on sidebar topics like burglary, or assault, are taken to areas of the blog dedicated to reporting certain types of crimes.  The comprehensive nature of the resource allows it to stand-out among countless, less-informative crime news blogs.
  20. Local Safety Report – Home security and local safety are discussed on this blog, which features links to commercial alarm and safety companies.  The idea behind the site is to provide information about local residential areas, informing citizens about dangers and preventative security measures.  Crime news finds its way into blog entries, as a way to reinforce the role people play in their own safety.  Willow Shield, the blog author, is supported by a number of expert contributors tasked with enlightening readers about prudent safety practices.
  21. The People’s Champion – Human interest stories are laced with advocacy in regular blog posts on People’s Champion.  Guest contributors wave the flag for personal freedom and equality among all races and ethnicities.  Other sociological issues are discussed, with special attention given to the ways they influence interactions between diverse peoples. Crime news includes updates about criminals of note, as well articles about victims of crime, especially those of color.  The politics of race and its role in the criminal justice system are consistently explored in blog entries on the site.
  22. Crime, Guns and Videotape – Posts cover current events and offer information taken directly from court documents and filings.  Crime news about recent cases and the subsequent criminal proceedings comes from experts familiar with police work, and the blog is maintained by an author with experience working in law enforcement.  The investigative journalist is a licensed private investigator who worked on the Chicago police force, giving him a unique perspective about criminal justice.  His commentary covers topics ranging from Supreme Court decisions to self-defense techniques.  Court developments, especially those related to gun violence are consistent themes covered in the blog.
  23. a href=”http://crimeblog.dallasnews.com/”>Crimeblog – Sponsored by the Dallas Morning News, this crime news blog expands coverage of headline-making crimes, and keeps readers updated about Texas criminals.  The resource allows citizens to contribute with tips and accounts of real cases.  Updates about criminal activities are supported by pictures and video enabling residents to identify criminals.  Recent posts track court cases, following them through prosecution, until convictions are obtained.  Crime reporters, editors and invited guest contributors provide regular insight into current crime related events.
  24. Photo by J D Mack on Flickr

    Photo by J D Mack on Flickr

  25. Crimescene Blog – California crimes are explored here, in greater depth than is sometimes possible for mainstream reporting agencies.  Details focus on grand cases, involving homicide and high-ticket property crimes, but they also include attention to lesser cases of theft and fraud.  Timely posts discuss the possible causes of a recent train accident and the identification process that will be used to I.D. a body discovered in Altadena.  In addition to coverage dedicated to fires, crimes, and municipal developments in California’s cities, the blog tracks area residents who become crime victims while they are away from home.
  26. Berkeleyside Police Blotter – Maintained by California’s largest independent news source, the crime blotter blog keeps residents informed about crimes occurring in the area.  Entries are arranged by date, easily tracking crime trends in particular parts of the city.  The listings, detailing the who, what, where and when of each occurrence, are supported by an interactive map that charts the geographic position of every crime committed in the region.  Vehicle thefts and violent crimes are covered, as well as actively unfolding and solved/closed petty crimes.  Readers use the comment section of the blog to share their own stories about local crime, further reinforcing the neighborhood crime prevention networks facilitated by the blog.
  27. West Seattle Blog – The World Wide Web and the spread of information it facilitates bring people together from far flung localities, but the internet also serves to link members of local neighborhoods, uniting them with regional crime news blogs.  Seattle residents learn about recent crimes and what is being done to solve them, by reading posts on this West Seattle crime blog.  Reporting about individual crimes is an important function of local crime news blogs, but resources like this Seattle example take it a step further, looking at neighborhood implications associated with vacant storefronts, foreclosure trends, and spikes in certain types of crimes.
  28. Chicago News Report – Residents of Chicago and surrounding areas benefit from this comprehensive crime news blog, alerting them to crime trends close to home.  From Bucktown to Ravenswood, users are invited to click on links that open-up into areas of the blog devoted to particular locations.  Beatings, muggings, shootings and other high-profile Chicago crimes are covered alongside national stories about criminal justice outcomes occurring beyond Illinois’ borders.  By clicking on the South Loop, for example, readers learn about events that impact that area first, before being directed to news stories concerning surrounding areas.
  29. Crime and Courts News – High-profile national cases draw the greatest levels of coverage here, including homicides and those cases shrouded in controversy.  Breaking news is addressed with posts about unfolding cases, especially those entering the courts.  National media coverage is expanded with supporting blog posts, providing glimpses into what the actual juries use to determine their verdicts.  Users click on links covering certain stories, opening-up article series’ that provide details about the case, including comprehensive analysis from crime experts. Tweets from suspects and other role-players within the criminal justice system are tracked regularly, creating a sense of insider access for blog readers.
  30. Metro Crime and Court News – The New Orleans Times Picayune provides crime news for this regularly updated blog about Louisiana criminal justice.  Posts help residents track crime statistics and stay on top of active police investigations.  Individual Parish news contained in blog articles pinpoints crimes committed in the New Orleans area, fostering greater cooperation between police and residents.  Court cases that are especially recognizable to local residents are covered by posts that keep civilians informed about convictions and sentences.
  31. SFGate Crime Blog – This San Francisco blog, maintained by the Chronicle, contains information about Bay area crimes and investigations.  Individual crimes are tracked for readers, who contribute valuable feedback in the comments section of the blog.  Beyond actual crimes occurring in the region, articles explore wider policy implications, like how the war on drugs impacts society and how many strikes should be allowed to minors in the court system.  Videos and photos included in blog posts help readers contribute to the crime solving efforts of professional law enforcement officers, giving them better tools for staying safe.
  32. Crime and Safety Blog – Tracking crime trends in South Florida is aided by this Sun-Sentinel blog, dedicated to solving and preventing crimes within the state.  The site keeps citizens informed about scams and criminal efforts to take advantage of them, referring to real-life examples of crimes against Florida residents.  The site carries recommendations from the attorney general, advising residents how to properly respond to criminal threats.  Breaking crime news is also supplied, giving readers up-to-the minute details about developing investigations. Sharing timely crime news clears more cases and allows law enforcement to actively collaborate with members of the public, providing the highest possible levels of security.
  33. Crime Time – Criminal justice developments in North Texas, and beyond, are tracked with the help of this Star-Telegram sponsored blog devoted to reporting about criminal behavior in Texas.  Articles present factual accounts of cases that are working their ways through the Texas criminal justice system, reviewing relevant charges and following the cases through the courts. Texas law and legislative policy are explored generally in recent pieces, but articles also focus on individual North Texas departments.  Firefighter news is also present, especially when cases include suspected arson.
  34. BPDnews – This recently launched blog, sponsored by the Boston Police Department is designed to provide general information about safety and well-being, in addition to specific data about crimes and police work.  The underlying mission of this department resource is to support public safety, which is accomplished with the help of timely crime news posts.  Current investigations are followed closely by expert contributors, who use cases as platforms to blog about social issues.  Each week, a most-wanted feature is included on the site, highlighting a crime or criminal for greater scrutiny.  The week’s most- wanted criminals are often responsible for violent crimes like stabbings, homicides and sexual assaults.
  35. Crime Blog – KHOU.com is responsible for the content contained in this Texas blog.  News organizations are tasked with keeping developing events in the spotlight, particularly when time is of the essence (as it is in most active police investigations).  Crime news, presented timely, gives citizens an interface with law enforcement professionals, increasing their ability to participate in the criminal justice system.  This Texas blog features sketches of crime suspects and details about their movements, preparing civilians to identify them moving within society.  Rewards and other incentives offered for participating are outlined in posts that give readers even more reasons to play a role in solving Texas crimes.
  36. Arizona Daily Star Crime Blog – Local crime updates provide insight into Arizona crime trends and help local citizens stay safe.  Daily posts highlight crime news stories taken from the headlines, dealing with smuggling, drug trafficking, and other significant crimes.  Posts track arrests in the area and contain detailed information about the crimes and the criminals involved.   Links to additional resources cover courthouse developments and other blog topics within the state criminal justice system.  Major Law enforcement agencies like the FBI are also linked to the site for federal crime information.
  37. Photo by J D Mack on Flickr

    Photo by J D Mack on Flickr

  38. Anchorage Daily News Crime Blog – Alaskan residents are subject to criminal behavior that does not occur nationwide, so local resources are important for tracking crime.  This blog, maintained by the Anchorage Daily News provides timely information about local crimes.   Recent stories contained alerts about local police impersonation victims and highlighted a major cocaine distribution ring bust.  Despite its remote location, there is no shortage of crime news coming from Alaska, where non-lethal rubber-tipped bullets were recently required to stop a suspect.
  39. Crime Library – This regularly updated blog is maintained by the entertainment network, TruTV.  The stories feature accounts of real life criminals and track them as they learn about justice.  The nature of the host brings some measure of sensationalism to the site, which focuses on the most interesting crimes available for discussion.  Glimpses into the minds of criminals and the methods they use are always fascinating, so readers are willing to take the good with the bad, allowing TruTV to hand pick its own variety of crime news.
  40. Findlaw Blotter – The past predicts the future, as they say, so ready-access to criminal court case records is a valuable resource for people studying crime.  This blog helps illuminate current criminal trends by chronicling those of the past.  Articles provide advice about crime and tips helping readers avoid the negative consequences of crime.  Crime prevention and common sense work together to minimize the impacts of criminal behavior, so police blotters provide valuable insight into effective measures for reducing crime.  Informational sidebars are also part of the blog, expanding understanding of particular facets of the legal system, including posts that explore the consequences of criminal behavior.
  41. The Brooklyn Paper – Play by play crime news featured in this New York resource is not limited to particular types of crimes.  Articles report a variety of crimes, from thefts to homicides. One after another, New York robberies and property crimes are listed, to help provide timely information for citizens and law enforcement personnel.  Neighborhood maps showing jurisdictional boundaries are included on the site, linking known criminal hotspots to the individual crimes being investigated in particular areas.  Photos of suspects and convicted perpetrators are also maintained by site administrators, providing visual corroboration for identifying criminals.
  42. Baltimore Crime Beat – News and crime commentary is provided here by the Baltimore Sun, keeping pace with developing stories and investigations. Recent headlines include posts about an officer killed in the line of duty and the fate of a convicted heroin dealer.  Political reporting is also present, with updates about local elections and coverage of races for State Attorney.  Shootings and other high-profile cases are the subjects of ongoing, multi-piece articles that track developments in the cases.  Legal challenges and civil cases are also monitored, bringing important verdicts to the public’s attention.
  43. PE Bloggers Crime Blotter – Most of the content of this site is contributed by Press Enterprise columnists and staffers familiar with criminal justice and local crime reporting.  News from the Jurupa valley is presented alongside breaking coverage of Rancho Cucamonga crime, keeping residents one step ahead of local criminals.  Drug interdiction requires a significant effort in border states, so PE Bloggers are quick to cover successes – and failures associated with the war on drugs.  Officer-involved shootings and other law enforcement outcomes are scrutinized in recent posts, lending insight into complex criminal justice practices.
  44. City Police Blotter – One of the best ways to fight crime is to engage public support and participation.  This blog, maintained by the Public Information Officer from the Fredericksburg police department supplies direct access to current crime news, straight from department representatives. Armed robberies and other local crimes are reported and tracked, allowing witnesses and helpful citizens to participate in active investigations.  The site’s no-nonsense Daily Crime Report lists crimes and keeps tabs on charges and investigations as they develop.  Detailed suspect information is included with each crime announcement, and links are present, leading readers to additional helpful crime-prevention resources.
  45. The Lawrence Crime Blotter – Theft is a fleeting crime, more likely to be unaccounted for as time goes forward.  In other words, time is of the essence when solving crimes, so crime blogs containing up-to-the-minute information serve valuable functions for local law enforcement efforts.  Local crime news, including updates about area thefts, pinpoints the victims and perpetrators of crimes, allowing residents to respond to threats before serious crimes occur.  Citizens are familiar with their environments, so when criminal activity is under way residents are the first to recognize what is out of place.  The Lawrence Blog brings citizens and law enforcement officials together, preserving cooperation and public safety.
  46. The Blotter – In addition to stories about crime, this site contains links to resources about criminals and justice.  The Austin crime news page focuses on local crime prevention initiatives and keeps Texas residents informed about developing investigations in the area.  Police efforts are highlighted in recent posts, including a holiday weekend campaign to reduce the number of drunk drivers taking to the roadways.  Breaking news, like developments related to fugitives and criminals at large, gives readers the information they need at critical moments.  Photos and descriptions of suspects play an important role in enlisting public crime fighting assistance, so Austin area mug shots are featured prominently on The Blotter.
  47. Crime Beat – This West Alabama blog is regularly updated with posts about crimes occurring near Tuscaloosa.  In fact, residents of the area are better protected as a result of the crime blog, maintained by Stephanie Taylor and other members of the Tuscaloosanews.com staff.  Recent entries follow crimes in Tuscaloosa County, including traffic crimes and sentencing outcomes for Alabama criminals.  Crime Beat updates check-in on investigation developments and profile criminals responsible for some Tuscaloosa crimes.
  48. Lights and Sirens – This Tacoma, Washington blog is maintained by the News Tribune to keep local crime news fresh, and to provide an outlet for expert crime-prevention advice.  White collar crime, as well as petty theft and robberies are exposed in regular features, which sometimes require multiple posts.  Fires and other newsworthy events are also included in blog entries, placed on a comprehensive Tacoma crime map providing an overview of criminal activity in the Washington region.  Public policy as well as the actions of the officials running the show in Tacoma are put under the microscope in posts that examine the whole criminal justice system, rather than a few individual cases.
  49. Sacto 9-1-1 – California crime news, especially activity near Sacramento is fair game for this local crime blog.  The site is maintained by the Sacramento Bee, with regular contributors and expert guest posters accounting for most of the content.  Reporting includes updates about local criminal investigations, as well as breaking news about crimes as they come to light. Bloggers follow noteworthy cases, with updates about charges and court developments.  Blog entries pose interesting questions about crimes and the justice policies that operate behind the scenes.  Contributors are not afraid to pose arguments about ethics and other criminal justice issues.
  50. Mediamatters – The media looks at itself with this pointed blog about responsible reporting and other social issues surrounding crime news.  Most of the articles dissect news coverage traditionally associated with the political right.  Taking current crime stories, and analyzing the way they are presented provides insight into media bias in crime reporting, which provides the central theme for this blog.  Fox News and other outlets are challenged for the way they introduce right-wing principles into news stories, influencing the impact they have on public perception.
  51. Sirens – This crime news blog is maintained by heraldnet.com, keeping Washington State residents informed about crimes occurring in their area.  Recent posts include coverage of criminal activity in Granite Falls and Mountlake Terrace, as well as crime exposes focusing on other localities.  Convenient links to municipal police departments are included in a sidebar that allows users to click on Mill Creek, Everett, Brier and other law enforcement websites.  Regular posts are archived, including a section that allows readers to ‘catch-up’ with the weeks posts compiled in a specific area of the page.
  52. Photo by J D Mack on Flickr

    Photo by J D Mack on Flickr

  53. Brookline Police News – This series of posts is aimed at Brookline Massachusetts residents and other readers tracking criminal activity in the area.  Posts outline developing crimes, and provide follow-ups about ongoing criminal investigations.  The police blotter format contains details drawn directly from officers’ investigations and breaks criminal activity into weekly archives of crimes occurring within certain boundaries.  Links to other Brookline resources compliment the straight-ahead listings covering crimes.
  54. NFL Crimes – Specialty crime news blogs zero-in on particular types of crimes and categories of criminals, but the subject matter here is particularly narrow in scope.  This interesting compendium tracks the illicit activities of members of the National Football League.  Each of us is familiar with the local misdeeds of players on our favorite teams, but this blog provides an opportunity to track players from across the entire League.  Drunk driving, assault, illegal weapons possession, and a creative array of domestic charges are typical of the crimes reported here.  Cheerleaders, fans and others behaving badly are not exempt from attention when their misdeeds are done in the name of their favorite football teams.
  55. Dayton Courts – Daily updates cover legal and court news from the Dayton region of Ohio.  Arrests and prosecution records provide content for blog articles, which keep tabs on suspects and criminals as they move through the criminal justice system in Ohio.  Regular features highlight individual criminals, keeping their images and stories fresh for victims.  The site is affiliated with daytondailynews.com, providing citizens with details about specific cases and their courtroom outcomes.
  56. Boston Magazine Crime Blog – News stories about Boston crimes are given greater scrutiny in blog posts included on this crime news site.  Follow-ups to noteworthy cases, like the Boston Marathon bombing investigation, provide ongoing details about charges and criminal prosecutions associated with Boston criminal activity.  News from surrounding municipalities is included among entries that explore not only Boston crime trends, but the individual criminals responsible for regional crime.  Recent articles focus on local crimes like vandalism, as well as serious offenses pulled from national media headlines.  The blog contains links to additional Boston area crime news resources featuring coverage of city council developments and other local issues impacting crime prevention and public safety.

50 Top Personal Defense Blogs

Personal protection takes many forms, so there is a wealth of information available for those wishing to explore the various approaches to individual safety. Martial arts training and other defensive strategies help people stay safer while reinforcing confidence in everyday situations.  Various defense tactics are widely discussed online, including basis ways to keep you and your family safe.  These blogs cover a range of personal defense strategies and highlight the individual opinions of some of today’s leading personal defense experts.


At functionalselfdefense.org, you learn to protect yourself

  1.  Functional Self Defense – Realistic Modern Defense – The message here is to promote personal safety through awareness and preparedness.  To prevent attacks and respond in the best ways possible when they do occur, visitors are encouraged to explore free information available on the site.  Tutorials and photographs take the subject to heart, illustrating effective self-defense methods for individuals. Articles cover wide-ranging subjects that relate to personal defense, as well as other varied topics of personal interest to the author. The thought-provoking pieces stimulate personal defense ideas among readers.
  2.  No Nonsense Self-Defense Blog – This straight-forward introduction to personal defense, which starts with discussions about the importance of commitment to effective personal safety, provides valuable information for family safety.  Property protection and individual self-defense are explored in-depth using categories that break-down situations people encounter in real life.  Robbery prevention and how to respond to stalkers are examples of solutions presented in no nonsense chapters that dissect each area.  Martial arts based approaches provide effective strategies, as well as avoidance and other de-escalation methods.  Affordable security options for the home and other common-sense ideas for staying out of harm’s way are offered without charge.
  3.  Women’s Self Defense Boston – Women face unique perils, which require them to pay particular attention to specific approaches to personal safety.  Since they are equipped differently than their male counterparts, and since many of their attackers will be men, women are trained to take advantage of their own strengths and to de-escalate attacks by removing their disadvantages.  Krav Maga training provides the backbone of the Women’s Self Defense philosophy that helps them stay safe, using scenario-based training to create real-life dramatizations of attack situations women might encounter on the street.  By role playing and moving through the motions of successfully thwarting attacks, women stand ready when they actually occur.  The blog discusses several ways to use repetitive training to synch the mind with the body’s ability to respond to threats.
  4. Toughen-up Self-defense Blog – Author Randy LaHaie supports his book with this helpful series of articles exploring personal defense topics.  Thought-provoking considerations include physical training recommendations as well as methods for establishing emotional preparedness for self-defense. Workout strategies that promote effective self-defense are compared and fine-tuned to the needs of individuals getting started in the gym.  Common-sense approaches use everyday workout scenarios to make strength training and conditioning accessible so  everyone can toughen-up at home.

    Visit wimsblog.com to learn more about this seasoned self-defense expert

  5.  Wim Demeeres Blog – Marshall Arts, Self Defense and a Whole Lot More – Getting the most of your approach to personal safety is bolstered with information shared here by a self-defense teacher.  The posts break defense into several categories, offering valid tips for each situation. 8 Self-Defense Tips for Men focuses on particular characteristics unique to males as well as universal information that aids both sexes.  The site is oriented toward social violence, and how to react in the face of adversity.  Empathy and other non-violent approaches to conflict resolution are advocated, but physical defense is also recognized under some circumstances.  Readers are encouraged to disregard examples seen on television and through dramatizations that don’t reflect what it is really like to defend yourself from attacks and robberies.
  6.  Making Sense of Self Defense – Rather than offering tips and techniques for application during an attack, this site presents concepts related to personal defense which must be weighed individually, by consumers of the information.  By highlighting general ideas, the articles engage independent thought related to family protection.  The five D’s of self-defense provide the framework for the blog, encouraging readers to enter into agreements with themselves committing to the regime.  Decide, deter, disrupt, disengage, and debrief are equal stages in the process of personal defense, which provides a general way to think about protection and avoiding violence.
  7.  Self Defense and Violence Prevention Blog – The information age presents unique security challenges for personal defense and family safety.  Comprehensive approaches include self-defense in its traditional forms, and additional proactive efforts to maintain safety and confidentiality of information. Wide topics are explored here, each tied to desirable personal defense outcomes for individuals and families.  Subjects include the effectiveness of local crime watch programs and the best preventative strategies for helping at-risk youth.  Other recent article themes featured commentary about women’s role in society and the nature of information sharing among corporate giants like Google.
  8.  Opencarry.org maintains a forum dedicated to personal defense topics, drawing a range of participants with diverse viewpoints.  The archives are filled with references to content touching on most gun-related issues, so you’ll likely find someone weighing-in on your closely-held convictions. True Tales of Self Defense are shared through the forum, in which users support their self-defense efforts with real-life stories encouraging others to be prepared.  Martial arts and other measures are discussed, but the meat of the site is devoted to the type of social violence that includes firearms. Personal defense includes proficiency and preparedness for firearm advocates who praise the deterrent effect of liberal gun-carry laws.
  9.  Policetac’s Blog – Mind and body are united in the tactical application of the personal defense ideals put forth on this blog, which explores the relationships between martial arts, health, and personal well-being.  The underlying philosophy is based on Wing Chun Kung Fu principles.  Spirituality and other human attributes are recognized during training, and incorporated into a total wellness approach that guides not only individual safety, but personal fulfillment as well. Regular posts and archives highlight individual aspects of the underlying awareness the blog advocates, providing the foundation for personal defense training.
  10.  Indestructible Training – Training with firearms is one of the personal defense methods highlighted as the focus of this blog, which asks questions related to the practice like “Can Competition Really Get You Killed”?  Various training methods, including competitive firearms courses, are explored to determine which are the most effective, and which strategies yield the greatest bang for the buck. Posts discuss important considerations for students of personal defense, guiding their approach to effective individual safety and reinforcing their understanding of how split-second decision-making impacts personal defense.
  11. Less Than Lethal Self Defense Blog – Responding to a physical attack without lethal intentions is a specialized way to fight back without killing your attacker.  Learning the best ways to do this is accomplished through research and case-studies shared on blogs like Less Than Lethal. Hand to hand methods of defense, like open and closed hand strikes are used to disengage attackers, allowing for escape.  Devices and pepper sprays are effective in many cases too, but must be activated properly to have the greatest impact on attackers.  Human and animal attacks require unique strategies, which are explored in recent articles.

    at preferred-defense.com your personal safety starts here

  12. Preferred Defense Self Defense Blog – Fight back! is the mantra shared by users of security products offered here.  The blog supports effective use of surveillance and wireless equipment, auto-dialers, and other personal protection products.  Education is the cornerstone of consistent personal protection, so the entries provided on the site are aimed at informing readers about personal defense options and strategies.  Emergency supplies, like bug-out bags, which are laden with essentials, can be grabbed hastily when something unusual calls for a quick exit.  By staying informed and prepared during routine times, consumers increase their own chances of surviving during periods of adversity.
  13. Self Defense Blog by Chad VonDette shares expert advice from a blogger who has done quite a few different things related to personal defense.  He is a choreographer of fights, and a master of self-defense who speaks on the subject worldwide.  His Just Yell Fire project drew national attention for girls’ safety causes when he helped a high-schooler create an effective campaign against female violence. Fighting types and styles are compared in recent articles to help readers understand the differences between MMA and other examples, for instance.
  14. J & L Self-defense Blogs – Emergency preparedness includes readiness for a wide range of potential scenarios.  Large-scale catastrophic events, for example, have different safety requirements than personal attacks, so they are approached in unique ways.  Understanding the scope of the threat is the first step to defending against each harmful element. Articles comparing the various types of available devices and sprays for personal protection help readers weigh the best options for their own particular circumstances. A multi-level approach, providing layers of protection at each level of exposure leads to the most comprehensive personal defense strategy possible.
  15. Personal Self Defense Blog – Finding efficient personal safety devices is made easier with the information contained in posts on this defense blog focusing on non-lethal protection for men, women and families.  Various assaults are explored by type, including campus, home and social attacks against men and women.  Stun guns, pepper sprays and other means of disabling attackers are evaluated and compared to one another in posts that also explore personal safety trends and share first-hand accounts of violent encounters.  Attitude is considered an integral part of effective personal defense, so readers are encouraged to adopt the right frame of mind for personal security.
  16. Self Defense Blog – Age-specific strategies are introduced here, combining devices and proven methods into workable solutions for some of the most common scenarios requiring defensive measures. Non-lethal focus allows users to contemplate the best solutions for their own circumstances, including pepper spray and stun gun technology.  Information about hidden cameras and individual state laws governing stun gun use are provided as references for readers, who use the blog to learn how to properly operate the various devices available for personal defense.  Kids, women, and physical challenged users are targeted for special instruction that helps them exploit their individual strengths.
  17. Personal Defense World – Guns and ammunition are the primary modes of defense for the bloggers who run this site, including the latest innovations, which are discussed in detailed posts.  Product evaluations include accessories and modifications making guns more effective as general instruments of defense.  To support the effort, entries focus on happenings in the personal safety arena and legislative developments impacting gun laws.  First-hand accounts of individual success stories provide reinforcements for the use of guns as protection, helping instill confidence in those new to the concepts of personal defense.
  18. Black Belt Mama – This inspirational account is provided by a genuine mother who mastered some advanced martial arts principles to better protect her family.  The content here is as much about personal empowerment as it is about self-defense.  But the two are linked, so the lessons she shares are somewhat universal to a cross-section of readers.  The relatable story chronicles the progression of a mother gaining strength in the face of adversity, including a torn ACL and other things that almost got in the way of realizing her dreams.
  19. Women’s Self Defense Instruction – Written by a self-defense coach and martial arts expert, this site explores the ability of every individual to protect him or herself from harm, despite inherent limitations and uncertainties.  The message here is that the least complicated self-defense solutions are often the most effective.  Self-defense products and moves are explored in gender specific ways, helping women especially.  By helping females establish their baseline defense needs, site administrators steer them toward products best suited for their circumstances.  Pepper spray is recommended for women because it is accessible, easy to use and can be concealed in purses without detection.

    sifuchow.blogspot.com is where Richard has been discussing self defense for years

  20. Richard’s Kung Fu Rantings – Entries focus on learning Kung Fu and what the process entails for most people.  Dedication and commitment are essential to continued advancement within the martial arts, for personal achievement as well as proficient self-defense.  Practice and learning at one’s own pace facilitates long-term execution of disciplined Kung Fu programs.  The blog supports a school and includes references and resources familiar to devotees of Richard’s instructional programs. Former students and others associated with Richard’s career are featured in their own sections, linked from the main blog page.
  21. Mommy and Me Self-Defense – Varied content takes a proactive stance on personal defense and a notion called ‘protective offense’. Information is aimed primarily at women and others who teach self-defense classes.  Tips designed to minimize risk exposure are shared with readers, including articles that attempt to get into the minds of attackers.  By understanding their adversaries, victims of domestic and social violence are better prepared to respond to attacks. The blog is paired with another series of posts that are not specifically concerned with family safety, instead exploring wide-ranging issues within the area of self-defense.
  22. The Michael Bane Blog – Author and television host Bane discusses self-defense issues from the perspective of a gun rights advocate, posting analysis of legislative action and other gun-related news.  Recent topics include the not guilty verdict for shooter Zimmerman, and other headlines linked to firearms.  While the chatter is not always focused on personal defense practices and usable strategies for staying safe, there are interesting tidbits to be drawn from the musings of a writer so deeply entrenched in gun culture.  Updates about important events and changes to gun laws are included alongside mundane day-to-day entries about life.
  23. St Pete Self-Defense and Personal Protection Blog – Learning to communicate is an essential mode of personal defense training highlighted by entries included in this collection of personal defense articles.  Assertive communication helps diffuse conflict and leads to non-violent resolution when used effectively.  Articles also cover specific scenarios that arise when communication is not enough to de-escalate an encounter.  Women’s defense, in particular, is featured with tips and tactics most appropriate for victims often outmatched physically.  Bullying and safe dating are also explored, uncovering common-sense solutions for remaining safe around other people, especially in secondary and post-secondary education environments.  Personal property protection and the laws that impact you after a robbery or attack are reviewed in some articles.
  24. Self-Defense Blog for Women – Empowering self-defense information targets women, who have slightly different security requirements than their male counterparts.  Awareness at all times is an essential component of consistent personal defense.  Responding timely is better achieved when women are tuned-in to their surroundings, so this is central to the education and training recommendations put-forth by this blogger.  Seminars and other personal protection training opportunities are showcased as additional learning avenues, but the site contains its own blend of useful information about the types of attacks women encounter, and the best ways to thwart them.
  25. Self-Defense Training Today – Answering questions about personal defense, including armed and hand-to-hand strategies is the common thread among articles archived at this blog maintained by a security professional.  Entries discuss commonly encountered situations requiring personal defense actions, as well as related topics designed to stimulate interest in personal protection.  The seed is planted with thought-provoking articles that engage visitors to reflect on their own personal self-defense needs, and develop strategies to keep them safe. Basic philosophies, like maintaining yourself as an undesirable attack target, provide footings for readers who grow with more advanced references as their commitment to personal security expands.

    visit selfdefensetechniques.org to discover new methods of protection

  26. Self-Defense Techniques – Applied techniques are the key to de-escalating attacks and getting away with the least amount of personal and property damage.  Being prepared to respond is the essential first step lacking in many individual personal safety approaches.  Without specific plans responding to violent encounters, victims are left vulnerable through inaction.  Women and other readers benefit from articles outlining common reactions to personal threats, including evaluations of the effectiveness of each approach.  Products are treated similarly, ranked for their ability to keep users safe and put to the test, in actual trails.
  27. Just Yell Fire – Empowering young women to remain safe is still the primary call to action for this organization, which started as a school project.  Following simple protocols helps young ladies respond to threats they encounter throughout life, and instills confidence in their right to be safe.  It is always about fighting back for the one-million girls active in the program, which has gained national media attention for its powerful messages for school-aged young ladies.  The nonprofit draws attention to its cause using celebrity voices and high-profile media participation.
  28. Self-Defense in USA – Advocacy and awareness are achieved using online articles, but the instructor behind the posts is the real deal.  The women’s self-defense expert shares a lifetime of knowledge with one objective in mind:  Keep Canada Safe.  Starting at the bottom rung of personal safety, posts advocate avoidance and verbal de-escalation strategies that end conflicts without violence or injury.  Through a progression of steps designed to minimize harm, the site discusses a series of physical moves that can be used to limit an attacker’s advantage. Specific posts isolate certain segment of society, providing specific personal safety information that impacts particular groups.  Health care workers, or hospitality employees, for instance have unique needs for personal protection, so their concerns are addressed with dedicated feature posts.
  29. Self-Defense and Combatives Blog – Reeducating readers about self-defense and personal protection is a mission undertaken by this blog, containing posts laden with tips and techniques for heightened family safety.  Property recommendations are also included, advising readers to stay consistent with safety standards at home.  Gates, fences, windows and doors should remain locked, for example and should each be outfitted with proper deadbolt-type locks and hinges.  Personal safety tips and product recommendations are also included, allowing interested parties to explore preparedness and self-protection further.
  30. My-Self-Defense – Personal product recommendations and self-security advice are prevalent here, provided by an informed writer committed to making society safer for those willing to learn about defense strategies. Avoiding conflict is discussed as a first line of defense against personal injury, and maintaining an anticipatory frame of mind is also advocated.  Being ready to respond is a crucial first step that is sometimes overlooked by individual who think they are well-prepared.  Simple approaches like carrying defense whistles and pepper spray stop many assaults before they get started, so they are considered to be valuable front-line defenses.  Additional topical areas receive expanded treatment, including self-defense for women and home protection.
  31. Defy the Bad Guy – This series of articles shares the viewpoint of a blogger who actively teaches self-defense to women.  Details about her programs are featured on the site, including a unique personal safety boot camp offered to women.  Julie Greene carries credentials in self-defense teaching that illustrate her passion, supporting 4-week intensive programs that cover in-depth strategies for all types of individual security – from personal property to female well-being.  Her martial arts history is the perfect complement to the information she offers on her self-defense blog.
  32. Women Self-Defense Blog – Protecting individuals through self-defense education is the primary function of this blog, and the instructional opportunities it supports.  Lots of YouTube videos are present, to visually underscore the message sent by the organization. The group focuses on unique training in group settings, for corporate team-building, social gatherings, and even for high-school classes.  DVDs and other materials available for purchase supplement the free information contained within the site’s blog entries. Tales of real-life self-defense success are also shared with reader’s, to bolster their own confidence and move them to act in their personal defense interests.

    follow defense guru matthew schafer at schaferselfdefense.blogspot.com

  33. Schafer’s Self Defense Corner – Personal reflections of a martial artist and personal self-defense guru seeking to share his experience with readers.  The blog supports self-defense instruction offered by the writer at his studio in Michigan.  Karate, Taekwondo, Judo and a host of martial arts disciplines contribute to the philosophy put-forth on the site, including the blogger’s evaluation of various fighting techniques and outcomes that occur when martial arts are utilized.  Posts are placed several times each year, highlighting individual aspects of self-defense and martial arts.
  34. International Krav Maga New York Blog – Popularity of Krav Maga continues to grow apparently, especially in places like New York City.  The discipline is drawn from a number of martial techniques that include fast and aggressive responses to attacks.  Because the training for Krav Maga focuses on real life situations, it is hailed as a very effective form of self-defense.  Bloggers share techniques and other information about the increasingly popular pursuit.   Women’s Krav Maga training combines real-life self-defense skills with fitness opportunities that add value to learning Krav Maga.  The organization behind the blog hosts classes and seminars for interested parties, including workshops for children.
  35. Paxton Quigley’s Blog – Author and personal safety advocate Ms. Quigley blogs here about protection and personal defense for women.  She shares some of the same concepts in her blog as the one’s she teaches at her ‘Not an Easy target’ seminars.  Fundamental discussions about minimizing your appeal as a target and other general strategies for avoiding assaults are supplemented by specific instructions for individual safety under particular circumstances.  Empowering women with confidence to defend themselves is only one of the functions of the blog; it also provides product reviews and evaluations.
  36. John Nottingham’s USA Martial Arts Self Defense and Security Blog – Learning to defend yourself is an individual pursuit, with several avenues available to explore.  Firearm self-defense is in a category of its own, but not everyone needing protection seeks weapons.  Martial arts and Krav Maga training provide non-lethal alternatives that enable people to defend themselves the old fashioned way – by hand.  Learning Krav Maga in Phoenix is possible, by enrolling in the self-defense school behind the blog.  Fighting fit points to the additional benefits of Krav Maga personal defense training – increased fitness.  By enrolling in self-defense classes, Krav Maga students gain immediate advantages by reducing their reaction times and becoming more alert.
  37. Personal Security America – Various strategies are explored here for their benefits and shortcomings providing comprehensive personal security.  Devices, including pepper sprays and other products designed to disable attacks are available for purchase, and come with extensive reviews and evaluations.  Stun guns and other legal non-lethal self-defense alternatives are compared and contrasted with other products, in order to match the best means of defense with consumers who need them. In addition to individual protection, property defense is an important consideration within posts on this blog.
  38. Of Arms and the Law – As many blogs share specific information about how to protect yourself in the face of particular dangers, others specialize in following developments that impact self-defense and personal protection as a whole. The entries here fall into the latter category for the most part.  Legal opinions and trends in legislation provide important tells for the future of firearm ownership and personal defense right in the United States, so blogs like this one keep pace with what is happening in the world of personal security. Individual states provide interesting case studies in terms of the way the handle gun rights, which are explored in-depth in archived posts.
  39. Krav Maga New York – Several strategies exist for martial arts based self-preservation, including Krav Maga.  The discipline is an Israeli combat and defense methodology that has been adopted by countless law enforcement agencies and private security forces.  The fundamental ideas behind the approach are shared by the instructors at Krav Maga New York, who also do their best to impart knowledge through this blog.  The training is explained in plain language, so potential students have the information needed to choose their own individual paths toward safety.
  40. Act in Self-Defense – This news blog is tuned-in to the personal defense and family safety scene in Chicago.  The scope of the articles is wide, including pieces that touch on all corners of self-defense, information security, and even national issues like post-911 safety. Real life examples are used to illustrate what measures should be taken in response to various forms of attacks, and articles discussing upcoming Chicago events highlight what attendees should expect, while offering safety strategies for incident free fun in the Illinois city.  Despite the local orientation of the content, articles stretch out into larger topics that impact safety and security nationwide.
  41. Preptronics Blog – Security for individuals, families and personal property are discussed in a series of blog posts that highlight self-defense products.  Pepper spray and other emerging self-defense tools are available for sale, so articles tend to line-up with the products the bloggers are selling.  Still, important information is gleaned from articles, especially for women who turn to stun guns and sprays to help close the physical size gap between women and their attackers.  Home security products are also featured, including basics like baby monitors and electronic surveillance gear.  Security tips and advice on how to become a less appealing target are useful entries for security conscious readers.
  42. Prevention Works – A Blog by the National Crime Prevention Council – Self-defense is closely tied to prevention, so this national organization blogs about the best ways to avoid conflict and to keep yourself out of harm’s way.  Individual safety starts with awareness, so articles reinforce the importance of knowing your surroundings at all times.  Awareness while traveling and when in unfamiliar situations makes you a less desirable target, and turns criminals away.  By maintaining awareness at home, safety measures become automatic features of everyday life, reducing the chance that you will become a victim.  Articles emphasize timely concerns, like the best ways to stay safe during summer, and personal safety standards for kids of all ages.
  43. The Multidimensional Paradigms of Self-Defense – In archived entries, individual viewpoints are investigated as they relate to personal defense.  The underlying assumption is that we respond to threats and protect ourselves in different ways, so our viewpoints have significant impacts on the way we defend ourselves and our property.  By considering viewpoints outside our own, we understand a philosophy that may be more comprehensive in terms of how we protect ourselves.  Thought provoking entries discuss how we use our individual paradigms to justify the way we act under duress.
  44. Connecticut Citizens Defense League Blog – This grass roots effort is backed by a group of citizens committed to gun rights and self-defense awareness in their home state.  Posts include updates about local happenings and personal defense events, but there are also many entries related to legislation about self-defense and gun ownership.  Keeping their membership informed about gun laws leads to state-specific updates that include information about states outside Connecticut.
  45. InSights Training Blog – Personal defense and tactical training classes are supported by this informational blog outlining best practices for self-defense.  Positive self-defense outcomes are achieved when the attacker’s ability to harm you is negated, so the blog entries here focus on the best ways to cause him or her to stop attacking and retreat.  Practicing scripted tactics that respond to a variety of situations leads to quick responses and effective personal defense, so creating this tactical advantage is one of the recommendations made by the organizers of the blog.  Guns, knives and other weapons are evaluated alongside non-lethal defense methods allowing readers to consider their own individual security concerns when establishing personal protection plans.

    at aaa-safetyfirst.com they have provided you the tools for self defense

  46. Safety First Security Solutions Blog – Security requirements are twofold for most concerned citizens:  Training/knowledge and Equipment/security products.  The entries contained here relate to dozens of products sold by the blog organizers, providing the information needed to use them effectively in the field.  Pepper spray and other irritants as well as batons and similar striking instruments are evaluated for effectiveness and instructions are provided for using them.  Several specific scenarios are considered, like animal attacks, home invasions and similar threats, outlining appropriate responses and offering advice about the best weapons to use.
  47. The Self Defence Expert – Topics range across many self-defense disciplines, each discussed by a trained personal defense consultant.  Lots of pictures and videos help send the author’s messages about self-defense.  Martial arts and the various fighting styles associated with each discipline are put under the microscope for readers who know enough to make the proper distinctions between the techniques.  For casual observers, lighter fare is also plated-up, including reviews of products, training styles, and even movies.  News, opinions and articles are mixed in the way they are presented, allowing readers to pick and choose their own areas of interest.
  48. Dynamic Self-Defense – Struggling with basic self-defense principles slows down beginners, so this blog tries to break things down into essential pieces that are easier to digest for upstart citizens increasing their personal security arsenals.  The Albany, New York based author provides detailed analysis of security dilemmas and matches them with appropriate solutions.  Public interest stories are also present, including inspirational pieces about how self-defense preparedness ended positively in individual real life incidents. According to the blog organizers, using martial arts techniques and hand-to-hand combat moves, allows individuals to approach personal protection in effective ways.
  49. Asian World of Martial Arts Blog – Martial arts training is sport to some participants, but to others the disciplines are used as tools of self-defense.  The entries found here recognize both schools of thought, focusing on the vital roles martial arts play in personal defense.  The value and scope of available training is evaluated, providing insight for those new to self-defense classes and philosophies.  But the site is not all business, there are also sections present devoted to martial arts hobbyists interested in posters and other Asian-inspired martial arts products and services.  Videos show martial artists is action, and highlight the importance of Asian culture in personal defense.
  50. The Weapon Blog – Personal defense is achieved using avoidance, de-escalation and physical martial arts techniques, but sometimes weapons are required to provide adequate levels of individual safety.  Entries to this blog point to rising crime rates and increased numbers of violent attacks as justification for better personal protection strategies, including the use of weapons.  Pepper sprays and other irritants provide a convenient class of protection that is generally effective, but these products are only one form of non-lethal weapons carried by concerned citizens.  Stun guns and batons used to strike attackers are also popular among men and women.  Combination weapons that have panic alarms attached to pepper spray canisters, or use strike instruments combined with stun technology add further reassurance for attack victims.

35 Best Computer Security Professors of 2013

Computer Science and Electrical Engineering programs draw the best and brightest professors to colleges and universities across the world.  In 2013, stand-out educators continue to emerge in a specialized area of computer science that requires gifted researchers:  Computer Security.  As technology changes and information becomes more and more portable, security concerns arise as quickly as new smartphone apps.  The solution is to continually update the pool of information used to keep computers and data secure.  For their efforts in this area, the following professors are recognized as some of the top Computer Security educators of the year.

  1. rivest_photoRonald Rivest – As a professor of electrical engineering and computer science at MIT, Ronald L. Rivest participates in several noted academic groups associated with computer security.  He is a member of the school’s CSAIL, Computer Science and Artificial Intelligence Laboratory, and the founder of the organization’s Cryptology and Information Security Group. Professor Rivest’s computer security interests have crossed over into the private sector, where he is responsible for helping found VeriSign, RSA Data Security and other computer security interests. In 2012 Dr. Rivest received the Computer Security Hall of Fame Award for his contributions to the field.
  2. SchouCoryCorey D. Schou – Dr. Schou is a highly regarded computer security specialist at Idaho State University, where he holds titles of University Professor of Infomatics, Professor of Information Systems, and Associate Dean of the College of Business.  Dr. Schou has been recognized extensively for his contributions to the areas of computer security, including and educator of the year nod from the Federal Information Systems Security Educators Association. Corey Schou is currently the director of the National Information Assurance Training and Education Center, as well as the Simplot Decision Support Center.  His books, articles and presentations focus on computer security, privacy and ethics among other related topics.
  3.  Keith Ross – The Polytechnic Institute of NYU is home to Professor Keith Ross, who teaches computer science courses at the school.  Dr. Ross also serves as Department Head for the programs in the Computer Science and Engineering Department at the college.  The scope of his expertise is wide, including past work in privacy and data-mining, as well as general computer and systems security.  Dr. Ross received his PhD from the University of Michigan, and is a current fellow in several prestigious industry organizations, including the ACM and IEEE.  He has received several best paper recognitions for his research.
  4. kohnoTadayoshi Kohno – Dr., Kohno, known as Yoshi to friends and associates is a specialist in certain areas of computer science and engineering.  Security and privacy of information and computers is an area that Yoshi has worked in extensively during his tenure as associate professor in the University of Washington Department of Computer Science and Engineering.  After receiving his PhD from University of California – San Diego, Dr. Kohno embarked on a career recognized with several noted awards including the National Science Foundation CAREER Award and the MIT Technology Innovator Award.  The professor is currently working in areas of emerging technology like cloud security and mobile computer security.  Detecting and Defending Against Third-party Tracking on the Web is a must-read article by professor Kohno.
  5. Matt BishopMatthew Bishop – During his time as a professor of Computer science at the University of California at Davis, Matt Bishop has continued to delve deeply into computer security, an area that has interested him since the late 1970’s.  The professor has spent years looking specifically at vulnerability, calibrating accurate ways to assess our risk as computer users.  Access controls and other specialized studies have guided Dr. Bishop’s career through advanced UNIX security research into his current areas of interest, which include election processes, data sanitization, and other computer security problems.  Dr. Bishop’s book, “Computer Security:  Art and Science” shares his insights on various computer security topics.
  6. D.WagnerDavid Wagner – Professor Wagner continues to pursue research in computer security while maintaining his faculty position at University of California – Berkley.  As a professor of computer science, his research interests focus on large-scale systems and network analysis, including program security analysis and applied cryptology.  Current projects include software and smartphone computer security initiatives, and other efforts focused on emerging technology. David Wagner also participates in the University’s Security Research Group.
  7. marianne-winslettMarianne Winslett – Having served in various capacities on the faculty of the University of Illinois Urbana Campus, Dr. Winslett now works as a research professor in the University’s Department of Computer Science.  She earned her PhD in Computer Science from Stanford University, before working at Bell Labs.  She brought her interest in information security and data management to the University of Illinois in the late 1980’s and has made significant contributions to the field during her time there.  She has served on countless editorial boards and received recognition for her research, earning best paper awards on multiple occasions.
  8.  Greg White – Gregory White has carried enthusiasm for security education and research throughout an impressive career centered in the San Antonio area.  During a thirty-year career with the United States Air Force, on active duty and in the reserves, Dr. White joined the faculty at the University of Texas at San Antonio, where he entered the school’s Information Systems program.  Early in his career at the school, he helped establish the UTSA Cyber-Security Research Center, which has celebrated a ten year anniversary to-date.  The Center sponsors one of the most widely recognized cyber-security competitions for college students, designed to spark innovation and collaboration among the brightest thinkers in the computer security field.
  9. Dana Dachman-Soled – Dr. Dachman-Soled is a relatively new member of the faculty within the A. James Clark School of Engineering – Department of Electrical and Computer Engineering at the University of Maryland.  She brings her PhD from Columbia University to the classrooms and research facilities in Maryland, to continue pressing the envelope within the computer security field.  After receiving a presidential scholarship for her studies at Columbia, Dr. Dachman-Soled continued-on with a fellowship opportunity at Microsoft Research.  Her interests and areas of instruction relate to cryptographic security and other computer science disciplines.
  10. santoroGerry Santoro – Students enrolled at Penn State College of Information Sciences and Technology benefit from Dr. Santoros experience with computer security, but so do others.  Dr. Santoro maintains a page of information helping computer users remain problem-free.  Dr. Santoro has an extensive hands-on history providing security and advice for computers systems, and his courses focus on these areas.  Risk analysis and cyber-forensics are also part of the academic major that Dr. Santoro works closely with. He also holds editorial credentials with noted online journals, and has been recognized with numerous awards.
  11. nicolasNicolas Christin – Dr. Christen acts as an assistant research professor in the Department of Electrical and Computer Engineering and Cylab at Carnegie Mellon University.  He also serves as faculty advisor to several Master’s Degree Programs in computer security fields at the school. His credentials include a PhD from the university of Virginia and extensive service abroad in Japan and other locales.  Through his association with Cylab, Carnegie Mellon’s security laboratory, Dr. Christin continues to push the envelope in critical cyber-security thinking.  Current projects involve online security and crime modeling.
  12. haldermanJ. Alex Halderman – Assistant professor of computer science and electrical engineering at the University of Michigan, Dr. Halderman sometimes blogs about cyber-security issues at Freedom to Tinker.  His main areas of interest lie in computer security and privacy, particularly in software security, network security, data protection and emerging science like computer forensics.  Dr. Halderman earned his Computer science PhD from Princeton University in 2009, and continues to work on projects related to hacking, encryption, and other security issues.  His research on widespread weak keys in network devices earned him a best paper recognition from his peers.
  13. MironLivnyMiron Livny – Working as a research professor at the University of Wisconsin, in Madison, has opened interesting doors for professor Livny, who has been able to work on Department of Homeland Security projects requiring his particular expertise.  One current project works to increase the level of security on software used to control the internet and the cyber infrastructure. Livny is Director of Core Computational Technology at the Morgridge Institute for research in addition to his service at the Wisconsin Institute for Discovery.
  14. sgwetzelSusanne Wetzel – Educated in Germany, this professor brings private sector experience with Daimler Chrysler, Lucent Technologies, and RSA Laboratories to her computer security resume.  Her areas of research interest include cryptography and algorithmic theory.  Her work is conducted as an associate professor at the Stevens Institute of Technology, in the Computer Science Department.  Her publications include books, journals and countless papers presented in academic settings.  Other professional activities include work on anti-phishing research and collaboration with other computer security professionals.
  15. zhang_honggangHomggang Zhang – As an associate professor at Fordham University, Dr. Zhang works in the Department of Computer and Information Science.  While the scope of the internet and world reliance on computers grows, data management and computer security are areas that continue to require innovative solutions – Dr. Zhang helps provide them.  As well as managing the large volumes of data that computer dependence generates, modern computer security professionals are tasked with keeping it private and secure.  Social networking and mobile computing are specialized areas drawing attention, because they represent the next wave of technology requiring security.  Dr. Zhang and other forward-thinking professionals attempt to look into the future to forecast the types of problems that might arise with data sharing practices later on, even as they address problems popping up today.
  16. spaffordEugene Spafford – Purdue University is home to Dr. Spafford, who teaches several classes within the Department of Computer Science.  His areas of specialization include social impacts of computing, including emerging mobile and cloud technologies that constantly create the need for enhanced security.  Ethics, cybercrime and general internet security are the bread and butter for Dr. Spafford, leading to accolades from his peers and teaching honors from Purdue. Dr. Spafford also runs the University’s Center for Education and Research in Information Assurance and Security (CERIAS), which leads research in the field of internet and computer security.  Dr. Stafford made headlines for suggesting users will defect from the World Wide Web due to the inherent dangers it poses to their personal security.
  17. duWeliang (Kevin) Du – Professor Du understands the implications of computer security for mobile devices and other emerging technologies, so he has dedicated his research to these areas.  Dr. Du is a professor in the Department of Engineering and Computer Science at Syracuse University, where he and his research team tackle system security problems and innovate in the area of smartphone system security.  His PhD is from Purdue University, and he currently holds prestigious positions on panels and committees serving the computer security industry.
  18. ahamadMustaque Ahamad – Securing the internet and computer applications for the future is a passion shared by many computer security professionals, including Dr. Ahamad.  In the College of Computing at The Georgia Institute of Technology he works with colleagues to secure future applications, while at the same time innovating secure storage services for personal information.  Dr. Ahamad earned his PhD at the State University of New York.  He has worked with dozens of successful computer security specialists as a mentor and collaborator.
  19. James Burkman – Oklahoma State professor Dr. Jim Burkman works in areas concerned with the ongoing security of computers and networks.  At the Spears School of Business at OSU Dr. Burkman pushes forward research programs for application security.  He has published several journal articles on the subject, and continues to push for solutions for today’s, and tomorrow’s problems.  After earning his PhD from Indiana University, Dr. Burkman began teaching and conducting research in information security.
  20. hoffmanLance Hoffman – Throughout his distinguished career in cyber-security, Dr. Hoffman has been on the cutting edge of computer security research and education.  His early accomplishments helped set the stage for a computer education model that was in its infancy, changing faster than traditional educational systems could stay current.  As a Distinguished Research professor at the George Washington University, he continues to share his experience and consultation.  Dr. Hoffman is the author of dozens of journal articles and books, and serves in advisory roles on several prestigious scholarship boards granting funding for promising computer security students
  21. matt-greenMatt Green – Professor Green teaches courses at Johns Hopkins University that are related to the work he does with his research.  Dr. Green’s areas of specialization include developing techniques for effectively storing information with high levels of privacy assurance built-in.  He is an assistant professor at the Johns Hopkins Information Security Institute, where he also works in the fields of bilinear cryptography and cryptographic information.  Specifically, his research uncovers ways to keep databases secure and to allow people access, without compromising their own privacy as they use the resources.  His blog talks about developments in the field.
  22. yi muYi Mu – Dr. Mu specializes in cryptography and related disciplines, including computer and network security.  Professor Mu is faculty at the University of Wollongong, where he plays important roles on committees within the School of Computer Science and Electrical Engineering.  He has published more than two-hundred fifty scholarly papers.  He serves as the head of his school and is also the editor of the International Journal of Applied Cryptography.  His academic credentials include a PhD from the Australian National University.
  23. Jed Crandall – Dr. Crandall and his team of researchers share the belief that internet activities should be more transparent when they involve censorship and controlling information.  He works as an associate professor at the University of New Mexico, guiding research in forward thinking areas that govern internet security and privacy of information.  Dr. Crandall earned his PhD from the University of California at Davis, before entering into research partnerships with prestigious funding entities.
  24. DenningDorothy Denning – Dr. Denning has led a productive career in computer science, dating back to her early innovations at Purdue University in the 1970’s.  She taught there for years, as well as serving on the faculty at Georgetown University.  She is the inaugural member of the Cyber Security Hall of Fame, illustrating the important role her body of work has played in the computer science field for decades.  In addition to her service at Purdue and Georgetown, Dr. Denning worked in the private sector for nearly ten years, helping secure computer systems for corporations.  She has written four books and over 100 scholarly articles, which have been published in industry journals.  She teaches now at the Naval Postgraduate School, enlightening students with classes like Computer Network Attack and Defense.
  25. ckanichChris Kanich – Dr. Kanich studies an area that receives less attention among academics than some other areas of information security – the financial gains made by attackers.  Analyzing the profits and economic motivation behind hacking and cyber attacks helps illuminate solutions to the growing internet concern.  Dr. Kanich works as an associate professor at University of Illinois – Chicago, where he leads a small research team in the Department of Computer Science.  He has participated in several influential committees and has found his ideas featured in mainstream publications like The Economist, The New York Times, and Wired magazine.  Human factors influence computer security is an adjunct area of research for Dr. Kanich.
  26. Kevin_ButlerKevin Butler – Computer security concerns drive Dr. Kevin Butler’s research, particularly in the areas of information storage, large-scale systems security and network privacy.  He is an assistant professor in the Department of Computer and Information Science at the University of Oregon, where he recently landed an award from the NSF to fund his research projects.  The NSF Secure and Trustworthy Cyber Security CAREER Award brings valuable resources to Dr. Butler’s research relating to secure retention and management of sensitive information.  Dr. Butler earned his PhD at Pennsylvania State University.
  27. Paul Dourish – Dr. Dourish is a professor at the University of California Irvine.  His work at the school’s Donald Bren School of Computer and Information Sciences focuses on security issues for computer systems.  Mobile computing is a particular area of interest, as well as the social components associated with human computing behavior. Professor Dourish serves on industry councils and advisory boards, providing cutting edge research results for better computer security.  Dr. Dourish and his research team work closely with social scientists to dissect the interactions between humans and computers, looking for insight into the behaviors behind our work with machines.
  28. ravisandhuRavi Sandhu – Computer security and privacy are areas that have undergone drastic transformations in the ways they are viewed.  Dr. Sandhu has been a first-hand participant in the development of effective strategies for responding to emerging computer threats. His prestigious career in computer security includes over 250 published articles, written with over 100 collaborators.  Dr. Sandhu is the Executive Director and Chief Scientist at University of Texas – San Antonio, where he has been employed since 2007.  Previous faculty positions were held by Dr. Sandhu at Ohio State University and George Mason University. He is also active at the Institute for Cyber Security.
  29. zittrainJonathan Zittrain – Cyber security issues are muddled among those of law, so professionals understanding both aspects of the equation bring unique insight to the table.  Professor Zittrain teaches in both schools at Harvard University, sharing computer security coursework in the School of Engineering and Applied Sciences. He is a founder of Berkman Center for internet and Society and is on the board of advisors for Scientific American. Special areas of interest include governance of new and emerging technologies and other internet policy issues.
  30. swcarterSamuel Carter – Mr. Carter serves as adjunct faculty at NC State University in the Computer Science Department, specializing in issues related to computer and cyber security.  Cryptography and authorization and authentication processes are within Mr. Carter’s areas of research, as well as network security administration and other systems administration issues.  Mr. Carter currently serves as an advisor for the National Collegiate cyber Defense Competition where standout students compete with theories to head-off the next major cyber security issues.
  31. J C Birget – Computer security and cryptography are essential areas of study for Dr. Birget, who earned his PhD from the University of California at Berkeley.  As a professor at Rutgers University – Camden, Dr. Birget draws on international training and theory to dissect advanced algorithms. Dozens of journal publications and conference articles support Dr. Birget’s educational credentials, including editing books and collaborating with other researchers in the discipline.
  32. junjei-ZhangJunjie Zhang – Associate professor Zhang was tapped last year to head the Master’s in cyber security program at Wright State University.  The Department of Computer Science sponsored the initiative to keep pace with the ever-increasing threats to computer security and to facilitate advanced training for the people in the Wright State region.  The Dayton region requires high numbers of computer security personnel, due to the concentration of national security missions in the area.
  33. ContiGreg Conti – Colonel Gregory Conti is an educator and the director of the Information Technology Operations Center.  He has written multiple books and countless magazine and journal entries.  In addition to those publications, Professor Conti is responsible for dozens of conference papers and collaborations with other computer security professionals.  In addition to his service as WestPoint faculty, he is an adjunct professor at the National Cryptologic School and has been recognized for his contributions to the field of computer security.  Of particular interest to Colonel Conti are online privacy issues, creating secure interfaces, and principles of cyber warfare.
  34. engin-kirdaEngin Kirda – Professor Kirda is an associate professor for information assurance at Northeastern University.  He works in the Department of Electrical and Computer Engineering in the College of Information Science.  Dr. Kirda is concerned with academic areas relating to network and systems security, particularly web security and malware analysis.  He also serves as Director of the University’s Information Assurance Institute.  He is one of the founders of the international Secure Systems Lab, a network of professional collaborators that work together to address cyber security concerns. In addition to publishing dozens of scholarly articles, Dr. Kirda is co-founder of a private venture that helps create secure systems for hire.  He sits on influential committees and chairs respected programs as well.
  35. fifeEarl Fife – Dr., Fife is a faculty member at Calvin College, where he teaches computer science.  He earned a PhD from Wesleyan University in 1977, after acquiring his Master’s at the University of North Carolina – Greensboro.  In addition to the formal educational credentials, Dr.  Fife maintains a long list of certifications endorsing him as a professional forensic computer examiner, and systems security expert. Dr. Fife also holds memberships in industry organizations like the International Society of Forensic Computer Examiners, International Associations of Computer Investigative Specialists, and Michigan Section of the Mathematics Association of America.  Professor Fife is one of the co-founders of The Mathematics Archives.

The Top 30 Data Management & Security Blogs

Data management and security are an important part in the daily lives of most people these days. A lack of knowledge on how to keep your data under control and organized can mean your business suffers in productivity or a hacker halfway across the world can loot your bank accounts. Luckily, the number of mostly altruistic experts who want to share their wisdom on data management and security is impressively large, and many of these experts and the companies who employ them maintain blogs that can be easily browsed to keep yourself abreast on the current state of the IT and InfoSec world. This list contains links and quick glimpses into thirty of the best offerings on the web. Blogs are divided into data management blogs, security blogs, and those with content that bridges the gap between the two.

Data Security by Charlie Collis

Data Security by Charlie Collis

Well-Rounded Blogs

  1. Rational Survivability– Originality can make a sometimes-dry topic like technology more bearable for the masses. Rational Survivability makes no apologies that it is a personal blog that will do whatever it wants, whenever it wants to do it. Almost every post can pull a laugh from you while still imparting some knowledge. The posting rate seems to be on the decline over the past few months, but you can still expect a new post per month. The blog has been in existence since 2006, so it is likely going to stick around for a while. Throw it in your monthly blog checklist and you won’t regret it. Must Read: An Ode to Glasses, a somewhat clever and definitely hilarious poetic tribute to Google Glasses.
  2. Rud.is – This blog is a bit of a hard one to place. The subjects range from data security to shiny graphs to random IT subjects, and occasionally it even goes off the grid into something completely different. It does not have the best update rate, and the varying content makes it hard to suggest that you put it on your frequent reading list. That said, it is worth giving a quick look at some of the articles to determine if the blog is something that you might like. Must Read: Security Hobos, a discussion on truly small business owners who are blissfully ignorant that they are creating terrible security problems for their customers.
  3. From the Trenches – There is no substitute for experience, but reading about someone else’s experiences comes in at a close second. From the Trenches is a mix of stories from the owning company, Solera, and related posts on data security and management problems that have had an impact in the real world. The blog is fairly heavy on advertising posts for Solera, but considering that it is all but declared directly in the blog’s mission statement that this will happen, we can forgive it this time. Must Read: Topera, the Sneaky IPv6 Port Scanner, an article that provides an overview of one malicious tool and that serves as a good example of the sort of content you will find here.
  4. Attachmate: Data in Motion – The moment where any sort of information is at the highest risk of falling into the wrong hands is when that information is in transit. Attachmate provides solutions for information security for electronic devices during this vulnerable stage, and their blog provides useful tidbits of information on how to properly secure file transfers. As you would expect from the more pointed focus of the company, the blog is narrow in scope. Unfortunately, the blog does not take advantage of this to provide lengthy or detailed information, instead opting for more general updates on file transfer news and technologies once or twice a month. Even though we think this blog could be great with just a bit more effort, it is still a decent one to have on your monthly checking schedule. Must Read: User-driven File Transfers and You, a brief commentary on why email should not be used as a file transfer system.
  5. Verizon Terremark: Enterprise Cloud Blog – Terremark is a division of Verizon that delivers Cloud and enterprise level solutions to medium and large businesses. Their blog is a mixture of company news and informative articles on the Cloud, big data, and security. One of their more frequent topics is “News to Know,” which contains small excerpts and links to other articles. It isn’t a terrible blog, but with about 40% of the content being company advertising and re-posts, it isn’t a great one either. A good amount of information and updates coming every day or so are its main redeeming qualities. Must Read: Encryption Solutions in the Cloud, a post on the encryption options that work best for Cloud technologies.
Weir Data - Photo by Acoustic Dimensions

Weir Data – Photo by Acoustic Dimensions

Data Management Blogs

  1. Obsessive-Compulsive Data Quality Blog – Focused on providing his readers with a very thorough review of the importance of data quality, management, and security, author Jim Harris creates well-written and informative posts on his blog. Posts range from analyzing the costs and issues that stem from poor quality management, new techniques to utilize and protect data, vendor reviews and news presented in a neutral way, tools and resources, and much more. An excellent source for anyone involved in the data chain Must Read: Magic Elephants, Data Physics, and Invisible Gorillas – glancing over the excitement surrounding Hadoop (the Magic Elephant), its potential use to predict customer data kept close to the chest (Data Physic), and a warning about getting too far ahead with data changes (the Invisible Gorilla).
  2. Data Quality Pro – Data Quality Pro is a community managed website built with the vision of collecting the insights and ideas of professionals in the world of data quality. The blog itself has a decent color scheme, but the layout and navigation can be more than a pain until you get the feel for it, and it will still likely irk you even then. They make up for the haphazard design with four to five posts a month that are unique and insightful for the world of data management and analysis. Must Read: How to Create a Data Quality Firewall and Data Quality SLA, a useful set of tips and advice for less tech savvy companies looking to hire a data quality company.
  3. Mike 2.0 – Mike 2.0 is an open source information management solution that features community blog project with useful posts from experienced and intelligent members of the data management field. Some of the contributing bloggers appear frequently on other sites or maintain blogs of their own. The layout makes it easy to navigate through the content, but the color scheme is a boring and somewhat irritating choice of primarily white with light blue backgrounds. As with other community blogs, the higher number of contributing authors means the blog is updated with original content fairly frequently. In addition to the blog, you can find a discussion board to communicate with other readers and the contributors.  Must Read: The Increasing Meaninglessness of the Data-Metadata Distinction, a short but thought-provoking post about how much information is really contained within metadata and what it can tell someone about the contents.
  4. Information Management – Information Management, despite the rather bland name, is a massive resource on just about any topic on which you could tack the words “data” or “information.” If you want to know about data encryption, data security, big data, data quality, data analytics, data storage, the Cloud and data, data on the network, or anything else, you can find it here. The layout is incredibly busy and can seem overwhelming, but they do fairly well considering the amount of material that is stored on the site. There are multiple blogs within the site, links to educational resources, a webinar repository, and more. This is a resource that will serve you above and beyond the fields of encryption and security, but it definitely fits in with them as well. Must Read: After a Data Breach It’s Often Business As Usual, a chastising look at companies who do not take data breaches to heart and implement better data management procedures.
  5. Midsize Insider – As the name suggests, Midsize Insider is a blog site and article repository geared towards imparting information management know-how to small and medium business owners, managers, and IT staff. With dozens of contributors and staff members, content on the site is always fresh and is released at least daily. The navigation is a bit jumbled and the main pages are a bit overwhelming with information from Twitter, infographics, trending articles, and article lists. Once you get into the articles, things clean up and do not interfere with reading. Midsize Insider is essentially a normal blog on steroids: a bit harder to keep up with, but it packs more punch. Must Read: PRISM and Encrypted Data Benefits, an article on the recent NSA domestic surveillance fiasco and the importance encryption plays in keeping sensitive data safe when anyone – even the government – may be watching.
  6. The Data Roundtable – The Roundtable is a moderated but open posting ground for experts on data management in all of its forms, including subjects like data analytics, management, encryption, and general security. The blog has a marked informal tone, with topics for the posts having some silly sounding titles like “On Lawnmowers and Data Management.” The levity belies the depth of information, experience, and the ease at which many of the contributors impart their knowledge to readers. The layout is sleek and crisp, and the content is updated on an almost daily basis. This is one of those blogs to keep on the top of your list. Must Read: What’s the Meta with Your Data?, a suave title for an intelligent discussion on the importance of metadata.
Juniper - InfoSec 2013 - Photo by David

Juniper – InfoSec 2013 – Photo by David

Security Blogs

  1. Schneier on Security –   Operating since October of 2004, blogger Bruce Schneier has developed a strong following and respect from other bloggers interested in cryptography and related studies. The layout of his blog is very reminiscent of the late ’04 web, but contains a wealth of well-written information relating to everything from computer crime, homeland security, privacy, malware, policy issues, and much more. Frequently updated and easy to navigate, Schneier on Security serves as an excellent resource for those looking to dig up gems from this blog’s archives. The blogger himself is an acclaimed expert in security technology, with recognition for his numerous academic and other published essays, dozen published books, assorted fellowships, media and Congressional appearances, all of which got him dubbed a ‘security guru’ by The Economist. Must Read: Intelligence Analysis and the Connect-the-Dots Metaphor,
  2. Security Bloggers Network – Not a blog in its own right, but rather a collecting house of related blogs, this is a great resource for those looking to take a peek at what is new and exciting in the security blogosphere. They host a blogger hall of fame and annual security blogger award as well as an open feed of new posts to help users find quality blogs of interest. Worth checking out if you are a blogger or an avid consumer of such. Must Read: Security Blogger Awards, for a round-up of regularly updated and well-written security blogs.
  3. CSO– Expert advice on security from a range of experts. Posts cater to organizations and businesses concerned with protecting data.  Regularly updated and well-written, but unfortunately sponsored by intrusive ads that require you to click-through them to get to the content. This site also offers webcasts, white papers, and an emailed newsletter so readers never miss interesting news. Must Read: Are you sure you’re really in control of your servers? This article discusses some of the threats to even owned servers.
  4. Cognitive Dissidents – This security blog features a gorgeous site design with no nonsense commentary on security issues from the perspective of self-declared zombie killer, philosopher, and security strategist. While not frequently or regularly updated, the blog offers a fresh perspective and is well worth a gander. Must Read:  A Replaceability Continuum, an examination of the question, ‘How replaceable is an asset type.’
  5. Uncommon Sense Security – Blogger Jack Daniel, an Information Security Curmudgeon,  writes with a great deal of experience on the InfoSec industry with content that is unsponsored and uncensored. Expect to find no-nonsense posts on a whole range of related topics and the occasional helping of acerbic wit to raise a chuckle. Regularly updated since June of 2007, this site is clean and straightforward to navigate.  Must Read: Managing employees and expectations, for a rant on how to retain quality InfoSec personnel.
  6. Andy Ellis > Protecting a Better Internet –  Primarily targeting the clientele of the information security industry, this blog is an excellent resource to get a handle on trends, methods, terminology, related news, and events. Regularly updated since May of 2006, Andy Ellis has been providing readers with information that is incredibly easy to parse no matter a reader’s experience level. His focus is on internet security and steps that can be taken to tighten up sites to prevent leaks, scams, and other threads.  Must Read: Leveling up Security Awareness, for a solid article addressing one of the biggest weaknesses in security protocol – the human element.
  7. Threatpost – The Kaspersky-owned Threatpost blog is one of those selections that make you do a double-take when you find the tucked-away reference to the parent company. From all appearances, you would believe that Threatpost is run by InfoSec enthusiasts who do their job for the love of it. The update rate is astounding, and checking the blog every day for content is the bare minimum unless you want to fall drastically behind. Topics center on security related news such as malware, cryptography, and hacking. We are confident enough that the great design and implementation of the blog will speak better for itself than we can, so stop by Threatpost as soon as you can. Must Read: Royal Baby Spam Campaign Leads to Black-Hole Infected Site, because it is one article about the royal baby that won’t leave your brain melting out of your ears.
  8. LiquidMatrix – This refreshing InfoSec blog screams “educated and edgy” from the moment you pull up the home page. The layout is slick and beautiful while facilitating easy reading and the glimpsing of information. You will find ten or more posts per month that touch on InfoSec news from around the world. They are accompanied by the podcast which releases episodes every couple of weeks and are amusingly numbered in hexadecimal. In fact, the podcast could be considered the major draw of the site, and you will greatly miss out on the value of LiquidMatrix if you skip over the episodes. Two of the sections we like the most – a list of default passwords on almost 1000 devices and their critical security advisory page – do not get the navigational focus they deserve, so make sure to check the small content box for links to them. Must Read: What to Do If Your iPhone Gets Stolen, a handy read for the millions of users of the Apple smartphone.
  9. Krebs on Security – Krebs’ blog is one of the most popular and active personal sites in the InfoSec blogosphere. The author, Brian Krebs, has years of experience in professional writing, most notably a long stint with the Washington Post. Like many people today, he began in another field and gradually gained interest in the ins and outs of the IT world. His blog contains frequent updates with a focus towards malware, exploit kits, hacking news, and security in general. Most of the articles go above and beyond the brief articles found on other sites, and many of his technical reviews of malware and exploits can prove to be lifesavers. The popularity of Krebs is well-deserved due to the quality and frequency of its postings, and it should easily find a spot in most people’s roundup of InfoSec related readings. Must Read: Web Badness Knows No Bounds, because while you may think that avoiding sites that scream danger will protect you, browsing online always presents some level of risk.
  10. The Falcon’s View–  The Falcon’s View has all the qualities we like in a personal blog: most of the posts are original content authored by the owner, it keeps a good update frequency despite having quality content only created by a single author, and the writer is knowledgeable and legible while seeming approachable. The author is an employee at Gartner and a contributor to their blog, but he still cross-posts his own content to his personal blog. The only real negative that can really be attached to the blog is the background colors are not the best, but that does not detract from the enjoyable and unique content. Must Read: Arguing Against the Absurd, an article where Ben shows the proper way to comment and discuss on a post from another blog or source.

Image by IntelFreePress

  1. TaoSecurity – A growing number of malicious attacks on networks throughout the world are originating from one place: China. TaoSecurity brings all the information related to the threat of Chinese hackers into one spot. The author of TaoSecurity is Richard Betjlich, an experienced InfoSec specialist and author. The blog has been in existence since 2003, pointing to the alertness and awareness of the situation that noted the oncoming problem long before it became the subject of national attention. Due to the narrow scope of the blog, the posting frequency is understandably low and sits at about two per month. Must Read: President Obama Is Right On US-China Hacking, a post with commentary and a link to President Obama discussing some of the ongoing issues with Chinese hackers.
  2. Securosis – With a no-nonsense approach to InfoSec research and education, Securosis skips past the marketing and posturing that other company blogs include so well that we could not even include it in the InfoSec company blog section. Posts tend to come up once or twice a day, and they are typically unique articles with a purpose rather than reposts, links, or brief commentaries. If you finish the daily offerings and want more, the research library contains what they consider their key posts on a variety of security subjects. The library is not updated frequently, but it serves adequately as a secondary resource and a good place for those just getting started. We also love the coloring on the blog since the off-white post backgrounds makes extended reading easier on the eyes. Must Read: Endpoint Security Buyer’s Guide:  Buying Considerations, a post every business owner should read before they sign up for security services.
  3. Network Security Podcast – Sometimes, the medium your information is delivered in can play a big impact on how likely you are to go through it and the level of enjoyment you get out of it. This is where podcasts come into play, as they function essentially like audio blogs. The Network Security Podcast features a lively crew of InfoSec specialists who banter and discuss the most newsworthy topics in network security. While many blogs offer multiple viewpoints, it is difficult to get the same depth of discussion and debate that you do from having multiple people conversing. A new podcast is released around every two weeks, and they make for a great bit of listening while working on other tasks. Must Listen: Their June 18th, 2013 podcast that touches on everything but the immensely covered Snowden case.
  4. Network Security Blog – This blog is maintained by a sole contributor named Martin McKeay, a friendly fellow who works as a “Security Evangelist” in California and is also a regular figure in the podcast noted above. The posting schedule is a bit haphazard, but he does throw up somewhere near five notes a month on average. The articles range from analysis of network security news, tips and advice on proper security methods, and links and commentary to other useful resources. There is nothing noteworthy about the design and scheme of the blog, but there is nothing wrong with using what works. The blog has been in existence since 2003, providing over 1000 posts to rummage through if you want to get caught up. Must Read: Rage Against the Machine, a collection of informative links related to the NSA PRISM project.
  5. HiSoftware: Shooting from the Hip – HiSoftware is an information security company that provides a “Governance, Risk Management and Compliance (GRC)” platform to companies and organizations that want to keep their data safe. The blog for the company focuses on the issues of data management and security, most frequently featuring topics like data breaches, problem technologies, security standards compliance, and news related to data security. The look and feel of the blog has some nice touches, but it remains fairly standard overall. Posting occurs at a fairly nice rate with updates coming in every three or four days. Must Read: This article on the threat SharePoint can pose for data leaks is illuminating even while it highlights the role HiSoftware’s service can play in preventing the same thing from happening to your business.
  6. ThreatVision Labs – ThreatVision is the blog for Solera Networks, an information security company that focuses on providing solutions for Big Data.  The content focuses mostly on reports of malware and other security threats that can wreak havoc on your data, providing higher level overviews that give enough of the technical side of things to point you in the right direction if you want to learn. Articles are posted roughly four times a month. The blog’s design is simplistic and effective, garnering no complaints while not really astounding anyone. You should also hop over to ThreatVision’s sister blog that we mentioned above, From the Trenches, which contains more anecdotal looks at information security in the field. Must Read: Five Cybercrime Trends Likely to Continue in 2013, since it always pays to be up to date on the network attacks you are most likely to experience.
  7. Tenable: Network Security Blog – Tenable’s blog is one of the best company blogs on the list when it comes to the amount of content delivered. They offer a regular podcasts, webcasts, frequent posts, tutorials, white papers, RSS feeds, and newsletters. The blog does push the products of the company fairly hard, but it is relatively tolerable due to the sheer amount of other content. The content is updated almost every day, but you can probably get enough out of the blog by spending a few minutes on it every two or three days. Must Read: Prove You’re Watching 100% of Your Network, a post which points out that even the companies who keep an eye on their networks may not be doing so well enough.
  8. Hacker Academy Blog – The Hacker Academy adheres to the “know your enemy” strategy that has proven itself time and time again. They provide a look at security from the view of those who do their best to circumvent it, and you cannot protect against things you do not know about. The blog is updated roughly every month in a haphazard schedule, but the posts in the blog are less important than the library of information available on the site. The layout is basic with a soft grey background that makes it much easier on the eyes. They offer training modules on a variety of security topics and frequently hold webinars. The information is presented a clear and concise fashion that makes it accessible for newcomers and experts alike. Must Read: Hacking Fundamentals, one of their training modules and a good look at the basics of the hacker mindset and toolkit.
  9. VeraCode Blog – Veracode is a company that offers Security as a Service (SaaS) through their Cloud-based Application Risk Management Platform. They focus on security testing for applications, which is why their blog splits itself between general security news and tips for programmers on how to secure their applications. The layout of the blog is fairly bland, featuring a scheme that is mostly just a white background. Updates come along every two or three days, and they do a good job of keeping obvious plugs for the company to the bare minimum. The blog is minimally useful for security programming tips with a pointed focus towards security news. Must Read: 4 Things You Should Know Before Writing Another Line of Code, a quick list of useful tips to keep in mind for security while programming.

The 45 Best Forensic Tech Blogs

Forensic technology encompasses a wide range of fields and technologies and is often used, with some controversy, in criminal trials. The blogs below examine forensic tech from all angles, from professionals active in the field, to journalists covering the impact and evolution of forensic technology, to skeptics concerned about the ramifications of junk science being labeled as forensic science being used to convict in trials.

Forensic Science

West Midlands Police Forensic Science Lab - Photo by West Midlands Police

West Midlands Police Forensic Science Lab – Photo by West Midlands Police

  1. Anti-Polygraph BlogOpened: April 2006 with regular updates in the last few years. Style and Focus: Detailed and supported articles about the ways in which polygraph tests are used and abused, information about the deficiencies of the technology, and news. Also very active on Twitter. What to Read: Polygraph Countermeasures: What Polygraph Operators Say Behind Closed Doors, for a glimpse at the concerns even polygraph operators have with the reliability of the technology.
  2. Zeno’s MonthOpened: July 2004, with biweekly or monthly posts since then. Style and Focus:   Much more of a personal blog than an informative one, this blog, run by a forensic scientist, touches a bit on his work and life. Expect vacation adventures to be mixed in with news and conference details related to the forensics industry. What to Read: October 2012: Some Challenges in Digital Evidence, for a glimpse at what forensic science was concerned with and preparing for in late 2012.
  3. FSN: Forensic Science NewsOpened: April 2008 with post frequency varying but highly active since then. Style and Focus: This frequently updated blog provides opinionated responses to news and events related to forensics from the point of view of a professional forensic scientist. Well written and timely responses to criminal cases and forensic news and advances. What to Read: Institutional Bias Examined, for a great introduction to how insidious institutional bias can be and some thoughts on how it plays out.
  4. All About Forensic ScienceOpened: May 2012 with fairly regular posts each month. Style and Focus: Despite the busy look of this site, it contains a wealth of information for individuals looking at entering the field of forensics. Regular posts focus on information relevant to potential forensic students or those with a casual interest. Posts are short and sweet but informative. What to Read: Mathieu Orfila, for a wonderful brief bio on one of the forefathers of forensic medicine.
  5. UF Forensic Science BlogOpened: March 2012, fairly consistent with bimonthly posts. Style and Focus: This blog provides its readers with reasonably fascinating posts covering different types of forensic science along with forensic analysis in the news. Not the most frequently updated and the author is not a native English speaker (and it shows in the writing), but it is worth a gander. What to Read: Untying the Knots, for a quick and dirty overview of the importance of forensic knot analysis and the rarity of such expects (with a link for more information).
  6. Forensic Odontology: Bitemark EvidenceOpened: January 2011 with regular updates about once a week since. Style and Focus: With a minimalist look and easy to navigate interface, this blog welcomes readers to explore the world of bite mark evidence, with a focus on educating readers to the potential negative legal ramifications of relying on it as evidence. The author is a highly experienced professional forensic odontologist, with plenty of background to provide invaluable expertise to the posts. What to Read: Ted Bundy Bitemarks and Richard Milone: How DNA, bitemark research and failed cases have changed bitemark analysis, for an examination of how these high profile cases used bitemark evidence questionably and how it is used today.
  7. Forensic DNA Testing Blog Opened: December 2007 with irregular posts since then. Style and Focus: This blog allows posts from both DNA Diagnostic Center staff and clients that concern forensic DNA testing. While DDC moderates the posts, the authors can vary and thus the style of writing as well. The blog is easy to navigate and contains a wealth of information for readers interested in keeping up news, advancements, and case studies involving forensic DNA. What to Read: New DNA Test Predicts Eye Color, for a quick article introducing a new advancement in forensic DNA analysis – the ability to predict eye color from samples left at crime scenes. Not strong enough as a sole source of information, but an asset to an investigative team.
  8. Forensic AstrologyOpened: July 2007 with irregular posts that appear at least once a month since. Style and Focus: Admittedly, this site is a bit of an outlier amidst genuine scientific research blogs and companies and the site reinforces this general feel with its dark background and starry banner, but the information presented makes for an interesting read. The author has a 30 year background in utilizing astrology to analyze case files with an eye for forensics and provides detailed case file information, often sent in by readers, as well as the process by which astrology is used to hunt for new details in the case. Even if you do not buy into the premise of astrology, the blog is worth a look. What to Read: Shemika Cosey – Young Lady Leaves Her Aunts Home and Disappears, for a typical case study that details the process of forensic astrology and paints a narrative of what might have happened in this disappearance.
  9. GunSim Ballistics Blog Opened: March of 2009 with irregular but generally biweekly posts since then. It has slowed a bit recently. Style and Focus: No-nonsense style reminiscent of the early days of the internet, this blog’s pared down appearance suits the straight forward information it provides to readers. It focuses specifically on technology and software used in ballistics testing with helpful tips on getting the most out of it, news, and more.  What to Read: Zero in the warm, shoot in the cold, for a quick look at how ballistics information can help improve cold weather sharpshooting.
  10. Empirical Legal Studies Opened: February 2006 with regular and frequent posts ever since.  Style and Focus: Another early internet era styled site, this collaborative effort was founded by a group of professors from a few different Law Schools with the intent to bring together empirical methodologies and legal theory. Posts can greatly vary in length, but are usually well-written and informative. They bring commentary to news, changes in legal policy, useful resources, and more. What to Read: Kahan on National Research Council critique of multivariate regression, for review of one professor’s concerns about the potential problems in research and how they influence policy view.

Forensic Medicine

Medical evidence collection - Photo by Army Medicine

Medical evidence collection – Photo by Army Medicine

  1. Forensic Science for NursesOpened: February 2011 with consistent weekly posts. Style and Focus: RN Patricia Bemis provides her readers with straightforward, to the point blog posts that give other nurses tips on how to preserve potential evidence, information on forensic nursing, and news related to the field. She also discusses the importance of keeping forensics in mind as a nurse of any stripe. What to Read: Evidence Collection in the ED, for a quick review of simple steps ED nurses can take to preserve potential evidence.
  2. Digital Pathology BlogOpened: Active since 2007. Style and Focus: More like an information hub than a typical blog, this site features regular posts from experts in digital pathology on news, advancements, cast studies, and educational information. The site is a bit busy, but easy to navigate and features a lot of resources for those with an interest in the field. What to Read: The Anxiety of the Biopsy from NY Times Health Blog, for Dr. Kaplan’s response to a NY Times article on the mental health effects biopsies can have on patients.
  3. Forensic Medicine with Dr. Cox Opened: Started September of 2009 with semi-sporadic posts, generally once a month. Style and Focus: While sporadically updated, this blog is nevertheless a wonderful resource for those with an interest in forensics, particularly with a medical bent. Written by professional forensic pathologist and neuropathologist, Dr. Cox, each post is designed to inform and instruct readers on an aspect of forensics. Often, the blog posts are short introductions to longer papers linked in the post. What to Read: Human Skeletal Remains – An Introduction to Forensic Anthropology, for an introduction to a well-written and informative article introducing readers to the important concepts in forensic anthropology.

Forensic Museums and Historians

Forensic Anthropology Lab - National Museum of Natural History - Photo by Leticia (Tech Savvy Mama)

Forensic Anthropology Lab – National Museum of Natural History – Photo by Leticia (Tech Savvy Mama)

  1. Crime Museum’s Criminal Convictions BlogOpened: February 2009 with consistent weekly posts since. Style and Focus: This blog is run by a museum and readers can expect highly entertaining, detailed, and well-written posts covering crime, criminals, and forensics. Recently, they posted the story of a potential real-life inspiration for the American mythical hero the Lone Ranger. The site itself is well designed and easy to navigate and offers readers more than just a lively and engaging blog. What to Read: The Vidocq Society: ‘The Heirs of Sherlock Holmes’? A glimpse into first real life French undercover detective agency and the fascinating character who helped found it, former criminal reformed into detective, Eugene Vidocq.
  2. The Writer’s Forensics BlogOpened: May 2009 with regular posts since. Style and Focus: This blog’s intended audience is writers who want realistic, informative advice and information on forensics. It includes general writing advice, like how to make your first few pages shine, and detailed information on a whole range of forensic science. A fascinating read if you have an interest in forensics at all. The design is clean and easy to navigate, with lots of resources and great organizational tools. What to Read: Connecticut Massacre Not New, Just Disturbing, for a quick and dirty guide to the assorted classifications of multiple murderers and real-life examples of such.
  3. Jen J. Danna ~ Forensic Crime WriterOpened: April 2011 with regular posts since, generally updated Tuesday evenings. Style and Focus: Another writer’s blog, this one expands beyond simply advice for authors, it chronicles this author’s journey in writing, provides information on research, writing processes, and the path to publication. She also does an excellent job in covering forensic science and how it can be effectively used in writing. She has a particular focus on forensic anthropology. What to Read: Forensic Case Files: Cannibalism in Jamestown in the Early 17th Century, for a gruesome look, figuratively and literally, at some of the evidence illuminating the meal-times at Jamestown colony, courtesy one 14 year old immigrant.

Computer Forensics

Digital Recovery Storage for Child Online Safeguarding Team in the West Midlands Police Dept.

Photo by West Midlands Police

  1. Computer Forensics BlogOpened: August 2008 with very frequent posts ever since, generally more than twice a week. Style and Focus: This highly active blog is a fantastic resource for any computer forensics professional or individual interested. They keep readers informed of product information, news, and events while also providing lots of tips and guides to improve one’s computer forensic tool bag. What to Read: Four Focus Areas of Malware Analysis, for an informative post briefly explaining one method of analyzing malware.
  2. Digital Forensics BlogOpened: November 2010 with sporadic updates, generally once a month. Style and Focus: While this blog isn’t frequently updated, it does provide excellent information and tips targeting other computer forensic personnel. The author provides advice born from practice, events relevant to the field, news, advancements, and more. What to Read: No Partition Table? No Problem, for a helpful post targeting newer computer forensic professionals who need a way around disks lacking partitions they need to mount.
  3. Random Thoughts of ForensicsOpened: February 2010 with posts generally updated once a month. Style and Focus: More of a personal blog than one designed to provide a great deal of professional advice and resources, it provides a glimpse into the journey of one student of computer forensics and includes his experiences with different forensics techniques and triumphs along with personal and professional experiences alike.What to Read: Tools in the Toolbox Mandiant Red Curtain, a quick and dirty overview of a free software for Incident Responders analyzing malware.
  4. Didier StevensOpened: June 2006 with regular posts from that point forward. Style and Focus: This is not a blog for those with a casual interest, it is full of technical details and step-by-step instructions designed to share ideas, tactics, and resources with other professionals.  Regularly updated and  on a wide variety of related topics, this is a highly useful tool for any computer professional interested in forensics. What to Read: Quickpost: TeamViewer and Proxies, a quick and dirty how-to post.
  5. Windows Incident Response BlogOpened: December 2004 with very active and regular posts, at least one a week, frequently more. Style and Focus: This long running blog is focused on providing resources to professionals involved in computer and digital forensics with Windows systems. Most posts are focused on explaining different analysis approaches or techniques, but it also informs readers of news updates, products, and events. What to Read: There Are Four Lights: The Analysis Matrix, for an explanation of analysis matrix and how it can be used to more effectively analyze data.
  6. Forensic Focus Blog Opened: November 2007, generally updates often. Style and Focus: Focused on providing news and tools for other computer forensic professionals, this blog features well written and tool-packed articles, interviews with folks in the industry, news, reviews, and more. The site itself is slightly busy, but well organized and easy to navigate. What to Read: Generating computer forensic supertimelines under Linux: A comprehensive guide for Windows-based disk images, for a guide to the assorted solutions available to assist with creating digital forensic timelines with code files.
  7. Forensic 4:castOpened: January 2008 with regular and fairly consistent weekly updates. Style and Focus: This sleek and well-designed site offers its visitors a wealth of information related to digital forensics delivered in podcast format with discussions from a range of industry experts. They also run a regular newsletter that supplements the information provided in the podcasts. They also host the 4:cast awards to acknowledge great forensic tools, resources, and individuals in the field.   What to Read: How to do the worst job possible, presenting a very poorly written forensic report.
  8. Mobile & Technology eDiscoveryOpened: November 2006, with somewhat sporadic posts, but generally at least one a week since open. Style and Focus: While it doesn’t present the most elegant design ever, the blog delivers excellent content for readers involved or interested in digital forensics. It features regular articles on tools, best practices, resources, case studies, and more.  What to Read: Signal Strength and Distance, for a discussion on what cellular signal strength and distance is and how to discuss it in court.
  9. CSItechOpened: May of 2008, with bimonthly posts since. Style and Focus: The clean layout allows readers to focus on the content, which is focused on informing readers about newly developed tools and tactics designed to improve the computer forensics industry. Expect lots of reviews and guides on using new tech and practices. What to Read: Password extraction fun, for a good review of a program that can help uncover passwords on devices first responders need to access quickly.

Forensic Technology & Techniques

Fingerprint - Image by CPOA

Fingerprint – Image by CPOA

  1. Crime Scene TrainingOpened: December 2010 with fairly consistent, frequent posts. Style and Focus: This very well organized blog has been regularly providing advice, insight, product reviews, and more targeting any investigators who do any part of their work directly at the crime scene. Articles are informative and practically useful. What to Read: Avoiding Hazards at the Crime Scene, for a well-written, thorough, and extremely handy article for any forensic tech who goes on scene.
  2. The Truth about Forensic ScienceOpened: February 2010, with frequent and regular updates. Style and Focus: This blog targets DUI lawyers and criminal defense attorneys and helps educate its readers on the different types of forensic evidence that can be brought to a trial, with a focus on weaknesses and defenses against them. The blog is authored by a highly respected criminal defense and DUI attorney. What to Read: Limitations of Forensic Odontology, for an overview of the problems with forensic odontology.
  3. The Hacker Factor BlogOpened: November of 2006, with fairly regular posts at least once a month since then. In the last two years, it has trended towards weekly updates. Style and Focus: This blog is a treasure, with entertaining and informative posts that are often designed to generate discussion amidst the readers. The primary focus is on the tools and techniques designed to help computer techs of all sorts, but it occasionally drifts into completely unrelated but often fascinating territory.  What to Read: Chasing Rainbows, for a really fascinating article discussing super-senses.
  4. Forensic MethodsOpened: August 2009 with sporadic but fairly regular posts since then. Style and Focus: The layout of this blog makes it feel more like a digital magazine than a traditional blog, and its posts take a non-traditional spin too. Some are simply quick Twitter updates; others are snippets of a great article found elsewhere with a shortened link to the primary article. Still, the original content here is not to be missed; the articles are well-written and informative and often offer a behind the scenes glance at the writing process. What to Read: Digital Forensics Magazine: Big Brother Forensics, for an article on an article, also a brief introduction to the potential ramifications of geo-location technologies.
  5. Forensic ResourcesOpened: July 2011 with frequent posts, often more than once a week, since then. Style and Focus: A sleek and well-written blog providing detailed information about forensic science, including techniques, news, legal issues, and advancements. It caters primarily to attorneys based in North Carolina, but is a worthy read for anyone who needs to increase their armchair knowledge of the science. What to Read: Improving Arson Investigations, a resource-filled article pointing readers towards new developments in science that shook up fire investigation.

Cold Cases & Wrongful Convictions

  1. Defrosting Cold CasesOpened: November of 2009 with prolific posting habits, though slightly slower in recent months. Style and Focus: The blogger clearly cares about justice for victims who have been left behind by time. Posts are frequently focused on bringing light to cold cases that may have been gathering dust, telling the stories of the victims, and sharing information about the crimes. The author also focuses on wrongful convictions and forensic information that may help solve some of these cases. The site is beautifully designed, easy to navigate, and the articles are well-written. What to Read: In Loving Memory: Jimmy Stanaway, for a heartfelt memorial to a cold-case victim, providing a personal face to a dusty file.
  2. The Wrongful Convictions BlogOpened: It’s hard to pinpoint the open date of this blog, but it is currently highly prolific, with often multiple posts in a day. Style and Focus: Informative, well-written, and prolific, this blog features a panel of expert authors from a variety of backgrounds to bring readers the latest in news about wrongful convictions, including forensic analysis changes, case studies, legal changes, and more. The site is a little difficult to navigate, as it lacks a proper archive; users can search, or sort through categories to find what they are after. What to Read: Calculating Bad Math’s Contribution to Wrongful Convictions, for an interesting analysis of how a judge or jury’s failure to comprehend mathematics might lead to miscarriages of justice.

Fraud & Crime Blogs

Fraud Tech on a $20 - Image by Jack Spades

Fraud Tech on a $20 – Image by Jack Spades

  1. The Fraud Files BlogOpened: November 2005, with prolific and regular posts since. Style and Focus: This blog is focused on fraud of all kinds, from small to massive, on a national scale. Expect lots of links to related information, quality writing, and informative posts. What to Read: MckMama House Fire is Not Suspicious In the Least.
  2. Expert Witness BlogOpened: March of 2007, with near daily posts. Style and Focus: Most posts are very brief and present readers with information about what expert witnesses are testifying about in trials around the nation. Some posts focus on preparing witnesses for trial, news, or other relevant information. What to Read: Environmental Health Expert Witnesses & Hanford Nuclear Reservation, for a typical post example.
  3. Grits for BreakfastOpened: January 2004, with highly prolific and regular posts since then. Style and Focus: A very well-respected blog focused on Texas criminal justice. The author has been recognized for his excellence from a number of Texas newspapers, organizations, and other criminal justice bloggers and even won a handful of awards over the years. Except quality writing, well-researched content, and no-nonsense (and often contrary) opinion delivered near daily. What to Read: A forensic science ‘blockbuster’ and limits of accreditation, taking a glance at several forensic science news articles and points to the shaky ground some forensic data is built upon.

Forensic Anthropology & Psychology

Bones in the Monasterio de San Francisco, Lime, Peru. Photo by Phil Whitehouse.

Bones in the Monasterio de San Francisco, Lime, Peru. Photo by Phil Whitehouse.

  1. Forensic PsychologistOpened: April of 2007, with at least a post a week consistently since then. Style and Focus: The site itself is a little aged, but that has no impact on the quality of its contents. Blogger Karen Franklin, Ph.D. is an experienced forensic psychologist and adjunct professor who has served as a criminal investigator and legal journalist. She has the chops and the ability to write effectively about what she knows. Her posts cover news, resources, case studies, methodologies, and more in the fields of criminology, forensic psychology, and psychology law. What to Read: Beware “voodoo” brain science, for an examination of some of the controversial claims made by proponents of brain imaging as a way to distinguish potentially dangerous traits in an individual.
  2. Mind HacksOpened: November 2004 with consistent and prolific posts since. Style and Focus: Clean design with easy navigation introduces readers to a site loaded with information presented from very prolific bloggers. Posts focus on the fascinating world of neuroscience and psychology. Well-written responses to news articles, explanations of weird brain quirks, neuroscience history and notable figures, and much more can be found here. What to Read: A brief history of narcoanalysis, for a fascinating introduction to the use and history of the administering of ‘truth drugs’ to elicit supposedly truthful confessions.
  3. Smith ForensicOpened: September of 2004 with consistent and prolific posts since. Style and Focus: This blog offers a simple, clean style and easy navigation with a focus on forensic pathology as presented by blogger Harold Levy, a Toronto Star investigative journalist who gained an interest through his reporting on once famed doctor Charles Smith. His blog examines flawed pathology and delves into the cases they impact around the world. He also examines junk science and its impact in criminology broadly.  What to Read: Marvin Wilson: How Texas is using literature rather than scientific methodology to kill a clearly retarded man – to circumvent the U.S. Supreme Court. – For a heart-rending examination of an abuse of the justice system, forensic science, and one man’s life.
  4. Bones Don’t LieOpened: Style and Focus: Written by mortuary archaeology and bioarchaeology graduate student Katy, this blog shares her discoveries, like a recent dig in Oakington containing the burials of over 100 Saxons. She also writes about forensic techniques, archeological history, news, and more on a blog that is beautiful and easy to navigate. What to Read: Displaying the Famous Political Dead, for an interesting glimpse into the practice of preserving the notable dead for public display.

Forensic Companies

  1. Forensic Technology NewswireOpened: April 2009 with frequent but irregular posts. Style and Focus: Their style is much more like a newsfeed than a personal blog, they keep readers up to date on how their products are being used and received around the world, as expected from a company blog, but they do so with solid and informative writing.  What to Read: CSI: Miami & Real Forensics: We Won’t Get Fooled Again, for a post examining the relationship between CSI and real life crime solving.
  2. Forensics Blog (BCIT)Opened: July 2010 with consistent weekly posts since. Style and Focus: A simple interface greets visitors in this Forensic Institute’s blog focused on forensic education, Canadian forensics, news, events, and advancements in forensic science. Most posts are short and sweet. Those local to the area will also find timely related job postings and course updates. What to Read: Forensics’ Grad Bringing Backpacks to the Homeless, for a lovely quick bio on a recent BCIT graduate doing good for her community.
  3. The Forensic GroupOpened: Style and Focus: Clean and straightforward writing designed to inform and educate readers on the methods and developments in computer forensics tactics and technology. Some news and events are introduced as well as case studies. Clean interface but somewhat difficult to navigate. What to Read: Computer Forensic Artifacts: Windows 7 Shellbags, for an informative introduction to how Win7 Shellbags can be used to trace activity and contents in computer forensics.

Forensic Imagery & Artists

1940 Mugshot - Image by Lisa Bailey

1940 Mugshot – Image by Lisa Bailey

  1. Four And SixOpened: June 2011 with regular posts, about one a week, consistently since day one. Style and Focus: Four and Six offers its readers a clean style with useful posts ranging from image forensics techniques to thoughtful posts on ethical treatment of imaging tools and news and information related to image tampering.   What to Read: The Case of the Pole in the Middle of the Road, for a nifty inside glimpse into what photographic forensic investigation.
  2. Forensic Video and Image AnalysisOpened: September 2007 with consistent and prolific posts ever since. Style and Focus: An absolutely fantastic resource for anyone who is involved or interested in image forensics, this highly active blog provides readers with information or resources on tools, software, product reviews, technique basics, image forensic cases, educational opportunities, and a mix of personal insight. Very informative, well-written, and easy to navigate. What to Read: Learn new Photoshop features in a click, for an introduction to a free and handy tool available to improve your Photoshop CS6 experience.
  3. Ask a Forensic ArtistOpened: January 2010 with regular and prolific posts since. Style and Focus: This well-designed blog is a great tool for other forensic artists, those who want to be, and those who are just simply fascinated by the process. It includes techniques, news, educational opportunities, fascinating interviews from other forensic artists, and more. What to Read: The “Pencil Trick” for Edentulous Skulls… Debunked, for a great breakdown of what the pencil trick is, and why it doesn’t at all work as it is supposed to, with photographic evidence.


Top 30 Privacy Blogs

With the recent unveiling of the intense Internet surveillance operation being carried out by the NSA, more people than ever are interested in keeping up to date on the latest laws, news, software, and other information related to maintaining privacy online. There is an immense number of blogs related to information security in all of its incarnations, so we have picked through the offerings to find you the best blogs that deal specifically with personal privacy law and technologies. These are listed mostly without any indication of which is better than any other and are instead separated into categories based on their focus. The focus of the blogs includes hacking methods, ways to protect yourself from identity theft, news on information security topics, and discussion about censorship and identity law.

 Privacy image by Sean MacEntee

Cream of the Crop

  1. The Privacy Blog – In a list of privacy blogs, one named The Privacy Blog would clearly seem to fit the criteria. Luckily, it is also one of the best in the genre for details on privacy in the technological world. Updates are posted weekly, and most of the content is original. This includes a podcast for those who would rather listen to news on the latest security threats. Content covers security technologies, opinions on privacy and hacking litigation, and news related to privacy threats and tools. Check out their latest podcast to get a taste of the monthly episodes.
  2. Electronic Frontier Foundation – The EFF is an organization dedicated to the defense of the right to privacy in a world where everyone from the hacker kid down the street to the government can snoop on you. Their Deeplinks blog includes almost everything related to privacy and personal rights with an impressive amount of content delivered daily. If there is news that remotely touches on electronic privacy – whether its copyright laws, government surveillance, hacker tricks, or even just swag – you can find it here, but the blog does have a marked legal focus. Check out this article on the issue of warrantless DNA acquisition.

Privacy on the Net

  1. The Online Privacy Blog – This blog is run by the company Abine, an Internet privacy software developer with products like DeleteMe and DoNotTrackMe. The content is a mix of news about online privacy laws, security breaches, tips for keeping yourself secure while using social media and other common online services, and press releases for the company. Two articles a week is the rough release schedule. Check out a report on the surveillance capabilities of Microsoft’s next console, the Xbox One.
  2. EPIC: Electronic Privacy Information Center – EPIC is an organization that provides information with a focus on online privacy, though they do branch out into related technological fields such as biometric data, drones, and other hot button issues. The majority of the site content is in their static information, but their news feed does provide short updates on current news and events. If you want to get a quick synopsis of privacy related news without excess analysis or reading, then their blog should come in handy. The rest of the site is also extremely valuable for its large amount of educational material. Check out their news report on a Supreme Court ruling on DNA privacy.
  3. WIRED: Threat Level Blog – WIRED is a site renowned for its news and insights into the world of technology, and their Threat Level blog applies the same quality of content to the dedicated topic of privacy and the law within the context of technology. Thanks to WIRED being a news organization, the tone of the articles stays more subjective than personal or company blogs, though opinion always bleeds through in writing. Check out this opinion article on email privacy law and the lack of protection that electronic communications receive legally.
  4. Freedom to Tinker – FtT posts focus on news related to technological privacy and law alongside a large amount of insightful commentary and opinion pieces. The number of writers is smaller than you will find on some bigger websites, while still being large enough to provide more variety of opinion than a single user blog and a decent update schedule. Check out this article from 2006 on wiretapping abuse and the NSA that foretells some of the recent privacy related news.
  5. ACLU on Technology and Liberty – The ACLU is a well-known American organization dedicated to the preservation of civil liberties in every form they take. Their blog is a robust and well-developed collection of useful and informational content on a variety of topics, and because of the volume of information they cover, the blog has several subsections to help those looking for information on a specific topic. For online privacy related news, the Technology and Liberty section is where you want to go. Check out this article on metadata to see just how important it can be in light of the NSA surveillance issue.
  6. Center for Democracy & Technology Blog – The CDT is an organization similar to the ACLU but with a focus on influencing policy related to the freedom to privacy and expression on the Internet. Unlike most of the above blogs, the CDT has a broad, worldwide view and will often discuss online privacy policy from nations other than the US. There is still more focus on American and EU news, but it is refreshing to get a glimpse of the world at large. Check out one of their weekly looks at global policy for news from Syria, Japan, China, Taiwan, and Australia.
'Eyeing John Marshall Law School' photo by Seth Anderson.

Photo by Seth Anderson

Privacy Law & Policy

  1. FCC Blog – The Federal Communications Commission is an organization with which most American are familiar due to its role in radio and television broadcasts as well as the Internet. As it is a government website, you can expect a lot of dry content and not so much in the way of unique viewpoints, but it is a good idea for Americans to stay abreast of an organization that influences their online privacy to a large degree. Check out this article detailing some of the consumer protection services the FCC offers.
  2. Privacy Law Blog – The Privacy Law Blog is managed by the Proskauer law firm, a group with a focus on international privacy law. The blog content does trend to US and EU policy and law. The topics covered are usually about informing about laws concerning privacy, patents, and security and updates to them. Though the release schedule is low compared to some of the others on the list, they still tend to release an article every week. Check out this report on the conundrum of when European privacy law applies to American companies.
  3. Privacy & Security Law Blog – The editors and contributors of this blog belong to the Davis Wright Tremaine law firm, a nationwide entity with over 500 associates. Their firm handles cases covering a wide variety of subjects, but the privacy and security blog is managed by their resident expert associates on the topic. Articles range from discussion on cybersecurity, discussion of data standards like HIPAA, and news related to changing laws regarding privacy and technology. Check out their report on a recently introduced federal data breach law.
  4. Law and Terrorism – Gregory S McNeal is a security specialist and university professor who has received national recognition by news corporations, Congress, the military, and other notable organizations. His blog only features content he writes himself, leading to a low update rate with articles that trend towards his focus and activities at the time, but this does mean the content covers topics that might not be the focus of other privacy blogs at the time. Check out his article on drones and due process to see the focus of his latest work.
  5. CERIAS Blog – The Center for Education and Research in Information Assurance and Security is an organization ran by several Perdue university professors and contributors. They broach topics ranging from the technical aspects of ensuring privacy in a digital world to the ethical, moral, and legal guidelines that govern the behavior of individuals and organizations when it comes to information privacy. The blogs content is updated one or two times a month, but every article is unique, lengthy, and full of useful information on security and privacy topics. Check out their objective look at NSA’s PRISM program.
  6. beSpacific – Most of the content on beSpacific is collected news and information about privacy, law, technology, copyrights, and finance. Rather than a blog to go to for original content, beSpacific is an amazing resource and repository for documents, press releases, and other articles in the topics it covers. Content is added daily, and on many days you will find up to ten new posts. Check out the main page. There is no better way to get an idea of the bevy of information hosted on the blog.
See ID - Photo by Bryan Rosengrant

See ID – Photo by Bryan Rosengrant

Privacy & Identity

  1. Privacy Rights Clearinghouse – The PRC is a nonprofit organization based out of California whose mission is to “engage, educate and empower individuals to protect their privacy.” The blog itself is not updated frequently, but the amount of information available regarding privacy concerns on the site in general is staggering. Check out this article for a few simple tips on keeping your privacy private.
  2. Bruce Schneier’s Blog – Bruche Schneier is an internationally renowned security specialist, a member of the board of directors of the EFF, and has published multiple books concerning security and cryptography. His blog content includes recordings of his speaking events, articles and opinions written by him, links to interesting security and cryptography articles, and important news on the same. All of his articles are well-cited and in a format that makes them both look professional and easily understood. His insights are great, and if you like his blog then you should definitely check out his published work. Check out his comparison of the privacy abuse of online companies to the Game of Thrones.
  3. Identity Theft Blog – The entire purpose of this blog and the other portions of its site is to educate people on the dangers of identity theft and how to protect themselves from those who would steal their information and put it to nefarious use. The updates are a bit slow, averaging two posts to the blog per month, but the extra content value in the rest of the site more than makes up for it. If you want to get educated on identity law, identity theft tactics, and how to protect yourself from identity theft, stop by this site. Check out this article showing how something as simple as filling in the information necessary for an insurance quote can give up compromising data.
  4. Spaf Blog – The Spaf Blog contains content written or reposted by Professor Eugene H. Spafford, an educator who specializes in digital forensics, privacy, and information security. He is also the founder and director of the CERIAS web blog listed in the above section. The original content is published roughly on a monthly schedule, but reposting occurs daily. There are over 5,000 article links on the over 500 pages of the blog. Check out the very first page for links to over a dozen high quality privacy articles.
  5. IdentityWoman – The alter ego of Kaliya Hamlin, IdentityWoman, is an intensely active force in the field of privacy information security. Her grammar and punctuation may not be perfect – meaning grammar nuts should avoid the blog – but it is to be expected given the busy schedule the super-heroine keeps. The content on the blog ranges from videos of her talks at various conferences (and “un”conferences), updates on notable privacy events, and her work in an astounding number of IT groups, consortiums, and organizations. Check out the collection of her speaking appearances for some good audio on user-centric identity.

Safety Awareness Week 2011 – NASA Goddard Space flight Center


  1. Krebs on Security – Brian Krebs got into information security for the same reasons many people do these days: thanks to the attacks of hackers on his personal computer network. This sparked a long career of security writing for the Bachelor of Arts, including a long stint as a major security author for the Washington Post with several front page appearances. As far as the blog goes, it is one of the best for quality, the amount of information presented, and originality. The frequency is also very good for the general quality and being a personal blog. Check out his article on the Styx exploit package and the article detailing the story behind its creation and marketing for a look at the brazen offering of script-kiddie tools.
  2. 1 Raindrop – This blog, written and maintained by Gunner Peterson, focuses on security more from a business standpoint than it does on individual privacy and identity. The posts are long and informative, but they assume some familiarity with security issues and the technologies from which they derive. This makes it not so friendly to newcomers to the world of security, but it is more useful to those who want high level information. The blog is updated roughly three to four times a month with mostly original articles of notable length. Check out this article on mobile APIs and security, a useful and important consideration for any business.
  3. CERT – The US government’s Computer Emergency Readiness Team’s site does not officially call itself a blog, but the main page is comprised of time-ordered updates that keep you posted on the latest patches for notable applications like WordPress, Adobe, Java, and Google apps. The site should be on every CEO’s and CISO’s short list to check frequently to see if they happened to miss any important updates. They also occasionally post security bulletins and information from themselves and large IT companies. In addition to their tracking of security updates, the site features a number of resources on protecting yourself from online threats and general security information. Check out the National Cyber Awareness System, a springboard for links to information on security.
  4. Bleeping Computer – While the main page does feature a blog roll of updates and articles, Bleeping Computer is far more than just a security blog. The blog updates themselves are standard fare for a security focused blog, though the focus is clearly on education and teaching for people who might not be as tech savvy as some professionals or enthusiasts.  Once you have gotten your daily update, swing over to the forums and other information resources to get help on understanding and fixing computer problems ranging from security issues to day to day malfunctions. A great overall resource for computer users of all skill levels. Check out their guide on how to remove a tricky bit of disguised malware that disguises itself as antivirus software.
  5. Malware Don’t Need Coffee – While the writing style is haphazard and points to someone using English as a second language, there is no better blog out there if you want to know everything there is to know about the latest malware and exploit kits on the streets. The posts are extremely tech heavy, so less savvy readers will likely need to do additional research when reading. Posts come roughly every two weeks, but they are loaded with content and worth the wait. Check out this detailed and lengthy article on the ransomware called Urausy.
  6. InfoWorld’s Security Articles – InfoWorld is a news site, similar to Wired, which focuses on everything technology. Just like Wired, they also feature a dedicated section for security related articles. As with other news sites, you can expect frequent updates and original content with a more neutral tone overall. You can also branch out from security related articles into general technology news when you finish getting updated. This is a great resource to keep on hand and check daily. Check out this article on bug bounties, the new method larger IT companies are using to hunt down security vulnerabilities in their applications.

Company Blogs

Most of these companies function in the Information Security world in some form or fashion. They usually maintain fairly decent blogs as a way to generate site traffic, keep their users informed, and to increase their appearance as “leaders” in the field. You do have to watch out for product placement in some of them, but they are self-motivated to provide good and reliable information that keeps people coming back.

  1. Fortinet Blog – Fortinet is a company that produces physical and virtual firewalls alongside other network security equipment and applications. The blog sees regular contributions from five different writers, keeping things both fresh and current. Article topics are typically educational pieces on malicious IT attack forms, patch updates for major IT organizations, and security and privacy related news.Check out this post on how to determine if a seemingly innocuous email in your inbox might just be a phishing attempt or other scam.
  2. FireEye Blog – FireEye is an Information Security company with a focus on antimalware applications, penetration testing, and overall system protection. Their blog focuses on the latest trends and tools in malicious cyber activity, and there is a definitive slant towards tech-heavy articles. A great resource, but those less inundated in the world of IT may have to spend some time with Google to get the full value that the articles represent. The speed of their updates is a bit slow for a company blog, averaging two to three posts a month. Check out this informative post concerning a Trojan that recently swept across Asia.
  3. Kaspersky Blog – Kaspersky is most widely known for their antivirus and antimalware applications. There is a bit more “Yay Kaspersky products!” in this blog compared to some of the other companies, but it still manages to get balanced out by the actual information. Check out their article detailing the dangers and costs of employees misusing networked devices while on the job.
  4. SANS Securing the Human – SANS is a company that works to increase security on what is most often the biggest weak point in a network, the human user. On their blog, you will usually find articles relating to attacks that attempt to take advantage of the user, such as phishing attempts and other social engineering scams. They also have a monthly newsletter full of extra material. Check out their look at passwords, one of the biggest mistreated tools in keeping things secure.
  5. TrendMicro Blog – Like Kaspersky, TrendMicro focuses on malware detection, prevention, and removal software. The blog itself tends to focus on preventative measures against malware and other security related issues. The update schedule is fairly slow for having multiple writers, but there is no rehashed content. Check out a post on the dangers of media overflow when it comes to your pictures and other digital information that ends up stored on the Internet, forever.

30 Best Fictional Detectives



A good mystery should be a treasured find. Accompanying an investigator on their adventures as they try to undercover the truth or track down a criminal is an experience like no other, no matter what style of detective they are. Nothing works up adrenaline like accompanying a hard-hitting detective tracking down a murderer.  Nothing excites the logical parts of the mind like seeing a skill sleuth unravel the convoluted trappings of a mastermind’s schemes. And nothing is quite as hilarious as watching a bumbling detective stumble through an investigation, cause mayhem, and still somehow end up solving the enigma. While it is hard to whittle off many of the great detectives that have been created for humanity by the minds of writers throughout the years, we have undertaken that difficult task and came up with 30 of the best fictional detectives in history.

In No Particular Order…


Picture courtesy of Flickr user dynamosquito

Sherlock Holmes – No list about the best fictional detectives will ever be complete without this infamous gentleman detective from the mind of Sir Author Conan Doyle.  Detective Holmes has been the inspiration for many, many investigative characters since his birth in the late 1800s. He has been reimagined on stage, in radio shows, and quite a few movies.  As a detective, he is known for his logical reasoning, early use of forensic science, and penchant for costume.  Quote: “Elementary, my dear Watson” In truth, this was never uttered by our esteemed Holmes but it is nevertheless representative of the character and his attitude.

The Hardy Boys – Inspiring the adventures of young boys since 1927, Frank and Joe Hardy, the teenage brother detectives, have appeared continuously in print, have starred in computer games, television shows, and even been parodied in South Park. The earliest books were praised for the excellent writing of a caliber not normally found in children’s books of the era. Surrounded in a rather felonious small American town, they play perfectly bonded intelligent young men with free access to cash as they weave their way through the mystery and action that lands in their path.  Quote:  “A secret door!” Joe said. “We haven’t’ seen one of these in, oh, several months,” Frank said.

Nancy Drew – Much like theHardy Boys, Nancy Drew has been inspiring girls since the 30s. The character was even the brainchild of the Stratemeyer Syndicate, the same group responsible for the Hardy Boys. Nancy was an immediate hit and has seen continued popularity ever since. My like the Boys, she’s appeared in television, movies, and video games. She has been an inspiration for a number of other girl detectives, and kick started a genre all its own. She is well known for having a can-do attitude, especially noticeable in her ability to drive and fix up her own car. Despite attempts to keep her domesticated by generations of ghost writers, Nancy has managed to maintain her independent quality. Quote: “If a guy’s hunch results in a dead-end, don’t flaunt your better judgment and intuition in front of him. Smirk secretly to yourself.” – The Phantom of Pine Hill

Miss Marple  – The brainchild of Agatha Christie, Jane Marple appeared in 12 novels and 20 short stories as an elderly spinster who fills up her free time resolving the assorted mysteries in her home of St. Mary Mead. She is the counterpart to the gentlemen detective genre, a well-bred, well-educated older woman applying her keen wit, experience, and knowledge to the challenges of solving crime. The character evolved markedly over 40 years, starting off as a shrill and nasty gossip and growing to a more dynamic and well-rounded genteel lady. She had a remarkable tendency to connect every case to a story of her past and casual comments to key details of her current case. Quote: “People with a grudge against the world are always dangerous. They seem to think life owes them something. I’ve known many an invalid who has suffered worse and been cut off from life much more… and they’ve managed to lead happy contented lives. It’s what’s in yourself that makes you happy or unhappy.” – A Murder is Announced

Dirk Gently– This fictional detective created by Douglas Adams was introduced in the books Dirk Gently’s Holisitc Detective Agency and the Long Dark Tea-Time of the Soul. His real name is Svlad Cjelli which, as Dirk puts it, has a ‘Scottish dagger feel’ to it. Known for his ‘holistic’ approach to investigations, Dirk uses this to justify his extensive bills which include things like tropical vacations. Surprisingly, none of his clients ever manage to actually pay him. He is also a psychic in denial, believing himself to have a ‘depressingly accurate knack for making wild assumptions.’ He was supposed to appear in a third book, The Salmon of Doubt: Hitchhiking the Galaxy One Last Time, but it was never completed. Quote: “Don’t you understand that we need to be childish in order to understand? Only a child sees things with perfect clarity, because it hasn’t developed all those filters which prevent us from seeing things that we don’t expect to see.” – Dirk Gently’s Holistic Detective Agency

Philip Marlowe – Arguably one of the most significant figures in the ‘hardboiled crime fiction’ genre, Marlowe was first created by Raymond Chandler in 1939 for The Big Sleep. He also appeared in Farewell, My Lovely, and The Long Goodbye. This was followed by a number of films, radio shows, television adaptations, and one videogame. Philip is the hard drinking, gruff yet oddly charming PI. His rough personality is rounded out with a thoughtful mind well versed in poetry, philosophy, and a fair hand at chess. He drinks whiskey and is finicky over his coffee. The femme fatales common to the genre aren’t nearly as adept at distracting him.  Quote: “I don’t mind your showing me your legs. They’re very swell legs and it’s a pleasure to make their acquaintance. I don’t mind if you don’t like my manners. They’re pretty bad. I grieve over them during the long winter nights.”  – The Big Sleep

Picture courtesy of Flickr user California Cthulhu (Will Hart)

Sam Spade – Though not as widely appearing as some of his peers on this list, Sam Spade nevertheless left an indelible mark upon the detective genre. Famously portrayed by Humphrey Bogart in one of the movie adaptations of his book, The Maltese Falcon, Sam Spade is not at all a gentlemen detective. He’s a shifty character capable of getting himself in and out of fixes with equal skill. Despite disliking his partner, even sleeping with the man’s wife, he goes all out when the man is murdered to bring his killers to justice. Quote: “The cheaper the crook, the gaudier the patter.” – The Maltese Falcon

Lord Peter Wimsey – Lord Wimsey is an archtypical representative of the British gentleman detective as conceived by Dorothy L. Sayers. He appeared first in Whose Body? In 1923 and subsequently solved murder mysteries in another 13 novels, 5 short stories, and assorted stage, television, film, and radio adaptations. In addition to solving assorted murders in his spare time, the great Lord Wimsey authors his own books, including ‘Notes on the Collecting of Incanabula’, his other genteel hobby. He is also a wine, fashion, and classical music aficionado. The character was in part a light satire on the British upper class.  Quote: “It’s all right, Helen. That’s not swearing, that’s an adjective of quality.” – Clouds of Witness

Hercule Poirot– Around for a remarkable 55 years and appearing in 33 novels and over 50 short stories, Mr. Poirot has been a fixture in the detective genre for many years. Created by Agatha Christie alongside Miss Marple, this dignified Belgian detective solves crimes with the use of logical reasoning, or as he puts it ‘order and method’. Mr. Poirot also appeared on stage, in a number of film adaptations, several television shows, an animated series, and a number of radio dramas. Quote: “Chief Inspector, you have been thinking again. I have warned you of this before.” – Hercule Poirot’s Christmas (#6.1)

The Scooby Gang – The gang of animated teenaged friends (and one oversized dog) solve mysteries much to the dismay of the perpetrators whose plots they foil. These meddling kids include an unlikely array of friends, the All-American teen couple Daphne and Fred, the intelligent and shy Velma, the fumbling and perpetually starving Shaggy and his trusted sidekick and trouble-maker Scooby. These teens have a knack for shattering attempts to use fear of the supernatural to conceal criminal activity. Their antics inspired many television series, a number of films, video games, and stage performances. Quote: “Velma, here’s the only thing you ever need to know about boys. They are stupid. If you give a boy two choices, a smart one and a stupid one, he will always make the stupid one every time. That’s why you never give them a choice.” – Daphne Blake in Scooby-Do! Mystery Incorporated

Picture courtesy of Flickr user ostromentsky

Columbo – A homicide detective for the LAPD, Peter Falk is a gregarious, slightly rumpled detective who manages to get the job done in part because most of his targets underestimate him. He tends to talk too much and often seems to be a bit of an airhead, though in reality he has a keen attention to detail and a quick wit that helps him piece together the events of the crimes he investigates. The series ran for 10 seasons from 1972 till 1990 and continued in special runs as recently as 2003. Quote: “Perfect murder, sir? Oh, I’m sorry. There is no such thing as a perfect murder. That’s just an illusion.” – Columbo: Now You See Him (#5.5)

V.I. Warshawski  – Warshawski is a woman in charge: sexy, smart, and packing heat. After earning a law degree and serving as a public defender, she decides to go the route of the one pursuing justice on the streets, particularly in the case of white-collar crimes that might not get as much attention from the police in the gritty world of Chicago politics. The fierce detective is not afraid to get into the melee, making it quite amusing that her best friend is the one who treats the war wounds from her escapades. Due to her ferocity and strength, Washawski is considered by many to be a strong, feminist detective. Quote: “Never underestimate a man’s ability to underestimate a woman.” – V.I. Warshawski

Dr. Temperance “Bones” Brennan – Based loosely on real life real life anthropologist and author, Kathy Reichs, Dr. Brennan represents a very unique sort of detective on this list. She solves crimes current and ancient with her companion FBI agent, Seeley Booth and a crew of brilliant and eccentric scientists housed at the Jeffersonian Institute on the TV show Bones. Her top-of-field expertise in forensic anthropology allows her to unravel clues from the bones of the victims. Her no-nonsense attitude and adherence to an absolutely logical worldview both aides in her field investigations, generating a lot of unintentional hilarity along the way. The character also applies her professional knowledge to her writing career, becoming a bestselling author of crime novels during the course of her show. Quote:  “I’ve noticed that very few people are scary once they’ve been poked in the eye.” [to murderer who is trying to put a voodoo curse on her, so she pokes him in the eye to shut him up] – “Bones: The Man in the Morgue (#1.9)

Perry Mason – Mason is one of the most famous and prolific figures in recent detective fiction. Featured in close to 100 novels, a radio series, two television series, and over 30 made-for-TV movies. As a defense attorney, he was known for not shying away from the most difficult and hopeless cases and always fighting to the end for his clients. He does engage in some questionable actions early on in his history, but for the majority of his existence, Mason is an ethical idealist who sticks to the books and wins his cases by his wits and the evidence. The Mason stories do conform to a predictable pattern, but the enjoyment is in the details. Quote: “She’s more of a legitimate fake than I thought she was.” – The Case of the Curious Bride

Elijah Baley– Though he does not appear in a large number of works, Baley’s impact on the world Isaac Asimov created is profound. There are only four stories that feature Baley: The Caves of Steel, The Naked Sun, Robots of Dawn, and a short story titled Mirror Image. He operates in a world far different from ours, where robots are commonplace and Earth is filled with humans who live in enclosed cities. The mysteries Baley investigates are worthwhile for their whodunit quality, but they also investigate questions of a sci-fi nature and connect to the greater works of Asimov. Quote: ““The work of each individual contributes to a totality and so becomes an undying part of the totality. That totality of human lives–past and present and to come–forms a tapestry that has been in existence now for many tens of thousands of years and has been growing more elaborate and, on the whole, more beautiful in all that time. Even the Spacers are an offshoot of the tapestry and they, too, add to the elaborateness and beauty of the pattern. An individual life is one thread in the tapestry and what is one thread compared to the whole?” – Robots and Empire

Harry Dresden – Part detective, part fireball-throwing wizard, Harry Dresden has the unenviable task of solving mysteries in a world where things do not always conform to the rules of nature and science. The Dresden Files, the name for the book series and the short-lived television series, follows Harry through a world of vampires, werewolves, spirits, and crimes both mystical and mundane. Harry himself is a tough, stubborn young man with a sharp wit he used for detective work and pithy remarks against antagonists. Did we mention he can shoot fireballs? Quote: “Laugh whenever you can. Keeps you from killing yourself when things are bad. That and vodka.” – Changes

Kinsey Millhone – The main character in Sue Grafton’s alphabetically named series of detective stories, Kinsey Millhone is a feisty woman who has never quite played by anyone’s rules but her own. She was a delinquent as a teenager, dropped out of academics to pursue police work for more action, became an insurance investigator after that proved boring, and finally went on to become a private detective. The books are well-written murder mysteries that pit Millhone into tough situations only to prove she is tougher and smarter than anything that comes her way. Quote: “You can’t save others from themselves because those who make a perpetual muddle of their lives don’t appreciate your interfering with the drama they’ve created. They want your poor-sweet-baby sympathy, but they don’t want to change.” – T is for Trespass

Photo courtesy of Flickr user cdrummbks

Dave Robicheaux – James Lee Burke’s bad boy detective patrols the swamps of New Iberia, Louisiana, managing to break most of the rules, fight off his inner demons, and still catches the criminals at the end of the day. Some readers may find Robicheaux an overly cynical and irritable antihero, but the character is rounded underneath the wooden exterior. The murder and mayhem in the books is as gritty and dark as Dave, setting the stage for an enjoyably gruesome world of murder mystery. Quote:  “When people make a contract with the devil and give him an air-conditioned office to work in, he doesn’t go back home easily.” — In the Electric Mist With Confederate Dead

Photo courtesy of Flickr user Jeffrey Beall.

Charlie Parker – It is difficult enough to be a detective, and dealing with supernatural horrors at the same time makes it a true challenge. John Connolly’s underappreciated work is a wonderful world to dive into for those looking for a more obscure detective series. Parker himself is a bad boy in a bad world, and Connolly masterfully blends the touch of supernatural horror alongside the shadow of mystery. The horror and supernatural elements do come to take on a greater focus as the series progresses, so if you are looking for a realistic detective series, the Charlie Parker series may not be the best bet. Quote: “Why did you shoot him?” “You weren’t around,” I replied, my teeth gritted in pain. “If you’d been here I’d have shot you instead.” – Every Dead Thing

Image courteys of Flickr user scampion

Harry Bosch – Hieronymus Bosch, called Harry by most, had a rough time as he grew up. He was born to a prostitute, did not know his father until much later, his mother died when he was 11, he bounced between foster homes, and ended up in Vietnam while still a teenager. Despite the fires Michael Connelly put his detective through, Bosch turns out to be an all-around good guy who believes in doing the right thing, even if it means going against the norm or the boss. If you find yourself making it through all 16 Bosch novels and still wanting more, check out Connelly’s Mickey Haller series. Quote: “Everybody counts or nobody counts.” – Personal motto of Harry Bosch.

Bobby Goren – A main character in the Law and Order spinoff Criminal Intent, Goren is a dogged investigator with an attitude and a sometimes violent temper. His passion for justice is the main cause of his occasional rages, but there is no questioning that he gets the job done, even if criminals have to be wary of him for more than just the high likelihood of him putting them in chains. Law and Order stories are always gripping, and Bobby Goren is one of our favorite lead investigators throughout all of the spinoffs for blending humor and skill while being vulnerable enough in his emotional issues to be relatable. Quote:  “The only medical condition you have is denial.” – Law & Order: Criminal Intent: Jones (#1.5)

Batman – The Dark Kinght might seem to be a poor example of a detective if you were to base your opinion off just the recent movies starring Christian Bale, but the real Batman does just as much investigation as he does bad-guy stomping. Armed with the latest in technology  for whatever era he is in at the time, photographic memory, and sharp analytical skills, Bruce Wayne is the only one who can root out the hidden plots of the nefarious super criminals in Gotham City. Of course, once he does find out what they are up to, he puts the fear of the bat into them. Between multiple comic book series, cartoons, live action shows, movies, and games, you will have trouble getting through all of the available material on Batman without devoting time to him every day. Quote: ­­­­“He thinks he can scare me. He thinks he can stop me. There’s nothing wrong with him a bullet in the head won’t fix.” – Batman Detective Comics Vol 1 734, Mark of Cain:2

Dick Tracy – The world of Dick Tracy is a dark one inspired by the feel of Chicago in the 1930s, full of grotesque and cruel villains, backstabbing, and the hopelessness of the fight against crime. You can draw many parallels between Batman and Dick Tracy: both are detectives, fancy gadgetry becomes important later on in the Tracy series, and both have cities plagued by demented criminals. Tracy is the less skilled detective, though that could be due to his cases being relatively simple, but he has the everyman spirit that billionaire Wayne can never have. Quote: Breathless Mahoney: “Thanks for calling. I was beginning to wonder what a girl had to do to get arrested.” Dick Tracy: “Wearing that dress is a step in the right direction.” – Dick Tracy (1990)

Dr. R. Quincy, M.E. – One of the first shows to include hard forensic science, Quincy M.E. follows the work of forensic pathologist R. Quincy, whose first name was never clearly given. A gentleman and a scholar, Quincy uses his position as a medical examiner to probe into their deaths and root out the real killer. Later on in the series, he even finds himself in the middle of deep social issues of the time. If you want a taste of the original version of CSI, check out Quincy M.E. Quote:  “Gentlemen, you are about to enter the most important and fascinating sphere of police work: the world of forensic medicine, where untold victims of many homicides will reach back from the grave and point back a finger accusingly at their assailant.” – Quincy M.E.: Go Fight City Hall… to the Death (#1.1)

Lennie Briscoe – A major character in the Law and Order universe, Briscoe was the head detective in the original series and had appearances in both the Trial by Jury and Special Victims Unit spinoffs. His quips at the crime scene, sharp one-liners, cool demeanor, and dry wit belie his dedication to his work and getting to the truth. The best part about getting to know Briscoe is that you have almost 300 episodes in which to do it. You will also likely come to enjoy Briscoe’s interactions with his two partners: the stodgy and moral Curtis, and the brash rule-bender Green. Quote: “Love: a devastating disease instantly cured by marriage.” – Law & Order: Couples (#13.23)

Inspector Gadget – Another on our list who began as a cartoon, Inspector Gadget could be considered a defective detective, reminiscent of other simpleton detectives like our next one. Luckily, being a cyborg full of interesting tools like a helicopter, spring-loaded feet, and other crime-fighting tools keeps him going in the crazy situations in which he puts himself, and the crimes always end up being solved thanks to the work of his daughter, Penny, and their intelligent and aptly named dog, Brain. Quote: “It’s like I always say, Penny: If you can’t lick ’em, join ’em. Then lick ’em.” – Inspector Gadget, Down on the Farm

Inspector Clouseau– Proving that you do not have to be smart to be a successful detective, at least in the world of fiction, Clouseau is the epitome of the bumbling detective archetype. Even the above detective’s outfit was based on Clouseau’s typical attire, as homage to the older compatriot. Despite Clouseau failing at even the most basic investigative tasks in dramatic fashion, he always seems to come out ahead and solve the case. His unlikely successes are so far beyond the realm of reason that they even drive other characters in the story insane. To catch the first appearance of Inspector Clouseau, watch the original The Pink Panther from 1963. Quote: ”There is a time to laugh and a time not to laugh, and this is not one of them.” – Inspector Clouseau (1968)

Adrian Monk – Portrayed by actor Tony Shalhoub, Adrian Monk is a neurotic mess. Once a successful detective, the death of his wife due to a car bomb possibly intended for him exacerbated his obsessive compulsive disorder and various phobias to the point that he could no longer function on the force. Eventually, his keen powers of observation and great detective work get him pulled back in as a consultant, though his issues make every adventure even more challenging than it is for a saner person. The show and Shalhoub have won multiple awards, and there are several connected books if you finish the series and crave more. Quote: Sharona Fleming: “Are you sure you’re not getting your hopes up?” Adrian Monk: “That’s what hopes are for.” – Monk: Mr. Monk Goes to the Carnival (#1.5)

Spencer is pictured sitting in the front and center.

Shawn Spencer – Spencer is the lead character in the television series Psych. A child at heart, Shawn never professionally studied how to be a detective, instead learning the powers of observation – to the level of an almost photographic memory – and deduction from his detective father. After a string of failed jobs as an adult and with no credibility to his name, he does what any would-be detective would do: pass off his heightened awareness as extra sensory perception. Accompanied by his best friend, a pharmaceutical salesman named Burton Guster, Shawn begins to solve cases for the Santa Barbara PD while maintaining a façade of supernatural power, delivering pithy humor, childish antics, and daredevil actions. While his appearance is limited to the show, he is still one of the best and most entertaining detectives you will find. Quote – “Oh, you mean my pilot’s license? That’s out back in the Cessna. Or perhaps you’re referring to my license to kill. Revoked. Trouble at the Kazakhstan border. I could give you the details but then I’d have to kill you, which I can’t do because my license to kill has been revoked.” – Psyched: Poker? I Barely Know Her!

Magnum P.I. – Despite being somehow down and out regardless of a string of private cases, Magnum lives one of the most lavish lifestyles of any detective on the list. Set in the scenic Hawaii and in the same fictional universe as Hawaii Five-0, Thomas Magnum is equipped with a number of useful tools: a helicopter pilot friend, an amazing sports car, a glorious mustache, and the best Hawaiian shirts available.  He is also notable for being one of the first depictions of a Vietnam veteran. With beautiful women, interesting cases, and tons of action, Magnum P.I. should be on the short list for anyone looking for a detective series to watch. Quote:  ”I’m not really sure which kind of private investigator I am. The Holmesian-type with the constant deductive mind, or one with a Marlowe-type intuitive sense of the darker side of human nature? Hopefully a combination of both. At any rate, it doesn’t matter. Not when you have a “little voice”. I don’t know, maybe a gently nagging “little voice” is just another way of adding what you know, to what you feel, but right now mine wasn’t “gently nagging”. It was screaming.” (Narration) Magnum P.I., Round and Around (#6.6)


25 Best Privacy Apps

Looking for the best apps to protect yourself and your family on your mobile devices? Check out this list, which brings you the best in anti-spyware, anti-virus, phone trackers, data lockdown, and more.


  1. Clueful – Applications aren’t often clear about what information they are accessing, nor how they intend to use and distribute it once obtained. Clueful helps illuminate this process by running audits on all your existing applications and providing you with clear cut, no-nonsense reports on what applications are leaking about you. It gives you a quick-look at your app’s security with a score, and alerts you promptly when an app is abusing privacy standards. For a subscription fee, you can upgrade the service to include a constant monitor that will lock, locate, and wipe your phone in the event it gets stolen. Also available for iOS. Price: Free.
  2. Protect My Privacy – This application is being developed by UC San Diego as a way of helping them examine privacy on mobile devices. To that end, they collect anonymous data transmitted securely over SSL. Users can choose to not provide data to the study. For users with cracked iPhones, any application attempting to acces your data must first get approval. A message pops up informing users of what data the app is attempting to access, and allows you to fake credentials in some cases, deny access, or allow it. Some data is scrambled to provide an additional layer of protection. Only available for iOS. Price: Free.


  1. History Eraser – This simple application makes it easy to wipe sensitive information from your phone, including browser history, call logs, text messages, market searches, clipboard data, and more. Useful for those interested in protecting privacy, but also for those who want to free up storage on their phone. One quick tap will clear your data. Also available for Chrome. Price: Free.
  2. Last Pass – This application has demonstrated its effectiveness for browsers, its mobile version is equally powerful. It automatically fills in forms for every saved site, generates powerful passwords, allows users to add and alter notes and sites easily. Audio and images can be attached to secure notes as well. Also available for iOS, Windows 8, Mac, Linux, BlackBerry, and most other mobile OS. Price: Free 14 day trial, $1 per month pass afterwards.
  3. Delete Me – While not quite a mobile application, this exceptional service can completely remove your sensitive and personal data from the hands of data brokers online, ensuring that private photographs and personal data stay secured. Price: $129 annually for one person, $229 for two people annually.

Photo courtesy of Flickr user Robbert van der Steeg


  1. McAfee WaveSecure – Recognized in 2010 for excellence from CNET, The NY Times, PC World, Lifehacker, and others WaveSecure offers a solid mobile security package for a good price. It includes lock and wipe features that give you control over a lost or stolen phone, backup and restore to allow you to store important data on the cloud, even after the phone has gone missing, and recover it when necessary from a web-based application.  Locate and track features help you pinpoint the lost phone on a map, set it screaming to make it easy to snag, and allows you to track calls being made on the phone.  Also available for BlackBerry, Symbian OS, Windows Phone, iOS, and Java. Price: 7 day free trial, after which it costs $19.99 annually.
  2. Lookout Security & Antivirus – This application gained recognition from PC Mag Editor’s Choice for being excellent, from TechCrunch as one of the top 10 best free apps, and PCWorld ranked it 5 out of 5 stars. It offers excellent antivirus and malware protection in apps, email attachments, or files. It scans number for dangers and alerts users to potential hazards, blocks  websites that could potentially be harmful, and offers a Privacy Advisor to alert users to what information their apps are attempting to access. It also features a web-based phone finder that utilizes Google Maps to pin-point your lost phone, lets you make your phone scream to identify it, snap photos of users who attempt to access it while lost, and even remotely lock or wipe your phone. Users also can backup vital phone data and restore it in the event of a wipe. Also available for iOS. Price: A free two-week trial, users can continue using a pared down version for as long as they like after. Premium has a monthly fee.
  3. Webroot Security & Antivirus – Webroot was recognized as one of the best free android apps of 2011 by PCWorld, recognized for its unique features from PC Magazine, for being one fo the best security applications by Tech of Web, and Uberphones said it was ‘a must for Android users.’ It features a powerful antivirus that automatically scans and blocks malware, viruses, spyware, and Trojans and alerts users to settings that put the device at risk. It offers remote access to lock, wipe, scream, or locate your phone when it is lost or stolen. Premier grants the use of App Inspector, which alerts users to apps that access private info, drain money, track location, or drain the battery. It helps maximize battery usage and network access. The program itself is lightweight and not a drain on battery life. Available for iOS and Android devices. Price: $19.99 per device in a year.
  4. NQ Mobile Security & Antivirus – This app offers a powerful antivirus that scans and protects users from all the typical threats, as well as keeping users up to date with security databases. It protects while web browsing against phishing, fraud, and other dangers. A real-time app scanner alerts users to potential problems, and it includes anti-eavesdropping protection designed to detect spyware programs installed on the phone. It features a remote phone locator and offers backup of sensitive data as well as a call and SMS blocker to protect against harassing calls and messages. A system optimizer keeps your device operating smoothly. Only available for Android devices. Price:  Free trial for blah weeks, $19.99 per device, per year after for access to Premium features after.
  5. Norton Mobile Security Lite – As with its competitors, Norton Mobile Security offers a powerful antivirus that keeps users safe when browsing the web, accepting files, or downloading apps. It also offers remote wipe, tracking, and locking capability and SD card scanning.  It continuously scans and alerts users to potentially dangerous apps. Also available for iOS. Price: Free pared down version, and Premium access costs $29.99 for one year on one device (currently on sale for $17.99)


Photo courtesy of Flickr user briggz5d

  1. Avast! – This top-rated security app offers both anti-virus and anti-theft capabilities to ensure your phone is well protected against most eventualities.  The software developer has been around for 20 years and the app has been recognized for its excellence by PCAdvisor, Droid-Life, AndroidPolice, AndroidAuthority, and Android and Me. Lost your phone? Use a web-based interface to control your phone remotely, locate it on a map, and lock the device till you can snag it. You can even activate a siren and wipe its memory. Only available for Android devices. Price: Free.
  2. Kaspersky – A fairly straightforward anti-virus and security application that offers its users a powerful defense against viruses, Trojans, malware, and spyware which runs over-the-air to keep the program lightweight. It offers GPS location services to locate the phone if it goes missing or stolen, and remote access to lock and wipe your phone, take a ‘Mugshot’ of anyone who uses it, and remotely activate an alarm. Users can filter incoming calls and text messages to screen unwanted contacts.  In addition, users can conceal calls, contacts, and other data from casual snoopers. Available for Android only. Price: One year subscription costs $14.95.
  3. F-Secure – A European based application that protects mobile devices with a combination of antivirus, anti-theft, and screening tools. Users can filter out adult and other unsuitable content from web content and applications, block unwanted calls and text messages, remote locking and wiping, and remote location detecting. Available for Android and Symbian. Price: 14,95€ for a one year subscription with a free 30 day trial.
  4. Virus Barrier – This Gizmodo app of the day offers iOS users a solid and intuitive antivirus to protect them against intrusions from files, web browsing, and applications. It automatically updates to keep on top of new threats, repairs infected files, and keeps logs of scans, detected threats, and repairs. Only available for iOS. Price:  $0.99

App & Data Lockers

Photo courtesy of Flickr user flakeparadigm

  1. Smart AppLock – Smart Lock is a lightweight application designed to give you greater control over privacy on your mobile device. Set a list of protected applications, then create a lock pattern or password, and your friends and family can no longer access apps you don’t want them in, including SMS, mail, photos, and contacts. Only available for Android devices. Price: Free.
  2. Gallery Lock – Named app of the year by Times Magazine, this handy application makes it easy to keep your private photos away from the eyes of phone snoops. The intuitive program makes it easy to create your own folders and conceal your photos and videos in a beautiful and feature rich application. It has the capacity to run in stealth mode to keep others from being aware of your hidden images. Use a PIN pattern to access your data. Only available on Android. Price:  Lite version is free, Premium unlocks additional features.
  3. App Defender – This straightforward app prevents access to applications. Users can set a unique password for each individual app. After three failed attempts to access an application, it displays the number of failed attempts to alert the owner to the access attempts. Only available for Android. Price:  Free trial, after which it costs $3.13.
  4. Picture Safe –   This application offers advanced protection for your mobile device’s private information. It allows you to create custom folders to organize your data how you wish, decoy icons and screenshots to fool snoopers, a fake calculator entry screen with 8 digit PINs for highly secure access, dual passwords to allow access to ‘safe’ and protected photos, and much more. Hide everything from phone records, photos, and web access. Only available for iOS, including iPhone, iPod Touch, and iPod. iOS 5.0 or later editions, optimized for iPhone 5. Price: $1.99 (currently on sale for $0.99)
  5. Snap Secure – This application offers a range of unique and helpful features designed to make your mobile device a powerful security tool. It features real-time tracking of members that can be viewed on a map from a related mobile device or the web, helpful for keeping track of children or partners. Have teenagers? The motion-activated driver safety feature stops users from texting, calling, or web surfing while on the road. Footprints allows you to track the movement of the device using GPS, giving a clear picture of the movement history for any attached device. It also allows you to create safety zones and sends alerts when a device moves out of that defined territory. Finally, if a user finds themselves in dire circumstances, it offers a panic button that promptly calls 911 or alerts an emergency contact with location information via email, phone, or text. Available for Android, iOS, Windows, or Blackberry. Price: Free basic account, after which it costs $499 a month for a single user and $9.99 a month for a family plan.


Other Nifty Apps

Photo courtesy of Flickr user geoffeg

  1. Gibberbot – Recognized by PC Mag as one of the 100 best Android Apps of 2013, this application allows you to securely chat with friends across a range of platforms in one streamlined place, with powerful off-the-record encryption. No ads, easy to use, and available in many languages. Plus the chat program has fun built-in features like custom icons and wallpapers. Also available for iOS, Mac, Linux, and PC. Price: Free.
  2. Anti-Spy Mobile – Homebrewed spies are being blessed with a wide variety of tools to dig into your private and personal information. One growing method is to conceal an application on your mobile device to intercept communication, application use, and web browsing habits.  Stop that in its tracks with this application, which scans for and automatically removes any of these applications. Also available for iOS. Free: This version is completely free, a premium version offers a few additional features.

Locate Lost Phones

Photo courtesy of Flickr user gorbould

  1. SeekDroid: Find My Phone – While many of the antivirus programs offer a basic phone finder program, this one goes above and beyond. In addition to remote location, locking, and wiping, it allows users to create GPS breadcrumbs to track the movement of the lost or stolen phone, access recent calls, retrieve important data, and remotely wipe SD cards. The program itself can be hidden from display and made impossible to remove. It has almost no battery drain. Only available for Android devices. Price: $4.99
  2. Plan B – Many of these applications are focused on preventing loss and damage to your phone. Plan B is for folks who were not quite as proactive. If your phone gets lost or stolen, Plan B helps you locate it after the fact. You can install it remotely and it will start utilizing cell towers and your phone’s GPS to track its location every ten minutes. Users will get an email or text message with the current location of the phone each time it is located. Once the phone is recommended, you can revert back to the preferred ‘plan A’ and download any of the other excellent security apps that include tracking and other security features. Only available for Android devices. Price: $1.99
  3. iHound Software – Utilzing GPS, Wifi, 3G, or Edge signals built into your mobile device, iHound tracks its location every 10 minutes and reports it to a web application. Users can remotely lock and wipe their phone and directly instant message their phone to communicate with anyone who picks it up. Further, users can set it up to automatically alert opted-in programs like Facebook, Foursquare, and Twitter to keep friends up to date on their location. Also available for Android and iOS. Price: They offer a free 7 day trial, after which the program costs $3.99 for an annual subscription.
  4. GadgetTrak – This iOS-focused app will help you keep your phone secure in the unfortunate event it gets lost or stolen. It uses a combination of GPS and WiFi  alongside cell tower triangulation to keep accurate tracking of the phone’s location. Each time the phone is tracked, it will send users a detailed account of its location. Automatic camera captures will let you know who has the phone. Once the tracking has been activated, no software settings can be modified, and all collected data is sent through a secure SSL connection. Only available for iOS. Price: $3.99