Joel Christopher Jr.
102 Lakewood Court, Easley, SC 29642
(864) 269-2426
Associate of Science in Network System Administration
Greenville Technical College, Greenville, SC
2005 – December 2007 – GPA: 3.84
· National Technical Honor Society

2007 – Certificate in Computer Technology with a Major in Linux Administration
2007 – Certificate in Computer Technology with a Major in CISCO Routing/Network Configuration
2007 – Certificate in Computer Technology with a Major in CISCO Network Associate
2007 – Certificate in Computer Technology with a Major in Computer Technician
2001-2003 AS – Medical Laboratory Technology - GPA: 4.0

Bachelor of Science in Microbiology
Clemson University, Clemson, SC - 1998
Laboratory Research and Advanced Microbiology Classes
Clemson University, Clemson, SC - 1999 – 2000
Languages: C++, SQL
Database: SQL Server 2005, Microsoft Office Access 2003
Environments: Windows 98 / Window XP / Window7
Applications: Microsoft Word, Excel, PowerPoint
CERTIFICATION CompTIA A+ Certification
Technician Coordinator-Laptop Support
Alorica Incorporated
July 2009 – Present
· Provide technical support and troubleshooting for advance technical issue with Samsung laptop, printers, monitors, hard drives, and optical drives
· Navigate customers through hardware, software and networking functions of a laptop.
· Provide clear and easy to understand direction regarding LAN and wireless network connections for laptops and printers.
· Answer customer questions about technical features and functions of Samsung products
Computer Technician
Digital Management Solutions
May 2008 – Jan 26, 2009
· Repair computer software, hardware, and associated peripherals.
· Customer support for security systems and camera problems.
· Testing and QC of mobile security trailers:
· Including configuration of video servers, routers and laptops.
· Troubleshooting and repair of:
· DVR security systems
· Computer-based DVR security systems
· Security cameras
Greenville Tech. Computer Repair Dept. Internship, Greenville, SC
June 2007 – Aug 2007
· Setting-up and re-imaging computers in computer labs
· Trouble-shooting and repairing computers
Medical Lab Tech.
The Blood Connection, Greenville, SC
July 2003 – May 2004
· Testing of blood and blood products for infectious diseases.
· Performing equipment maintenance, calibrations, and QC.
Customer Service Representative
Tele-Tech Corporation, Greenville, SC
Nov 2000 – May 2001
· Handling one-on-one customer inquiries and concerns.
· Processing orders and supply requests.

Wednesday, March 26, 2008

FBI honey pots are dangerous to everyone

According to Cnet News the FBI has recently used the technique of posting links that purportedly point to child pornography on forums that are supposedly visited by pedophiles . Using the allegedly incriminating IP addresses of those that clicked on the links, the FBI obtained warrants to raid and arrest people based on the federal law which makes attempting to download child pornography illegal. This federal law is punishable up to 10 years in prison.

The goal of finding and arresting pedophiles is something everyone can agree is a good one and the government should do everything it can within the law to catch them.

However, the disturbing thing about this is that the FBI does not have to even prove that the accused person actually clicked on the original link that the FBI posted on the forum which described the link as child pornography. Links that are posted on one website or forum are commonly reposted on other sites, or sent to other people by E-mail. On top of this are those that maliciously repost or E-mail these links with innocent descriptions about the link. Of course the re-posted or E-mailed link don't always include the original descriptions and links can be easily cloaked to make it appear that the link points to one website but takes you to another. This has even started a new term called "fedrolling" which is similar to "rickrolling" except that the link the victim is tricked into clicking on lead to an FBI honey pot.

A court judge ruled that the possibilities that someone spoofed the accused person's IP address or someone without permission used the accused person's open Wi-Fi connection would not be a basis to negated probable cause for a warrant. The techniques is not considered entrapment because there is no supposed pressure by the government on the person to click on the link.

The boom of popular social networking sites such as Digg, and others has made the spreading of links even faster and the chance of inadvertently clicking on such a link much higher. Even without cloaking the link, if such a link is posted innocently or maliciously on such a social network site it could easily spread to many people and clicked on by them before the link is removed from the social networking site.

Using such a honey pot link method is sloppy, and ignores the dynamics of the internet. There are better ways to find and arrest people involved in such sick practices. Continued use of such methods will probable lead to innocent people's lives being seriously damaged and if the warrants are later overturned by a court as illegal, it could lead to guilt people being release where they can continue to victimize children

Monday, March 24, 2008

Hello World

Hello everyone, welcome to my blog. I'm still working on this site but please feel free to look around. If you have any comments or suggestions please let me know. Thanks for visiting my site.