800-790-4524 24/7/365 Support Service Open

Modern Private Investigators Must Embrace Digital Forensics

Private investigators will always need to track down witnesses, tail suspects and stay alert through long stakeouts, but these days they need to add even more skills to their repertoire – digital skills.

Digital forensics examiners can dig into cell phones, tablets and hard drives to extract crucial details of timelines, conversations and geographic locations in a wide variety of criminal and civil cases. Done properly and expertly documented, this work establishes crucial, often incontrovertible, evidence.

A private investigator – or anyone looking to become a private investigator – needs to find a way to leverage the power of computer and cell phone forensics to stay ahead of the game.

The data on electronic devices, once unlocked, can answer questions with remarkable certainty. Digital artifacts from messaging, texts and social media can reveal a surprising level of detail about a person’s motivations, attitudes and activities, shedding light on covert behavior.

Texts, emails, instant messages, images and video often are associated with metadata – the dates, times and other logged information related to digital activity. By unlocking and analyzing that metadata, our engineers can create detailed timelines of activities, locations and conversations.

A private digital investigation can answer a lot of questions:

Which cell tower handled a specific call or text message?
  • What numbers did the user call? How long did they talk?
  • Who did the user text or chat with, and what did they discuss?
  • What websites have been visited?
  • What has been downloaded? Uploaded?
  • What photos or videos were sent in texts and emails?
  • Is the suspect’s vehicle the one shown on surveillance video?
  • Who is the speaker on a recorded phone call?

The skills to investigate cell phones and computers are not common among private investigators, but they are nonetheless crucial. That’s why we partner with PIs to provide computer forensics expertise, while PIs put their important fieldwork skills to use where it matters most.

A computer forensics analyst can examine, among other things:

  • Text messages, including photo messages
  • GPS location logs
  • Call logs
  • Photos and videos
  • Emails
  • Chat history
  • Deleted or hidden data
  • Audio files and voicemail
  • Calendar information

As the world grows more complex every day, private investigators are called upon to handle an ever-growing variety of cases. Computer forensics tools need to be in a PI’s toolbox.

Continue reading
Rate this blog entry:
108 Hits

Fighting Cyber Harassment and Online Extortion

Are you being harassed or blackmailed online? We can help you fight back.

Individuals, small businesses and large corporations are open to all sorts of online attacks:

-- People set up fake social media or email accounts, pretending to be you, to spread lies or doctored photos and videos in order to embarrass you, spoil your reputation or hurt your business.

-- Someone pretends to be a friend to prompt you to share private, personal information or photos, then threatens to share them with the world unless you pay a ransom.

-- Someone harasses you online so much you block them, only to see them create a new account and resume the harassment all over again.

In such cases, the perpetrators hide their identities, attacking from a position of secrecy. We can expose them.

Our experts know how to follow the digital footprints to track down IP addresses, cell phone numbers, email addresses, social media accounts and even specific devices used in these crimes. We can identify online harassers or extortionists with a high degree of success, arming you with the evidence you need to confront the harasser, seek a restraining order or possibly even press charges.

How We Help Identify Perpetrators

Criminals who harass, bully or blackmail their victims operate in the internet shadows to hide their identities. They use anonymous social media accounts, fake email addresses, false identities. But they always leave digital footprints, and our expert examiners know how to follow them. In many cases, our analysts can work with you to track down the domains and IP addresses used to commit harassment or extortion, determining the source of the crime. If you think you know who is harassing you, our experts can cross-reference IP addresses to find out for sure. All that evidence can be documented for use in a police investigation or court case, and our legal counsel can help guide you through those steps.

Call Us to Begin Defending Yourself

Stop feeling fear every time you go online. Let our expert team help you end the harassment or blackmail. Chat online with one of our staff members or call (800) 790-4524 today to find out how we can help you fight back. We are available 24/7/365.

Continue reading
Rate this blog entry:
238 Hits

Top 5 Tips For Early Data Breach Detection

Early Data Breach Detection
Here are seven tips to help enterprises quickly detect a pending or actual data breach before it causes widespread harm:

To successfully confront the increased number of cyberattacks, companies need skilled cybersecurity personnel who understand the current and evolving cyberthreat environment. With the right security staff, companies will be better prepared to rapidly detect an attack.

Although there’s a significant shortage of skilled security professionals, there are still plenty of steps an organization can take to fill the gap. Smart companies are increasingly outsourcing at least some of their security needs. Partnering with universities to pick the cream of the crop is another tactic, and using security tools specifically designed to address the shortage will also help.

Knowing who is behind the threats you face and understanding their motivations will help you implement security measures to put cybercriminals on the defensive. Hackers are relentless and constantly employing new means to penetrate networks. Studies show that malware authors create five new malware programs every second, and last year’s prevention methods won’t hold up to this year’s attacks.

Unless an organization is constantly striving to stay abreast of the latest cybercrime methods, they will be unable to quickly detect a breach. The first line of defense is to understand where and how cyberattacks occur so enterprises can deploy appropriate controls and resources. That requires staying up to date through active involvement, appropriate education, and having the right security partners.

In addition to keeping systems, servers, and applications patched and up to date, it’s imperative to deploy modern breach detection tools. Although security budgets have increased during the last few years, many organizations are still purchasing and deploying old technology. Unfortunately, these legacy products are no longer effective at preventing modern breaches. Today’s attackers use new methods that older security systems don’t detect. See Lastline’s blog Security Spending is Up – But on Old Technologies that Don’t Work to learn more.

Today’s advanced breach detection technologies are very effective at spotting cyberattacks that older tools will miss – even those that are only a year old. Modern tools also gather, consolidate and present incident data in an automated and prioritized manner that is easy to understand. This dramatically reduces the time it takes for the security team to recognize a cyberattack and take steps to mitigate it.

No one can successfully defeat today’s cybercrime by themselves. By leveraging threat intelligence generated by other organizations around the world, you will have a huge advantage when it comes to rapidly detecting a breach. A recent report, The SANS State of Cyber Threat Intelligence Survey: CTI Important and Maturing, found that organizations who are effectively using global cyber threat intelligence experience a number of benefits:

71% saw improved visibility into new threats
48% reduced the number of incidents through early detection and prevention
58% experienced faster and more accurate response times
54% said it helps detect unknown threats that they were previously unaware of
One challenge of using external threat intelligence is the sheer amount of data to process. Using advanced products that automatically ingest global threat intelligence will help in this area.

To more efficiently detect and investigate security incidents, security analysts need comprehensive and immediate visibility into key indicators of compromise. In addition to network level telemetry, the security staff need full visibility into logs and events from underlying infrastructure, applications, and security systems. Effective controls for partner or supplier gateways must also be in place.

When dealing with malware, immediate visibility into what is happening on each particular host is critical. Breach detection tools need to prioritize alerts and make it easy for analysts to quickly visualize the entire context of each attack campaign. Read more: https://www.lastline.com/blog/early-data-breach-detection
Continue reading
Rate this blog entry:
1462 Hits

Is This The Hot New App That Teens Are Using For Anonymous Cyber Bullying?

The most popular mobile apps these days are almost always from huge companies like Facebook, Snap, and Netflix. But this week a relative unknown called Sarahah has rocketed to the top of the charts, becoming the most popular free download from the U.S. iOS App Store, and the second most popular free app on Google Play, according to App Annie.

Sarahah pitches itself as a social network that lets users receive anonymous messages. It was initially introduced as a website by Saudi Arabian developer Zain al-Abidin Tawfiq, who told tech news site Mashable that he wanted to help employees give anonymous, and hopefully more honest, feedback to their bosses. “Sarahah” is the Arabic word for candor or openness.

Sarahah’s spread, according to Tawfiq, was a case study in viral growth. He first introduced it to a few influential friends, and by early this year it had caught on across the Arab world. Tawfiq told Mashable that its appeal lay in its ability to break through traditional social barriers of age and rank.

But since the June 13 debut of Sarahah’s English app, its explosive growth has apparently been driven by teenagers, raising a host of concerns about safety. Despite its optimistic premise, users already report that the app has become a breeding ground for cyberbullying and hate speech.

If you need assistance tracking down someone who is harrassing your child through this or any other app, give us a call at 800-790-4524. Source: http://fortune.com/2017/07/23/sarahah-anonymous-hit-app
Continue reading
Rate this blog entry:
1530 Hits

Are you a target of Cyber Harassment?

Cyber harassment, a phrase that had little meaning only a few years ago, has come to be a problem of epidemic proportion. Individuals and businesses are targeted every day. The purpose of the harassment ranges from personal grudges to extortion, blackmail, business espionage and more, with the growth driven by how easy it now is to use the internet to harass and threaten – often anonymously.

Ex-lovers or spouses post personal or embarrassing revelations on sites like Facebook, Twitter or Snapchat. Disgruntled employees post defamatory complaints on LinkedIn and Glassdoor. International hackers lure unsuspecting victims into sharing sexual videos which are then used to extort money for years, against the threat of publication on various websites.

While there is no way to entirely prevent cyber harassment, there are steps businesses and citizens can take to minimize the risk of being victimized.

The first step is to avoid online interactions with anonymous strangers. By only interacting with people who have common, verifiable connections, much of the risk of extortion can be eliminated. When it comes to people who you know, the best advice is to take action immediately when serious harassment or slander begins. Send a formal cease and desist order and request to remove any libelous communications. By conveying to the harasser that legal action may result, many would be cyber-bullies will stop the harassment and move on victims who may not fight back.

When serious cyber harassment does occur, particularly when personal reputation, business or brand is at stake, professional assistance may be required. Digital Investigation helps clients, from individuals to enterprise businesses, track and analyze threats, stop the harassment and bring the harassers to justice.

Through a range of techniques like phishing emails, online investigations, device analysis and data culling, professional forensic examiners can generate solid evidence to bring to law enforcement and compel authorities to take action.

Harassment can be a serious issue. If you experience such a situation, you should consider a free consultation with a digital forensics investigation professional. Your consultant can learn about your situation and recommend a strategy to help end the harassment.

Continue reading
Rate this blog entry:
1739 Hits

Has Your Phone Been Compromised by Spyware?

Has your phone been compromised by spyware?

Spyware can find you at any time on any of your devices. Your smartphone is especially vulnerable because it comes with significantly less built in protection. This puts you, your device and all your sensitive data at high risk.

What signs should you look for if you are infected?

Is your phone running slower than usual?

Are the pages you visit being redirected to suspicious sites?

Have you been receiving strange text messages with codes or symbols or from people you don’t recognize?

Does your phone constantly reboot or shut down?

Has there been a significant decrease in battery life?

Did you notice higher or unexplained data usage?

Are you seeing changes in your phone volume or bizarre sounds during a call?

If you are having any of these issues listed above, contact us at 800-790-4524. We will provide you with all the digital evidence you need.
Continue reading
Rate this blog entry:
1263 Hits

Signs Your Husband Is Cheating On You

You’ve had this nagging feeling for months that something is wrong. Your husband seems different and distant. You can’t put your finger on what’s wrong. Perhaps it’s just a woman’s intuition or perhaps it’s something much more.

What are the signs you should look for if you think your husband is cheating?

- Is he suddenly working late? Has your husband’s work schedule suddenly changed?

If your husband has suddenly started consistently coming home late there may be reason to be suspicious.

- Does he have a new workout routine?

If your husband’s physical appearance drastically improved recently or they start a new workout regimen then they might be primping for their new relationship.

- Did he purchase a new cologne or a new wardrobe?

If your husband is upping his style game then he might be doing it for someone else. If he never seemed interested in this before and is suddenly shelling out big bucks for new clothes, it might be time for concern.

- Did he get a new cell phone?

If your husband is acting very protective over their cell phone and seem to leave the room any time a call or text arrives then he may be communicating with the other woman. If he is always deleting text messages before you can see them that should raise suspicion.

- Have you ever found mysterious receipts in his pockets?

Has he been going out without you or hanging with the guys? Does he frequently stumble in late without an explanation of his whereabouts? These are all signs of a secret rendezvous that you should look out for.

- Has your husband recently started demanding his privacy?

Is he being shady about his phone calls, texts or emails? Did he purchase a new phone or device that is only in his name or that he won’t let out of his sight? These are all signs of potential cheating.

- Has your husband lost interest in you? Is your husband spending less time with you then he has previously?

If you find that your husband is less attentive to your needs or there is a dramatic change in his behavior toward you then it might be time to ask the important questions.

If any of these signs sound familiar to you, it is time to call Digital Investigation for the truth. We can help you discover if all your suspicions are true. We help you uncover tangible digital evidence that you can use to bust your cheating husband.
Continue reading
Rate this blog entry:
1572 Hits

Is your partner cheating on you with a work spouse?

What is a work spouse?

A work spouse is a person with whom one shares a special relationship, having bonds similar to those of a marriage. This could be that funny guy at the office or that friendly girl who you always stop to have a quick chat with in the hallway. Sounds innocuous enough but when does that friendly relationship turn toward something more illicit?

No matter the environment, people are always seeking personal connections. It is not unusual to form close bonds to people at work but when does that cross the line?

Ask yourself these questions:

- Do you or your partner have a work spouse?

- Do they know you better than your partner at home?

- Have you formed a very close bond?

- Do you share intimacies that your real-life partner doesn’t know about?

- Do you feel closer to them than anyone else?

- If it isn’t physical, is it cheating?

When should I be concerned?

- Do you feel your partner is distancing themselves from you?

- Do they speak with each other about you and your relationship?

- -Are you finding that your partner suddenly has to work late?

- Is your partner constantly texting their work spouse?

- Do they lean on each other during difficult times?

- Are these feelings of connection something more?

When that nagging feeling won’t leave you, it’s time to ask yourself the difficult questions. Is my relationship in jeopardy?

How can Digital Investigation help?

When you need to find out the answers of what your partner is truly up to, Digital Investigation is here to help. We will compile all the evidence you need to bring you peace of mind and get you the information that you seek. Once you are armed with this knowledge, you can proceed in the best way you see fit. If it’s confronting your partner outright or waiting for the right time, we give you the power to move forward and find out the truth. Call us today and we’ll find all the answers you are looking for.
Continue reading
Rate this blog entry:
1305 Hits

Is there digital evidence that needs examination in my case?

Ask yourself a simple question: “Do I know how to identify the presence of digital evidence in my case?” .  And then you should ask another question. “If I overlook the presence of digital evidence, am I doing my job well ? Am I providing the best defense to my client? Am I doing my due diligence? ”

Most solicitors I first spoke to were surprised with the answers they ended up giving themselves. When in doubt, ASK ! Experts are there for solicitors to use them. And the best advice is to ask as early as possible, not let it for the last possible moment.

Here is a small list of possible cases. Can you identify if any of them can use digital forensics to provide evidence that support your client’s position?

  • Someone is arrested for stealing lead from a church. 
  • Someone receives a digital document (i.e. PDF) from their employer who claims the document is older than they believe
  • Someone is accused of disturbing the peace
  • Someone is accused for murder while he claims he was not at the locus
  • Someone suspect their sdpouse is cheating on them
  • Someone suspects their employees drive to places not related to their assignments on company time and on a company car
  • Someone suspects their child is not where they said they were
  • Someone is afraid that their Facebook account or their email account is hacked.
  • Someone has their car stolen
  • Someone is afraid their employees are stealing important pieces of information to sell to a third party
  • Someone is accused of abusing a company computer
Continue reading
Rate this blog entry:
1563 Hits

Video Surveillance as Legal Evidence

Video Surveillance as Legal Evidence

The law is often said to be formalized, rigid in its formulation and slow to evolve. Advances made in science and technology, now quicker in evolution, seem to always bring new challenges to the legal industry. Technology has clearly changed law enforcement over the last 20 years. It has become an integral part of a police officer’s daily work life, from use of social network sites to keep citizens aware of what is occurring in the community to the use of sophisticated recording devices for undercover operations.

With the advent of new technology in law enforcement, such as the use of digitally recorded video from dashboard mounted cameras in patrol cars or traffic monitoring cameras mounted on poles at public intersections, comes the challenge of preserving captured video of an incident and having it admitted into evidence at a subsequent criminal trial. Similar concerns exist for the use of digitized images from surveillance cameras. These are the more common examples of investigative use of digital video and subsequent evidentiary use. As the technology advances and becomes more accessible to the general public, certain evidentiary concerns need to be considered.

Over the past decade we have become a surveillance society. The events of 9/11 — along with concerns for responding to crime in our communities — have spawned an increase in government and business use of surveillance cameras. Chicago, for instance, has utilized a Department of Homeland Security grant to increase its city surveillance and projects a camera on every street intersection by 2016.

Continue reading
Rate this blog entry:
2226 Hits

Is my Employee stealing confidential company information?

Is my Employee stealing confidential company information?

In simpler times, a devious employee would have to devote countless hours and energy into stealing pertinent information from their Company. In the current technologically driven age where nearly all Company files (financial statements, trade secrets) are stored electronically, one can never be absolutely certain if employees are secretly stealing company information. Electronic documents are easy to copy and are naturally more prone to theft than old fashioned hard-copy documents. In prior posts we discussed the importance of limiting access to confidential Company information by creating passwords and other various precautionary measures, which is certainly a good starting point.

However, consider just one scenario where technology affords an employee the opportunity to take data electronically from a company by utilizing a USB device. The device can be slipped into a computer stealthily, can hold vast amounts of data, and does not require an intricate operation to undertake. This is merely one example but it demonstrates not only the ease with which electronic documents can be stolen, but also the quantity that can be taken in a brief time span.

The myriad of reasons an employee may be motivated to take confidential company information can range anywhere from the employee doing so inadvertently to an employee intending to derive personal gain by exploiting a trade secret. Whatever the reason may be, it has become evident that every company should implement internal policies to protect themselves not only after a data theft has occurred but also by taking preventive measures. Legal Evidence Corporation has experience implementing policies and technology necessary to protect Company data.

Continue reading
Rate this blog entry:
2237 Hits

Legal recourse after employee data theft has occurred

Legal recourse after employee data theft has occurred

In previous blog posts we covered the in’s and out’s regarding employee’s stealing confidential company information (hyperlink) and the role of forensics after employee data theft has occurred (hyperlink). To provide some context, we discussed how having the most efficient and thorough internal policy or preventive measures in place can still result in employee data theft. It may be unsettling to realize that a resourceful and persistent employee may inevitably be able to steal Company data. The role of computer forensics is pivotal in helping to gather information and evidence about the perpetrator, which enables the employer to seek legal redress. Legal Remedies may include monetary damages or an injunction.

Unfortunately, many employers do not realize an employee has taken confidential information until weeks or months have passed and this will hinder any legal claim. As is the case in most legal settings, by altering the former employee’s computer it will diminish the value of the evidence uncovered and consequently prevent a successful claim. That is why digital forensics Corporation recommends preserving the digital contents of a former employee’s computer by making a forensics copy of the hard drive or mobile device. Should suspicions arise in the future concerning theft of confidential information or other potential causes of action, the evidence obtained from a forensic examination conducted on the hard drive “mirror” will be as credible in Court as if the original hard drive had been preserved and examined.

Continue reading
Rate this blog entry:
1518 Hits

Internet Defamation - Legal Recourse

Internet Defamation - Legal Recourse

In previous posts I touched on the unsettling reality that involving Internet defamation can have a devastating impact on a Company and individual’s reputation.The harmful effects to a business and reputation are only compounded when Company’s allow the defamatory content to fester and remain in online space, risking that possibility that each day a new volume of online users will come across it. Online users that come across the defamatory content will undeniably form an unflattering opinion about that company. To backtrack for informational purposes, defamation is defined as the act of making untrue statements about another which damages his/her reputation. If the defamatory statement is printed or broadcast over the media it is libel and, if only oral, it is slander. Internet defamation would fall under the libel category.

There may be additional requirements varying from state to state, but generally, whether you are the victim of internet defamation or being wrongfully accused of internet defamation, you need to understand the law. In order for a comment, post or article to constitute internet libel, the following elements must typically be met:

      The first thing you must prove is that the statement constitutes a false statement of fact. A fact is different than an opinion. A fact can be proven true or false. Opinions are typically not actionable as defamation.
      The false statement of fact must harm your reputation. There are many false statements posted across the internet. In order to constitute libel, a statement must not only be false but must harm you or your company’s reputation and cause harm.
      The false statement of fact causing harm must be made without adequate due diligence or research into the truthfulness of the statement. Alternatively, plaintiffs often attempt to prove that the false statement of fact was made with full knowledge of its falsity.
      If the person who is the subject of the false statement of fact is a celebrity or public official, the plaintiff must also prove “malice.” Malice is proven when the person posting the information on the internet intended to do harm or acted with reckless disregard of the truth in making the statements.
Continue reading
Rate this blog entry:
1588 Hits

The Role of forensics after employee data theft has occurred

The Role of forensics after employee data theft has occurred

In a previous post we addressed the underlying issues and harm caused by an ex-employee stealing confidential company information. We discussed that having internal policies in place to prevent data theft which often entails fostering an environment where employees have limited access to confidential data from their initial hire date. The unsettling reality that cannot be overlooked, however, is that even with the implementation of a thorough policy, a resourceful and persistent employee will inevitably be able to steal Company data. Rather than allowing an atmosphere of paranoia to kick in and envelop your Company, the best method to approach this scenario is to rely on forensics examiners to help demonstrate that the ex-employee took information without consent which will undeniably cause harm to the company.

Ultimately, in this context what you don’t know can hurt you. Professional assistance ensures a greater likelihood of not only effective data theft prevention, but also assessing the damage after the fact with the goal of bringing the ex-employee to *justice (*tune into future posts for legal recourse against an ex-employee). Computer forensics experts can locate evidence of an employee’s improper conduct using specialized software, hardware and techniques.

Continue reading
Rate this blog entry:
1670 Hits

IP Law and digital forensics

IP Law and digital forensics

Intellectual Property (IP) can be defined as a work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply to prevent others from use of that creativity. The rights and protections for owners of intellectual property are based on federal patent, trademark and copyright laws. The basic distinction between these laws are that Patents protect inventions of tangible things, Copyrights protect various forms of written and artistic expression, and Trademarks protect a name or symbol that identifies the source of goods or services.

The purpose of these laws is to give an incentive for people to develop creative works that benefit society, by ensuring they can profit from their works without fear of misappropriation by others. The whole purpose for creating these laws would be defeated if skilled hackers could simply circumvent any creative process by simply stealing the creative works. The reality is that with modern technology in place, IP theft could not only occur in theory but is an inevitable occurrence for any Company that does not have proper procedures in place.

Continue reading
Rate this blog entry:
1710 Hits

Digital forensics and the Presidential race

Digital forensics and the Presidential race

As mentioned in previous blog posts, the impact of digital forensics on society in recent years cannot be understated. Perhaps the far-reaching implications of digital forensics have never been more evident than in the several days leading up to the 2016 presidential election. As a Company that provides digital forensics, e-Discovery, and data recovery services, Digital Forensic Corporation knows firsthand the process and procedures that are currently being used by the FBI to retrieve, investigate, and report on deleted information.

Continue reading
Rate this blog entry:
1429 Hits

E-discovery: Potential litigation looming, Now what?

E-discovery: Potential litigation looming, Now what?

In previous posts we briefly delved into the requirement to preserve and/or produce electronic information for electronic discovery, and the forewarning that the failure to do so can have dire consequences in the form of facing monetary fines from the Court overseeing the matter. This post aims to provide more in depth information regarding spoliation laws so that lawyers and clients do not fail to preserve a litigation hold which may bring sanctions that may entail substantial fines.

Courts may issue sanctions when spoliation (destruction of evidence) appears to be inadvertent, without any malicious intent, or without knowledge of e-Discovery laws. Very early into their burgeoning legal careers is when law students may be introduced to the Latin concept of “Ignorantia juris non excusat” which roughly translates to ignorance of the law excuses not. This legal principle generally holds that when an individual violates a law they were unaware of, they may not escape liability merely because he or she was unaware of its content. Although it is typically applied to criminal statutes, it has some relevance here.

Under the rules of civil procedure, courts have broad discretion to impose a variety of sanctions against a party that fails to produce evidence in violation of the civil rules. The limitation to this is that the discovery rules apply only to acts of spoliation that occur during the pendency of a lawsuit or following a court order. Courts also rely upon their inherent power to control the administration of justice to sanction pre-litigation spoliation. This authority allows courts to preserve their independence and integrity, since the destruction of evidence inhibits a court’s ability to hear evidence and accurately determine the facts.

Continue reading
Rate this blog entry:
1521 Hits

Modern-Day Infidelity: What Constitutes Cheating These Days?

Cell phones and infidelity

The Ashley Madison scandals, for many, challenge what it means to be unfaithful these days. What is infidelity anyway? Is it physically having sex with someone else who isn't your partner, is it touching or is it flirting?

Everyone seems to have a different definition or at least different boundaries when it comes to this word and it's one subject that couples will often not discuss when they enter a relationship -- what does cheating mean to you?

Continue reading
Rate this blog entry:
2378 Hits

How to Handle Online Harassment & Cyber Stalking

About 15 years ago, having an email address and/or an instant messenger screen name meant you were riding the cutting edge of the internet. A couple of years after that, the hot trend was having a MySpace profile. Today, it’s generally assumed that everyone has at least a Twitter account or a Facebook page.

Over time, and as online services gain more and more capabilities, a couple of things happen:

  1. We forget about all the old stuff we signed up for, and that information stays out there.
  2. We offer up even more of our personal information simply because the boxes are there for us.
  3. We open ourselves up to being tracked online and become subjects of data-mining projects because the boxes are not there to opt-out.
Continue reading
Rate this blog entry:
1695 Hits

OPSEC & Social Network Sites

Operational security

An investigator can use LinkedIn, Facebook, and other sites to build a profile of someone’s personal and work life, but like so many things in life, this is both good and bad. What might happen if it is done to your business’s employees? How might this hurt your company? Most businesses do not think about this and if they do, they usually consider key executives to be most at risk. This is entirely wrong!

security, Social Network Sites

Operational security (OPSEC) is the lens through which to view this risk. View each employee in terms of what he knows and to what he has access. This will change your entire outlook.

The janitor has keys and is in the building alone. Security guards possess sensitive information. The secretary to the VP of Marketing knows when you will launch a new product. Are you starting to get the picture? This leaves the problem of how to analyse the content of sites like LinkedIn and Facebook.

Continue reading
Rate this blog entry:
1958 Hits
Back to Top