Hiding Online

Hiding Online. Technology and especially today’s social media technology, simply put, is AWESOME!! We only have to click a mouse and we can connect with anyone, anywhere, anytime. We can find old Highschool buddies, lost family members, that girlfriend who broke up with us 20 years ago. We can find nearly everything we want to...

Dissing Distracted Driving

Dissing Distracted DrivingMost of us have done it at one time or another. We’re driving in our car, the phone rings, we glance down and see it’s “important” and we think “I’ll just make it quick.” “I’ll tell them I can’t talk as I’m driving” or we realize we forget to tell somebody something...

Dangers of Online Dating

Dangers of Online Dating "The heart wants what it wants. There's no logic to these things. You meet someone and you fall in love and that's that." — Woody AllenWe all, at some point in our lives, will look for love…. companionship…. that soul mate. While the prospects of our journey to finding Mr./Ms....

Has Big Brother become the Big Bully?

Has Big Brother become the Big Bully? By Jack Weatherell When do our personal privacy rights give way to national security? When is it ok for Governments to limit our personal privacy on the grounds that in doing so they are protecting its citizens? How do we justify the “Greater Good”? These may seem like philosophical...

Terrorist Propaganda and the Sophisticated Use of Social Media

by Laura-Lee Walker“The advance of an army used to be marked by war drums. Now it’s marked by volleys of tweets”.-J.M. BergerTerrorists are increasingly using social media networks, such as Facebook, YouTube and Twitter, to further their message and goals because of its accessibility, global reach and affordability.CIA director, John Brennon, spoke about how...

Location-based Intelligence as a Powerful Tool

by Laura-Lee WalkerLocation intelligence involves using geographical data to make decisions. Geographic information is being used in a wide variety of sectors including transportation, retail, healthcare, government, and education.Insurance companies can use it to better understand their risk exposure. Distributors can use location intelligence to improve stock levels and save money on shipments. Politicians...

Kusic and Kusic Recommended Book List

This week we are featuring a recommended reading list from authors that have made an impression on our staff at Kusic and Kusic Private Investigators. The books range from educational to fictional and offer good reads for the sleuths or curious onlookers in your life.Introduction to Social Media Investigation: A Hands-on Approach by Jennifer...

The Unintended Consequences of Using Social Media

Written by Laura-Lee Walker (Photo Credit: Courtesy of HTSABO)“The problem is much larger than any one individual’s ability to control their personal information, because there are so many new ways every week or every month in which we can be tracked or things can be inferred about us.” –Alessandro Acquisti, privacy economistThe reasons we...

A New Era of Fraud: In Screen We Trust

Written by Laura-Lee Walker“If you control the code, you control the world. This is the future that awaits us.”—Marc Goodman, Future Crimes: Everything is Connected, Everyone Is Vulnerable, and What We Can Do About ItMarc Goodman, a global security advisor and futurist, wrote a book called Future Crimes and was featured on TED Talk...