A New Era of Fraud: In Screen We Trust

Written by Laura-Lee Walker “If you control the code, you control the world. This is the future that awaits us.” —Marc Goodman, Future Crimes: Everything is Connected, Everyone Is Vulnerable, and What We Can Do About It Marc Goodman, a global security advisor and futurist, wrote a book called Future Crimes and was featured on TED Talk...

Heartbleed Aftermath: When changing your password is not enough

Many companies have scrambled to make security updates in the Heartbleed aftermath and many users have changed the passwords to their accounts. Do these security measures mean your information is secure? Our reliance on using the Internet to navigate our daily lives coupled with flaws in our primary defense, passwords (which are notorious for being...

Does Privacy on the Internet Exist?

"If you have something you don’t want anyone to know, you shouldn’t be doing it in the first place.” –Eric Schmidt Internet users disclose huge amounts of private information about themselves online. Businesses, white-collar criminals, stalkers, employees, predators, and the government benefit from accessing that private information. Although the future may be promising in using biometrics...

Differences Between Surveillance and Stalking

Surveillance serves an important role in investigations. It is a lawful activity and is considered as evidence in court. In contrast, stalking reflects sociopathic tendencies and criminal intent. It’s an illegal activity designed to control the victim’s behaviour and feelings.  SURVEILLANCE Legal Surveillance activities do not violate any laws. Surveillance is conducted in a way that respects a...

Drones in Canada: Interview with David McKay

“I think there is a lot of applications for [drones] and I think they will change our lives.”–David McKay, principal owner of Blackstone Forensics David McKay was interviewed as a knowledgeable source in drone technology. He recently gave a speech about drone use at the PIABC’s (Private Investigators’ Association of BC’s) annual general meeting. McKay was...

How to Find People Online

Investigators often need to find a subject's contact information such as their email, home address, and phone number. There are vast amounts of information online and it can be challenging to navigate and determine what sources of information are reliable. Google search A good place to start is by doing a Google search on a subject....

How to Increase Your Smartphone Privacy

"Your smart phone is probably the most personal device you own, containing private messages, sensitive banking information, personal photos and other data that can leave you vulnerable if handled carelessly." ­— Catalin Cosoi, Bitdefender Chief Security Strategist Internet users are spending increasingly more time on their cell phones and less time on their computers, with mobile usage...

Everyone has an Edward Snowden Working for Them

“In the digital age, it’s very difficult to control the flow of information. This is true not just in government but in business as well. Everyone’s on email. It’s all out there.” —James Goodale, leading First Amendment lawyer Recent news involving Edward Snowden demonstrates that even highly confidential information is ripe for the taking in...

What Kind of Stalker Would Google Be?

While most people have a general sense that technology encroaches upon their privacy, "what is less clear to people is exactly how bad it is." —Lee Tien, a senior staff attorney with the Electronic Frontier Foundation The gravity of this quote can be demonstrated by delving into the dark mind of a stalker. Though the...

The Future of Passwords: Solving the Password Problem

Surveys show that “80 per cent of mobile consumers surveyed use the same login credentials across all of their accounts,” mostly because of the difficulty associated with remembering login information. In an ideal world, passwords wouldn't be easily hacked, and people could remember dozens of unique and highly complex passwords for all of their online...