Washington State Investigators P.I. News

Surveillance – past present and future

Surveillance is an intrinsic part of a private investigators craft. Also known as spying, surveillance is a way of gathering and collating information, and then using that information to increase ones understanding of another party’s actions and intentions. There is a distinction between surveillance and spying though. Surveillance is solely the act of gathering information…
Read more

Learn cybersecurity basics with these essential YouTube videos

A hand-picked list of must-watch cybersecurity videos to help you learn the fundamentals of encryption, how hackers penetrate systems, and strong cyber-defense tactics for business. This year global cyber-war went mainstream. Banks were robbed by digital criminals, Yahoo confessed to losing half a billion consumer records, foreign attacks leaked documents from the Democratic National Committee…
Read more

Experts predict 2017’s biggest cyber security threats

From internal threats to creative ransomware to the industrial Internet of Things, security experts illuminate business cyber security threats likely to materialize in the next year. If 2016 was the year hacking went mainstream, 2017 will be the year hackers innovate, said Adam Meyer, chief security strategist at SurfWatch Labs. Meyer analyzes large and diverse…
Read more

Facts, Truth and Evidence: How to be Objective

As investigators, we are not truth seekers, but fact finders. We rarely discover “the whole truth and nothing but the truth.” Moreover, although we may discover a lie or two along the way, it’s not up to legal investigators to decide what the “truth” is. It’s up to us to find information, facts, and evidence.…
Read more

How to safely access and navigate the Dark Web

This is the last installment in a series of Dark Web articles brought to you by Washington State Investigators. Is your business data on the Dark Web? Learn how to find out if you've been compromised in this step-by-step guide to accessing the underbelly of the internet. The Dark Web is easy to find. With…
Read more

One of the biggest hacks happened last year, but nobody noticed

Millions of email addresses, passwords, and cell numbers were in the stolen database, but questions remain over where the breached data came from. Hackers last year quietly stole a database containing the details of over 57 million people. The breach has only come to light this week, after the stolen data was put up for…
Read more

Four misleading myths about the Dark Web

Combat Dark Web threats by understanding their reality. The Dark Web can threaten your data security. Don't compound the risk by believing these misconceptions. It's too easy to fear the dark. The hidden, encrypted internet known as the Dark Web has earned a reputation as a monolithic, mossy rock under which lurks criminals and black…
Read more

Dark Web: The smart person’s guide

Nefarious profiteers use the encrypted internet to sell stolen data, drugs and weapons. Facebook and the UN use it to protect dissidents and journalists. This guide shines a light on the Dark Web. Hacking is a fact of life for business and consumers alike. Often, leaked data surfaces and is sold to miscreants—hackers, shady government…
Read more

From the dark web to the ‘open’ web: What happens to stolen data

The online black market is becoming a well-oiled and lucrative machine, thanks to the massive amount of stolen data flowing through the underground. In any data breach, it's particularly interesting to note the number of individuals whose personal information was compromised. Case in point, the title of Zack Whittaker's June 9, 2016 article on TechRepublic…
Read more