Washington State Investigators P.I. News

16 Things You Should Know About Court Records

When it comes to how court records are organized, which search methods work best, and how these records can supplement an investigation, there is a lot of information out there. Nearly every investigation conference we've attended has had a track on court records, and we hear time and time again that the most reliable and…
Read more

This Online Anonymity Box Puts You a Mile Away From Your IP Address

Editor’s note: The ProxyHam project described in this story, along with the DefCon talk describing it, have been cancelled under mysterious circumstances. Read our update here. In the game of anonymity-versus-surveillance online, the discovery of the user’s IP address usually means game over. But if Ben Caudill has his way, a network snoop who successfully…
Read more

How IT can spy on your smartphone

iOS and Android shield most data you care about from IT -- but users seem to care less about privacy these days I recently applauded MobileIron for providing a tool in its mobile device management (MDM) client app that lets users see what IT is monitoring on their iOS and Android devices. User privacy is…
Read more

Google reveals your location history in Maps

Google Maps is rolling out a Timeline feature that will allow users to essentially stalk themselves. Your location has been collected and stored on Google's (GOOGL, Tech30) servers for a long time (if you allow Google to track you), but accessing that information in the past has been difficult. Now, the Timeline feature will be…
Read more

Domestic Violence Protection Order Process Washington State

Types of Protection Orders Available "I need a Restraining Order." This is what people often say to the Court Clerk when requesting an order to prevent abuse. However, this term can be confusing, because a restraining order is only one kind of court order. There are also domestic violence protection orders, no-contact orders, and civil…
Read more

Fake law firm websites using real lawyers’ profiles are increasing

A growing number of fake law firm websites are potentially scamming “clients” and gathering their confidential financial information, a European regulator is warning the public. Additionally, since fake law firm websites are often using real attorneys’ profiles and branding, law firms need to be watchful to prevent their advertising efforts from being misappropriated, the Law…
Read more

When is posting on social media a crime? Panel debates the issue

Michael Moore, Rusty Hardin and Jeffrey Dion made up a panel moderated by Sherri Bevan Walsh that addressed the balance between free speech rights and threats issued online. Photo by Kathy Anderson. In the recent U.S. Supreme Court case Elonis v. United States, argued in December, lawyers for Anthony Elonis said he should not have…
Read more

Does Facebook’s facial recognition technology violate privacy laws?

An Illinois man is suing Facebook, contending that its facial recognition technology violates the state’s privacy laws, the Chicago Tribune reports. The lawsuit, filed Wednesday, argues that the social media company was required by Illinois law to inform Carlo Licata in writing that it would collect and retain his “biometric data,” and specify when it…
Read more

World’s Biggest Data Breaches

Presented by Washington State Investigators as part of the Identity Theft series visit the website. This article is about big data and data breaches. We invite you to read the entire article here: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Let us know if we missed any big data breaches. » Safely check if your details have been compromised in any…
Read more

Cyber Threat Trends

Why can’t my information technology staff or security consultants just handle the problem? You monitor and manage the continuing volatility in the global capital and credit markets. You closely watch the development of a competitor’s product that could result in a blow to your sales. Yet a cyber breach could result in the loss of…
Read more

Securing Your Home Network

A protected home network means your family can use the Internet safely and securely. Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place…
Read more

Workers Compensation Fraud-Investigation

What is Workers Compensation Fraud? Workers compensation fraud occurs when a claimant, employer, or health care provider knowingly lies in order to gain an advantage, savings, money, or other benefit. While many people believe that workers compensation fraud solely consists of employees lying about or exaggerating their injuries, workers compensation fraud can involve both employers…
Read more

Tricks and Tools of Private Investigators

Spying on other people has been around since cavemen hid behind rocks and watched their women bathe in the river, checking up to see if they were being faithful. As times changed, the most important aspect of the sleuthing business became the kinds of tools available for investigation. Technology has had the biggest impact; for…
Read more

Government Email Addresses: The Fastest Way to Communicate with Congress

Want to send an email to the United States Government? Emailing your senator, House representative or other member of Congress or the government s is an important part of keeping elected officials informed of our opinions.  Sending an email to your congressman is an efficient way to let the government and its elected officials know…
Read more

Restraining Order: Keeping Yourself Safe from Domestic Violence

A Restraining order is a form of legal injunction that is most commonly used in reference to domestic violence, harassment, stalking or sexual assault. In the United States, each state has some form of domestic violence restraining order law, and many states also have specific laws for stalking and sexual assault. Orders are issued by…
Read more

How to Report Crimes and Criminal Activity to the Authorities

The following is helpful information how to report crimes and criminal activities. Learn how to help stop crime in your neighborhood by reporting criminal behavior to the appropriate authorities. Report Internet Crime – http://www.ic3.gov/ – The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI), the National White Collar…
Read more

Cyber-stalking – Anti-Stalking: How to Protect Yourself from Harm

Stalking / Anti-Stalking: How to Protect Yourself from Harm What is Stalking? Stalking is defined as a repetitive pattern of unwanted, harassing or threatening behavior that is committed by one person against another.  Acts that could be considered stalking include: being physically followed, harassment via telephone, receiving unwanted gifts, and other similar forms of intrusive…
Read more

Police 10 Codes for Law Enforcement Officer Radio Communication

What are Police 10 Codes and Scanner Codes? Ten-codes, 10-codes, police codes and sometimes “police scanner codes” are signals that are used by law enforcement and government agencies in two-way voice radio communication as numeric code words for frequently used messages. Ten-codes are also used by private citizens in Citizen’s Band (CB) radio transmissions. 10…
Read more