News

Show News Categories  
child custody investigation

Private Investigators Focused On The Safety Of Children

| Security

How can a private investigator help keep my child safe during divorce or child custody dispute? All too common in today’s headlines are stories involving children who have been abused. While we worry about our children’s safety around strangers, we sometimes fail to take the proper precautions to keep children safe in their own environments. Private investigators specializing in child custody investigations work directly with an attorney to generate a formative case for impeachment. Child custody investigators are trained to investig...

Read more...

Mailbox Threats Target School Children

| Security

Two families have received letters threatening to harm their children and demanding payment. Police said the families, which live in Christchurch suburb Mt Pleasant, found the letters in their mailboxes over the past week. Both families' children attend Mt Pleasant School.  Detective Inspector Murton said police were taking the matter "very seriously" and had a team of detectives working on identifying the author of the letters. "We have also put in place additional security for the families involved and have increased police patrols ...

Read more...

stalker article

Daniel Toresen: The Five Simple Steps To Stopping Stalkers In Their Tracks

| Security

The headlines sometimes make harrowing reading. Murder at the hands of a former partner strikes at the very core of our psyche. Cases of inattention to the warning signs of a dangerous stalker really hammer home the need for serious changes in how authorities view obsessive ex-partners. The potential for a critical incident after a breach of a court order is frequently reported by media. Stalking is often subtle, yet quite pervasive. In fact, the stalker relies on their victim feeling as if their actions are normal demonstrations of a...

Read more...

chinese theft trade secrets

Chinese Charged With Stealing US Trade Secrets

| Security

Three Chinese nationals who earned advanced degrees from the University of Southern California and three others have been charged with stealing wireless technology from a pair of US companies. Federal prosecutors say Hao Zhang, Wei Pang and Huisui Zhang met at the university and conspired to steal technology from Skyworks Solutions and Avago technologies soon after graduating in 2006. A 32-page indictment charging the six with economic espionage and trade secret theft was unsealed after Hao Zhang was arrested Saturday at Los Angeles I...

Read more...

FT4SPJWI7MX33P2.MEDIUM

Fake TV - Burglar Deterrent

| Security

Most burglars are only interested in a place when it’s obvious that there is nobody home. If you’re going on holiday, this build makes it look like there’s always someone home watching TV, without you having to actually run your TV the whole time. There are products out there that are designed for this same purpose, but they can get expensive. This build from Instructables user JonBush would probably cost you much less to build and it’s far more customisable. Using an AT Tiny 85 and some NeoPixels, the device flashes lights towards b...

Read more...

police cap 281108 2

Police Given Personal Information Without Search Warrants

| Security

Officers obtaining personal data from range of organisations by citing clauses in legislation. Broad swathes of people's personal data are being sought regularly by police from airlines, banks, electricity companies, internet providers and phone companies without search warrants by officers citing clauses in the Privacy Act. Senior lawyers and the Privacy Commissioner have told the Herald of concerns over the practice which sees the companies voluntarily give the information to police. Instead of seeking a legal order, police have ask...

Read more...

Process Serving - Stories On The Job (US)

| Security

Kill the messenger -- or at least wave a shotgun, let loose your pit bulls, throw eggs or give chase in a golf cart. That`s the attitude process servers expect from the people to whom they deliver news, in the form of legal documents, that they are being sued or sought for questioning as witnesses in civil actions. `You get all types of strange situations,` said Jim Hegarty, a retired sheriff`s lieutenant turned private investigator, who is a dean of process servers in Palm Beach County and has even written a guidebook about it. `But ...

Read more...

gcsb spying

PC Security, GCSB-Style: 7 Tips From The Spymasters

| Security

With the recent revelations that the GCSB may have been involved in spying on NZ residents to working alongside the US National Spy Agency ('NSA'), computer privacy has taken on all the cloak-and-dagger intrigue of a John le Carré novel. Wasn't it just a few years ago that your biggest computer-privacy concern was making sure your employer didn't find the college photo of you sucking on a beer bong on your Facebook page? That seems cute now. If you’re like most users, you take your privacy seriously. We've pored over the NSA's securit...

Read more...

Anonymous

Anonymous To Avenge Charlie Hebdo Attacks by Shutting Down Jihadist Websites

| Security

Hacker group Anonymous have released a video condemning the Paris attacks, saying 'freedom of expression has suffered an inhuman assault'. Hacker group Anonymous have released a video and a statement via Twitter condemning the attacks on Charlie Hebdo, in which 12 people, including eight journalists, were murdered. The video description says that it is "a message for al-Qaeda, the Islamic State and other terrorists", and was uploaded to the group's Belgian account. In the clip, a figure wearing the group's symbolic Guy Fawkes mask is ...

Read more...

ISIS Coins

Islamic State Mints Coins

| Security

After seizing oil refineries to fund its self-declared caliphate, Islamic State militants will mint their own money. The group plans to issue gold, silver and copper coins, according to a statement released by its Beit al Mal, or treasury, and posted on websites used by jihadist movements. The currency aims to replace the existing “tyrannic monetary system” that has contributed to poverty, it said. As Islamic State conquered territory from the Syrian city of Aleppo to the outskirts of Baghdad, it has sought to entrench its strict inte...

Read more...