Fraud and the 1976 Montreal Olympics

   It is not necessarily all about the money  By way of introduction, I will kick off our public fraud investigation blog in a somewhat unorthodox fashion with some comments on an article in Swimming World Magazine entitled, “Doing the Right Thing” (Jason Marsteller, January 2015, pp. 18-19). The reason for choosing this article about cheating in […]

Service Provider Blocks Tor to Silent Circle Claiming Security Threat

 Service Provider Blocks Tor to Silent Circle Claiming Security Threat January 21 2015The Claim:”Tor exist nodes are routinely used as methods by Threat Actors to exfiltrate data from compromised endpoints. As an example, the Financial Sector has seen significant issues from them.“ FireHostThe Issues:• Bad guys use it; let’s treat everybody as bad guys • […]

Email insecurity video

This article is a the first in a series aimed to people who are looking to understand the risks of using the internet as a primary communication channel, especially for sensitive subjects. Let’s start with something that has become an indispensable tool for communication in our world and I’m referring to the email. Email can […]