Investigator anonymity

How Stand-Alone Laptops Put Law Enforcement Investigations at Risk

The internet is now part of almost all investigations, bringing significant new complexity to gathering evidence or conducting covert activity. Consequently, internet-based investigations create a whole new category of risks. Just as detectives work in plain clothes and drive unmarked cars, it is often important to avoid identification as a law enforcement officer when investigating online. This is often called being “non-attributed,” but is more accurately labeled “misattributed” or “anonymous.” A common method for conducting these investigations is to use a dedicated laptop connected to the internet over personal WiFi. Unfortunately, this is an unsafe way to operate, with significant risk of identification, location exposure, content blocking, and infection.

Read More...

Did You Know: Browsing the Internet is a Risk to the M&A Process?

While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks. For example, along with the acquired company’s valuable assets, buyers also inherit all previous and current vulnerabilities and breach history. But there are also risks that exist for buyers before they sign on the dotted line or take action to merge technologies, processes and resources – during the M&A process, an organization is vulnerable from the moment they set out to do online research.

Read More...

Managed Attribution: Best Practices to Protect Your IP Location

Effective managed attribution, critical for successful online investigations, can be achieved by leveraging the right technologies and practicing proper OPSEC. Ntrepid provides you with both the technologies for identity protection and the training enabling your users to access online information while protecting themselves, your organization, and the mission.

Read More...

Webinar: Cybersecurity Lessons from my Kung Fu Instructor

In a recent webinar, I discussed my journey of discovering the lesson that avoiding a fight in the first place is also the right choice when it comes to cybersecurity. One reason is that blocking attacks has several drawbacks. If you miss, you get hit; and even if you block it, you can still get hurt from the attack anyway if your opponent is strong enough. The second possibility was literally brought home to me when my father broke his arm trying to block my mother’s roundhouse kick. If Kung Fu were a game of rock-paper-scissors, shin bone beats arm bone. And if Kung Fu lessons were a set of cybersecurity practices, avoiding an attack beats trying to block every one.

Read More...