dictionary shown through glasses

Massachusetts Drug Lab Scandal

Christine L. Peterson, CPP, ISP Background Investigation, Compliance, News, Theft, Embezzlement, and Fraud

On Saturday, September 29, 2012, the News and Observer covered the story of Annie Dookhan, a chemist at a Massachusetts drug lab. This story underscores some of the devastation that can result when an organization doesn’t follow basic security principles which require both screening and guardianship. The lack of screening and guardianship at the Massachusetts state drug lab has already …

apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCE Crisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

iPhone and iPad

Apple Unique ID Numbers

Russell W. Gilmore, CISSP, CISM, EnCE Theft, Embezzlement, and Fraud

Hackers have posted online the unique ID numbers for more than one million Apple devices. As claimed in news reports, the file was obtained through phishing. A hacker intercepted an email sent to several dozen FBI agents. In the header of the email were all of the agents’ email addresses. The hacker crafted emails that appeared to come from legitimate …

employment application

Yahoo Chief Executive Scott Thompson Steps Down

Tasha Dyson, CFE Background Investigation, Compliance, Theft, Embezzlement, and Fraud

Based on experience with some of our clients, there seems to be an assumption that applicants for C-level positions are somehow immune from falsifying information and are above reproach. The assumption seems to be that since an applicant has worked at “Alpha Company”, there is no need for “Beta Company” to do a thorough background investigation. The faulty logic is …

cargo thefts

US Cargo Theft – A Five‐Year Review

Christine L. Peterson, CPP, ISP Crisis Management Planning, Security Assessment, Security Program Development, Theft, Embezzlement, and Fraud

Where are the vulnerabilities in the supply chain? When and where are goods the most at risk in during shipping? FreightWatch, a logistics security services company, analyzed five years of cargo theft statistics as a way to answer these questions. They produced a report that provides security and loss prevention personnel with information about trends in cargo theft, allowing companies …

callerID

Fake Caller ID Attacks on The Rise

Tasha Dyson, CFE News, Theft, Embezzlement, and Fraud

These kinds of phony calls have existed for years, but the sophistication has increased to combat our increased vigilance. Use the same cautions that you would use when opening an email that appears to be from your bank or other institution. When you receive a call or email from your bank, the safest course of action is to initiate the …

laptop with lock on it

When Employees Leave, Data Should Stay

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics

As a security consultant, quite often I am asked to assist with the hiring and termination of employees. The hiring process generally includes background checks, reference interviews, and financial history, along with other information. My involvement in the termination process is as a third-party observer and advisor. As a computer forensics expert and consultant, I am often called in sometime …

dont-click

Don’t Click that Link!

Christine L. Peterson, CPP, ISP Security Program Development, Training

NCMS (National Classification Management Society) is a society that provides training and guidance to private sector firms who are industrial contractors to the federal government on classified contracts. As a member of the national organization and the Carolinas Chapter, RMA has access to some excellent and timely training. “Don’t Click That Link!” came from another member and is a good …

Painful Lessons from Leland

Christine L. Peterson, CPP, ISP Background Investigation

SBI investigates Leland’s former Asst. Town Manager Excerpts from article: Michelle Cox was hired by the Town of Leland in January, and left after about six months on the job. During that time she was the highest ranking female employee in Leland, and was assigned to investigate claims of sexual harassment filed by Officer Sherry Lewis. About the same time, …

A thief sifts and examines shredded documents

Protecting Competitive Intelligence

Christine L. Peterson, CPP, ISP Intellectual Property

As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …