13
7 Ways to Handle a Cyber-Bully LIVE Interview (Audio & Transcription) With Bruce Anderson! www.CyberInvestigationServices.com Linda: Welcome back to our MENTORS Magazine cover story interview here on this beautiful sunny day, brought to you LIVE from San Diego, California! This is Linda Forsythe and your host each month where I interview some of the world’s most renowned entrepreneur type mentors, company leaders, and celebrity teachers. We put together a dream team of the best of the best out there who MENTORS Magazine has researched and found mentors that you can trust. Today, I have the honor of interviewing someone who has intrigued me for quite some time, Mr. Bruce Anderson. Bruce Anderson is a co- Founder and Director of Investigations for, Cyber Investigation Services. In his capacity with CIS, Bruce works with clients across the U.S. and International markets providing cyber investigation and intelligence services for lawyers, corporations, and private individuals. Specifically, Mr. Anderson leads a team of individuals that deal with a wide range of internet and cyber issues to include identification of anonymous cyber trolls, severe stalking, and harassment, computer forensic, and incident response. His investigation background includes 11 years in law enforcement as part of various organizations over time, and has developed extensive relationships with internet or cyber law enforcement at the local, state, and national level. This ability to reach out to multiple critical players in the cyber world allows CIS to implement solutions that simply are not available to others. Bruce is a certified PEN Testing Engineer, digital forensic examiner, and holds Nessus Vulnerability Certification. Throughout his career, he has been involved in many trials, depositions, and criminal or civil cases. Welcome Bruce to this month’s MENTORS Magazine cover story interview! How are you doing today? Bruce: I’m doing great. Thanks for having me. Linda: I am very blessed to have you on because problems are becoming rampant. Especially in the business world! There are an abundance of cyber criminals, hacking into computers globally committing identity theft, stealing data bases, passwords or any a number of atrocities. Plus Cyber- Bullying has also sky-rocketed. We aren’t just talking about school yard bullies going cyber… but businesses are also being bullied by slander or smear campaigns from a multitude of sources. Things are spiraling out of control and I know this is obviously something you deal with on a regular basis. Your job is to catch the bad guys and bring them to justice. So… I’m going to be ticking your brain with questions that are on

7 Ways to Handle a Cyber Bully

Embed Size (px)

DESCRIPTION

Bruce Anderson leads a team of individuals that deal with a wide range of internet and cyber issues to include identification of anonymous cyber trolls, severe stalking, and harassment, computer forensic, and incident response. His investigation background includes 11 years in law enforcement as part of various organizations over time, and has developed extensive relationships with internet or cyber law enforcement at the local, state, and national level. This ability to reach out to multiple critical players in the cyber world allows CIS to implement solutions that simply are not available to others. Bruce is a certified PEN Testing Engineer, digital forensic examiner, and holds Nessus Vulnerability Certification. Throughout his career, he has been involved in many trials, depositions, and criminal or civil cases.

Citation preview

Page 1: 7 Ways to Handle a Cyber Bully

7 Ways to Handle a Cyber-Bully

LIVE Interview (Audio & Transcription) With Bruce Anderson!

www.CyberInvestigationServices.com

Linda: Welcome back to our MENTORS Magazine cover story interview here on this beautiful sunny day, brought to you LIVE from San Diego, California! This is Linda Forsythe and your host each month where I interview some of the world’s most renowned entrepreneur type mentors, company leaders, and celebrity teachers. We put together a dream team of the best of the best out there who MENTORS Magazine has researched and found mentors that you can trust. Today, I have the honor of interviewing someone who has intrigued me for quite some time, Mr. Bruce Anderson. Bruce Anderson is a co-Founder and Director of Investigations for, “Cyber Investigation Services”. In his capacity with CIS, Bruce works with clients across the U.S. and International markets providing cyber investigation and intelligence services for lawyers, corporations, and private individuals. Specifically, Mr. Anderson leads a team of individuals that deal with a wide range of internet and cyber issues to include identification of anonymous cyber trolls, severe stalking, and harassment, computer forensic, and incident response. His investigation background includes 11 years in law enforcement as part of various organizations over time, and has developed extensive relationships with internet or cyber law enforcement at the local, state, and national level. This ability to reach out to multiple critical players in the cyber world allows CIS to implement solutions that simply are not available to others. Bruce is a certified PEN Testing Engineer, digital forensic examiner, and holds Nessus Vulnerability Certification. Throughout his career, he has been involved in many trials, depositions, and criminal or civil cases. Welcome Bruce to this month’s MENTORS Magazine cover story interview! How are you doing today? Bruce: I’m doing great. Thanks for having me. Linda: I am very blessed to have you on because problems are becoming rampant. Especially in the business world! There are an abundance of cyber criminals, hacking into computers globally committing identity theft, stealing data bases, passwords or any a number of atrocities. Plus Cyber-Bullying has also sky-rocketed. We aren’t just talking about school yard bullies going cyber… but businesses are also being bullied by slander or smear campaigns from a multitude of sources. Things are spiraling out of control and I know this is obviously something you deal with on a regular basis. Your job is to catch the bad guys and bring them to justice. So… I’m going to be ticking your brain with questions that are on

Page 2: 7 Ways to Handle a Cyber Bully

everybody’s mind who is listening today. I’m very much hoping that they have a pen and paper to take notes, because you’re going to be giving us some fantastic suggestions on what to do if under attack… correct? Bruce: I hope I can live up to that, but yes I will do my best. Linda: Well, I’m sure you can because I know the background and history of your business. So Mr. Anderson, tell us a little bit about your background and how you got started with Cyber Investigation Services? Bruce: You laid out some of my background very well earlier. In my career, I spent roughly 11 years in law enforcement and then I transferred out to do something different. For several years, I became an entrepreneur. Before I started Cyber Investigation Services, I was an internet marketer and had a search engine optimization firm working with some of the leading internet marketers and information marketers in real estate and those types of things. I was also working with them on their sites, evaluating feasibility and that type of stuff. Consequently, I started getting many unusual requests, ( this was early in 2010 I believe). People were saying, “Gosh, somebody has really bashed my reputation online here and I don’t know what to do about it, and can you help me?” This got me to thinking… so after I started being an internet marketer, I started testing the public response to gauge the level of frustration if you will, in the marketplace for this type of thing. And low and behold --- it just took off! There were a LOT of abuses going on and nobody knew how to handle it. We developed from there utilizing a combination of talents from Internet Marketing and past experience in law enforcement to come up with ways to combat this new problem. So, what started out to be a reputational only type of stuff… has grown substantially. We now take on pretty much all different types of cybercrimes and also civil infractions related to the cyber world. That’s how I got started and we’ve been very busy ever since. Linda: What are the typical types of cases that come to your firm, that you’re asked to investigate? Bruce: We do quite a bit of defamatory type of investigations. That division is something my brother runs. His name is Chris Anderson, and he is dealing with the reputational type issues. On my side; we see everything under the sun from severe stalking and harassment type cases to extortion cases to hacking cases to fraud type cases. You name it. Pretty much we see it all on my side of the house. Either way… when folks come to us, it’s generally for pretty serious things that have going on and consequently, they’re looking for help. Linda: Can you please be a little bit more specific about when you’re talking about cyber stalking or harassment or fraud? Maybe you can give some examples without identifying information? Bruce: Sure. I’ll just kind of run down a list of that comes from the top of my head here. I mean, recently we had a case with a prominent individual that was in the process of purchasing a million dollar home.

Page 3: 7 Ways to Handle a Cyber Bully

He was dealing with his attorney and a closing attorney, and in the middle of these transactions… a hacker jumped in, acting as the attorney. This fraudster communicated the whole closing case and documents and everything in between, and then redirected where the money would be sent via wire, (which had nothing to do with the real attorney). The real attorney had no idea any of this was going on and consequently, they took quite a bit of money, a few hundred thousand dollars in the process of doing that. Linda: Oh, wow! Bruce: And so here they think they’re closing with an attorney and they just lost a lot of money and had no idea that they did until later. I had a similar type of thing happen recently with a large group that sells a flooring type, stuff. They were dealing with an overseas manufacturer and same thing happened. Someone jumped into the middle of the conversations, transactions, billing slips and billing information. And then consequently, several hundred thousand dollars were wired somewhere to the bad guys, if you will. We were able to – (as part of our job) able to show that it wasn’t their side that had gotten hacked, but actually the side of the overseas manufacturer. We also do a lot of investigations on slander or smear campaigns, stalking, or stalking types of cases. We’ve had many cases of harassment where cyber-bullies are having abusive or threatening conversations with them, plus posting damaging statements online in social media, sending out emails to bosses at their employment, and/or to their friends/relatives. We have had multiple cases where the bad guys have hacked into iphones and computers… all for the purpose of harassment. Some of these cases when they came to us, had been going on for years. Not just two days or two weeks! Then there are the extortion cases. I had a case recently where someone had responded to a personal advertisement on craigslist. He communicated with a lady in a straight up fashion of communications, such as through email, text messages and pictures. The next thing you know; is that they turned on him. They basically said, “Ah, you’ve been communicating with a 14-year-old and now you better pay us money or we’re going to go law enforcement and have you arrested.” They scared him to death! It started out that the little girl initially showed that she was a consenting adult, and it just turned bad without warning. And so about $20,000.00 worth of extorted funds later, they called us and asked if we could help. We got involved and identified about seven people involved in that scam. So that’s just a snapshot -- I can go on for a while but these are the kind of things that we’re seeing on a regular basis. I just recently had a manufacturer that had gotten hacked into, and came in and wiped out all their servers and all their backup data and everything. Literally just left him hanging and so they hired us to come in and figure out what happened and see if we can piece everything back together.

Page 4: 7 Ways to Handle a Cyber Bully

Linda: Oh, my goodness. I could listen to you all day. I’ve heard of similar situations and some of those things, but it sounds like this is far more extensive than I had any idea about! Why don’t more of these types of cases seek out law enforcement for help? Bruce: Well unfortunately – no, well, not unfortunately, they do. I mean, it’s – they should go to law enforcement, but a lot of our calls start with, “I’ve been to law enforcement, I’ve been to the FBI, I’ve been to an attorney, and no one can help, what can YOU do?” And there’s a good reason to go to law enforcement because I can talk about them. Because, I’m ex-law enforcement. I understand how the system works and I have lots of friends in law enforcement. But, at the local levels regardless of the size of the departments, they just do not have the training. At the moment, they don’t have the equipment, or manpower, and they don’t have the money to be able to investigate these types of crimes. And so, when people came to them without getting results… then I step in and have a conversation. I’ve talked to the folks in-charge at the police or the detective divisions for very large departments. When I ask them, “What do you with that stuff?” The answers I’ve received are typical responses such as, “Well, we put it in a folder and file it.” This is because they don’t know what to do with it. And unless a victim really has a squeaky wheel or is well connected, it just doesn’t get investigated that way. The FBI in their defense, are very involved in national security types of items. They are keeping our country safe from hacking of infrastructure and law enforcement and banking institutions and water and utility institutions along with huge organized crime types of cases. They just don’t have time for the everyday case that you see out here now. And, very few attorneys specialize in internet law, and even if they specialize in the law, they don’t have any understanding of the technicalities involved in catching these people and etc. So consequently, there is this void. And that void is where we stepped into as a company. Linda: You know, it’s scary listening to you. If there is a victim that is dealing with slander, stalking, harassment or smear campaigns… there are places like Facebook and all these other social online networks that can add to the initial abuse. What about statements or pictures that go viral? It then becomes an endless nightmare! It only takes just one person, stating just one thing, to cause a huge problem. You also mentioned hacking and the enormous problems that those can cause. The world-wide-web started and expanded so fast… that the crimes happening inside of it are also spiraling out of control. It’s amazing more businesses or legal entities like yours haven’t popped up sooner! So what is it that you’re able to help them with, when no one else really can? What makes you so special? Bruce: I don’t think that we’re that special. It’s just that we have combined some disciplines that work. And in that, we’ve very much work kind of like a FBI model. If you look at the FBI model, they’ve got technicians that are technical at what they’re do in their skilled jobs. They’ve got investigators that are very good at outright investigating and they combine that with some lawyers at the US Department of

Page 5: 7 Ways to Handle a Cyber Bully

Justice to basically work in unison. Together they are able to catch these folks, and that’s exactly what we’ve done. We’ve worked very closely with the top 200 law firms that specialize in internet law, and we’ve done many cases together. We’ve got the technical expertise, investigative expertise and we’ve got great resources around the world that we can pull in depending upon what it is that we need. And then on top of that is, we’ve got good relationships with several different law enforcement agencies and the FBI cyber unit, so we’ve actually turned over several cases to the FBI that wouldn’t have been taken had we not investigated the case. We actually had several cases that the FBI did take, but would have been turned down normally, if the victims themselves went to them. The FBI had decided to take these cases because we gave it to them all tied up in a neat, great big red bow. Linda: What are some of the more common methods people are using today to hide their identity and then try not to get caught in doing their antics? I mean, the people who are doing these types of things are obviously not doing it because it’s easy to find them. It almost appears that it is easy to get away with, so they treat things like a playground! Bruce: There is different skill set levels, and various people do what they do for various reasons. That’s our first step is to differentiate. Let’s clarify a few things first. I think it is important first of all to separate out when people talk about “hacking”, as to defining who IS the hacker? Is it someone doing something from a state type action, and they’re doing what they do as government spying program? Or, is it a large organized crime ring that’s doing it? Is it someone that is local? Is it a competitor? Is it a friend, a relative, or an “Ex” Case? By the way as a side note…. we kind of call it the “ex” case for a reason. Because usually there’s an ex-partner, ex-spouse, ex-something involved in causing the problems. I can’t count how many times that we see this happening. But, I digress… you asked for the methods being used for trying to hide? Oh gosh, I learn new ones every day! Usually, they’re utilizing anonymizing services or third party websites like Facebook and Twitter or blogs or review sites. Maybe they’re utilizing a different IP address, the VoIP type of texting and VoIP telephone calls, anonymous emails, and Google. There are numerous ways and it’s across the board. And in every new day that I do this, I see something unique, different or creative that hasn’t been seen or used before. That’s because technology is changing daily and consequently much of what is done, is under the guise of the privacy laws. That to me is what the scary part is. But, there’s a place where privacy ends and people’s rights begin. I don’t think we’ve quite figured that out yet as a country AND as to how it relates to what’s going on in cyber world. Because of this, it makes it very, very difficult for most people to try to go after the bad guys because they don’t know what they’re doing, how they’re doing it or what they could be dealing with.

Page 6: 7 Ways to Handle a Cyber Bully

We’re trained in this and people should start using services like ours the first hint that there could be a problem. I mean, I can listen to a case and understand the technological side of exactly how they did it, what level of expertise this person has or what they don’t have. Then we develop strategies to catch the bad guys. We’ve had a pretty high level of success in that area. But, one of the things that is making this more difficult today, is that five years ago, if you took the top 2% of hackers, they were very sophisticated and able to get into a lot of different things. The numbers were low for people with that type of sophisticated knowledge. Now, these small top percentages have made a business out of selling their tools to everyday people. I can be just a regular “Joe” who maybe knows just a few things about hacking, but take this already preconfigured, complex Trojan or Malware or something else creative, and deliver it to my ex-partner. I can spy on him and turn on his phone and hear everything he is talking about, sit in on corporate meetings etc. This is the type of thing that has gotten out of control. This is what happens now. Linda: Oh wow… you are giving me chills! It’s enough to start making someone paranoid! Just earlier today, I had a business client send me an email stating that they had received an official contact from Dun & Bradstreet and also from the Better Business Bureau. Apparently, somebody had complained about their business to them and they were being notified. When he tried to open up the attachment “which contained a report”, a warning popped up stating the attachment contained some sort of unknown virus. If he didn’t have strong protection on his computer… it would have gotten through. Is there a way to protect yourself from the types of things that you’re talking about? Is this type of thing typical now or is that just same old stuff? Bruce: No. There’s a lot of that going on. I mean, what we have to understand, is that the bad guys, try to utilize methods to fool you and what you said about your client is just one of the ways. When we go out to catch the bad guys… we utilize their methods back against them. It’s kind of like a feedback loop. We understand all the technical things these people are doing and how they do it. Use a nerd to catch a nerd. (Laughs). Much of what I do in catching folks, is I profile who they are, what they are, how they’re operating, and what the technical capabilities are. We try to catch them out in the field of action. But, a main problem is with the regular unsuspecting person sitting in front of the computer that is an easy mark. For example… there is one thing we are seeing much more of in large corporations. If your boss sent you an email and said, “Linda, I need this before the end of day today. Can you please get it out?” Well, you as the unsuspecting employee has to open it to get your job done, right? But, what if a bad guy delivered something to you that opens up and looks like a normal PDF, but bypasses all your antivirus (which by the way is not hard to do) and then now they’re in your system?!?! From there they can elevate privileges and be in your network, steal or change passwords, own your entire corporation, all of its secrets, take intellectual property, or anything what so ever that’s in there. They also can plant things or leave malware that activates at a later time. THAT is the kind of stuff that we are seeing more of now...

Page 7: 7 Ways to Handle a Cyber Bully

Linda: Oh, wow…. So what types of things should a business be doing to protect themselves? Bruce: Well, the studies done by some of the larger security companies, (Symantec and so forth), have gone out to research all of the different types of breaches and how they’ve occurred. Frankly most of the breaches were not that complex. Dealing with these types of things is really a matter or education and diligence before the problem happens in the first place. It could have been solved simply by keeping their machines patched, or the operator not opening silly little attachments like the one you just talked about. Or even keeping their antiviruses up-to-date, having a firewall set up the right way, including the correct ways to set up routers or modems or whatever methods that they have, that is bringing in services. So there are some fairly simple things that you can do. In all fairness, it may be simple to someone in the networking type of business, but it may not be difficult for a lot of companies. Linda: I can see what you’re saying but, also in all fairness… didn’t you just say that it’s easy to get by all those safeguards? Bruce: Yes, that is true, but I also said that it was found out by research that what had been used to infiltrate, wasn’t all that complicated. It could have been prevented by simple precautions and awareness. But, let’s face it, many companies don’t do it. And then there’s a saying in our business that, “you can patch windows, and you can patch machines, but you can’t patch stupid”. Linda: OUCH! (Laughs). Bruce: And so consequently, the bad guys end up attacking the weakest links, and unfortunately that’s the people themselves because of a lack of awareness and due diligence. It’s exactly what has failed in security today. But these are simple little things to do in order to prevent a potential big problem. This way all you have to worry about is the big stuff, (which is more than enough to worry about). The approach as a business today should not be to wonder whether or not you will get hacked but, what can you do, when someone tries and succeeds? There’s basically nothing that they can’t hack into if they want it bad enough. So, as opposed to spending so much money and building all these huge fences around you, that can be easily jumped over and attacked, is that you need to start to isolate your crown jewels. Isolate what it is that they can get, and isolate where they can get access to it. It’s the simple things -- it’s the common sense things that you can do for most businesses that will help keep safer. Or so it’s not such a disaster if they do get hit. You might lose a website for a day or two, you might lose some computers and those types of things, but they’re not going to come in and get all your trade secrets or all your client lists or all the things that might be quite important to you and your company. So DO some of the things that you can do while also having a plan.

Page 8: 7 Ways to Handle a Cyber Bully

Linda: Is there anything you can do to help protect your database? That is something I hear many people have lost or have had stolen. In fact I’m one of them. Where can you really put it to protect it? Bruce: Yeah. Isolate it where it’s not available to access from the outside. Linda: Such as? Bruce: Such as, as you could have it placed in a set of computer networks for your internal operations only, and that operates internally, but doesn’t access the outside world. So therefore, for me to get to you, the only way I can get that information is through an insider threat. Linda: Oh, wow. Interesting. Okay, thank you! (Laughs) What an easy fix that could have prevented a huge headache. Duh! Bruce: Every business is a little different, and that’s what our job is all about. We have to try to figure out how to best fit that particular business and what to do about it. And believe me, it’s a whole lot cheaper doing it up front than it is, than after you get hit. Because after you get hit, it’s very expensive. When someone does come into your computer and you don’t know if they’ve been everywhere… it can be nerve wracking. You don’t know what computers they’re in, you don’t what they’ve taken, you don’t know how long they’ve been there, you really feel violated. So now what do you do? That’s where it becomes very, very difficult and very emotional if you don’t have teams involved in plans for this type of stuff. It can be devastating to a business if they don’t respond right and do it quickly. As a side note I’d like to bring up something that you absolutely should NOT do, and that is unplug machines after an attack. Unplugging a machine could be the absolute worst thing that you might do, because you could destroy evidence in the process of that. So, there’s a lot of things businesses just have not been educated in as of yet as this cyber world grows. Linda: You mentioned that you see a fair amount of internet stalking and harassment cases. Well, I can attest to that myself just from what I’ve seen as a layperson, but can you tell us a little bit more of these types of cases on how you’re able to help people? I really like what you said about the “ex” factor. That explains a lot! Bruce: Yeah. The most stalking and harassment type cases that happen from a cyber-nature, are from someone that you know. Not all….but most. And me being an ex-cop, I will look at these in the same investigative manner like a murder case. Most murders are done by somebody that you knew, that you had a run in with, and these are no different. So, the first thing we start to do, is to try to dissect what the motive is behind the action. You can see the motive for example when you start to question… was the destructive action from a competitor

Page 9: 7 Ways to Handle a Cyber Bully

meant to destroy a business, or was it because it looks like the actions of a ticked off lover, etc. Then we start to think about who might be involved in those types of cases. The other side of the coin could be because of what I call sociopathic behavior in the sense that they just get a focus or fixation, and their focus is to destroy you. This type of reason is much rarer, but it does happen. The good news is, the more active they are, and the more devastating , the more things that they do… the easier it is for me to catch them. Linda: What types of harassment and cyber stalking are you talking about? Does the harassment and cyber stalking involve someone contacting anyone and everyone you know behind your back, saying anything for defamation of character or just posting things to ruin your business? Please explain, and also how can you catch somebody like that? Bruce: Well, let me give an example of a case that we did, and I will give you a couple of others. We had a case with an international company. (I’m trying to be careful about what I say here, because this international company is well known and has some very large vendors and clients). Someone had put together a very orchestrated campaign of credible documents. They looked to be credible documents and did exactly what you just stated. These documents went out to all their vendors and really started to cause them some serious problems. This all happened very quickly and then, even though they were a very large company, this caused some real, backlash for them. And so, they hired us to figure that out who was behind it. They had also told us who they thought their suspects might be. We always approach something like this with the thought of, “let the evidence speak for itself, and not what people necessarily think, because many times, they might be wrong. And so we started investigating that, and looking through a combination of emails, documents, metadata, forensics and those types of things. We were able to see who sent them and so I came up with the name. When we talked to the company this happened too, I asked them, “Anyone heard of this person?” All you could hear was dead silence and then, “Yeah. We’re in a major lawsuit with that person right now.” And that was the person who was doing it. Linda: VERY interesting. Yes it was. We’ve had others that I can think of also. There was a guy that was just an everyday person. Not a celebrity or anything like that, but just a regular person who got crosswise with a guy on an Internet Room Chat. The attacker started attacking the individual and spreading across the internet it that he was a pedophile, which was absolutely not true. If you googled the guy’s name, it came up in the first 20

Page 10: 7 Ways to Handle a Cyber Bully

pages of the search engines! The guy who became irritated only because of a chat room discussion was trying to destroy my client. It took awhile to find him because he tried to hide both online and offline, but we ultimately were able to catch him through a variety of traps and tools. Then we took legal action. Every case is a little different, but it’s all about knowing what tools to use, when and how and why. That’s why this is so difficult for most people to try to get into this business, because it’s really is an art-form. It takes a variety of talents. You’ve got to understand the technical side, the investigative side, the legal side. It’s a complicated, whole new world of crime. Linda: Thank God for people like you who are paving the way to combat this! Why do you believe this is happening? Bruce: Well, a couple of reasons. My theory anyway is, I believe that it came with the advent of the internet and with the ability to be so anonymous because of it. Basically, no one knows who you are or where the attacks come from. So, I could sit in the middle of the desert somewhere, and at 3 o’clock in the morning drinking my beer… and do stuff that I would never do in person. If you go back a few years before we had the internet… defamation, slander, harassment, stalking, publishing naked pictures of your ex-wife, or any of these types of things, I mean, you’d end up in jail! Or, in the very least you would have your pants sued off. But now people think, “Nobody can find me, so I’ll do it without any consequences”. A person tends to do certain things when they think nobody is watching, or at least they believe that nobody is watching. What most people don’t know however is, that they ALWAYS leave a huge electronic trail. And while it’s possible to get away with a few events etc. --- most of the time, they’ll make a mistake. The odds of us catching you are very, very, very high, utilizing all the tools available to us. Linda: Can you can tell me, what we need to do as a society to slow down these types of online abuses? It almost seems like a no-win situation. We certainly don’t need more government regulation or anything like Big Brother, but we also don’t need the horribly damaging effects of cybercrimes either! These effects are like ripples in a pond, and are very far reaching. Bruce: Well yes, that is a complicated question. Let me just speak generically…. Technology has outstripped our laws, (at least in most states in the U.S.). There are some states that do have good laws and regulations. But then, there are some that don’t even have any law for a particular type of infraction. (related to cyber harassment or cyber stalking for instance). There are a number of states where it comes to obtaining a restraining order… you would think that you could get one for something like this. But, a number of them have restraining orders written for physical

Page 11: 7 Ways to Handle a Cyber Bully

type contacts only. And then in some states, it would have to be for someone like a husband or spouse or boyfriend, to legally get a restraining order. We really need to expand our laws to include cyber-crimes. Cyber-crimes are becoming so prevalent, that people are starting to put pressure on Congress, and that’s good! It’s making people more aware with all the lobbying. Linda: So how about all the mobile phones being used now? They are used for both personal and business reasons, along with the fact they even have these disposal iPhones etc. How are these impacting your role as a cyber-detective? Bruce: We are seeing a lot more cases, where people’s phones have become hacked. And, with many phones, that’s very easy to do. There are tools that make it easy for someone that doesn’t even know how to hack a computer, to be able to send something and hide it in an email or to be able to steal something on a phone. There are a variety of ways of getting into a phone. But, what is really scary about this stuff, is that someone can take pictures of you, they can steal everything on your phone, including all your passwords and files and etc. They can watch every keystroke that you make, they can turn your phone into a listening device, (Eg: if you have your phone sitting next to you when sitting in a boardroom, and I could flip your phone on to listen to the conversation). It’s like having someone sitting right there and able to listen to everything that’s going on around you. It’s pretty scary stuff because getting into a phone is much easier than getting into a computer. And what is even worse, it isn’t hard to get the tools to do these things. For 50 bucks, you could go and buy stuff like I just mentioned. More and more regular people are using them. We’re seeing it in divorce cases. Now you can spy on your spouse and/or spouse’s attorney. You’re able to capture all the communications that are going on and so they now know what your strategies are… who are the business relationships, you name it. And the second part that makes it very difficult, is that a lot of people think, “Phones are -- they’re just phones.” Well, not anymore! I mean if you think about it… they are really huge computers. There’s a lot of storage and a lot of capability. And so even if I’m an executive for a company, and the company may be locked down tight with security, but my phone gives the bad guy easy access through the unwatched back door . If I’m the bad guy, then I’m going to intercept any and all information, plus break into your systems. So, It really has become a huge problem! Linda: It makes you wonder if it’s almost better to go back to being completely free of computers! Where you should meet in person and... Bruce: I talked to a lady the other day where we found out that somebody was cyber stalking her, and repeating conversations that she had in the privacy of her own home! Linda: Yikes!

Page 12: 7 Ways to Handle a Cyber Bully

Bruce: And, so she was freaking out. She had said and done a variety of things, so we started looking at this technically. I told her to, “go and get just a plain basic phone.” And I said, “Don’t use it for anything but a phone or a boat anchor, that’s it.” And that’s what she did. That is how they’re listening to you now, so the only thing you can do is to take away the opportunities. With GPS, someone can know the locations of where you’ve been or where you are. And so when you start looking at it, the bad guys has your house bugged, your car, your computer your phone, whatever has internet access! That’s why it so important to start isolating things and to be able to track down who is doing it. Linda: All this is incredibly valuable advice Bruce and I think you! Unfortunately we are very close to the end of our interview, so I do want you to be able to answer couple of more things before we end here. Bruce: Okay. Linda: For people who are reading or listening into this interview, what is the one thing that you would like for them to remember about dealing with their own issues related to internet and cyber attacks? Bruce: Okay. The first thing I would like our listener’s to remember, is that there are solutions to all this, despite what the police tells you, despite what your attorney tells you, despite where you’ve put in reports to various agencies. There different types of software to track this type of stuff. The second thing is don’t wait! The moment this stuff starts happening, start documenting, start taking screenshots, start saving emails, start saving everything, because it all becomes very important in relationship to evidence. As well as the fact that, a lot of this evidences is perishable and doesn’t stay around a long period of time. You must be able to act quickly in order to be able to capitalize on that evidence! The other thing is, just don’t let it go on for a long period of time. You’ve got to react immediately because statistically someone that has gone to that type of level of stalking; will continue. They absolutely will continue. Linda: Oh, my with that being said how do people get in contact with you and/or to learn more information? Bruce: The best way to contact us is you can go to our site at www.cyberinvestigationservices.com or you can email us at [email protected] and then we can reach out to you very quickly once you make contact with us. Linda: Bruce, you have been incredible today and I know you’re a very busy guy with everything that you have going on. I know I am going to be talking to you about some issues that I’ve been having, also. You have come very highly recommended, which is why we’re having you do this interview. To everyone that is listening or reading this today, I also personally highly recommend and indorse Bruce Anderson for cyber-investigations! Get into contact with them, because their team and what they have been doing are absolutely awesome. They will be able to help you a great deal. So, it isn’t as bleak as you may think. There is help available.

Page 13: 7 Ways to Handle a Cyber Bully

So thank you again Bruce for being on today with this wonderful interview and I would like to leave everyone with the MENTORS Magazine motto, “Move forward with boldness on your quest, and mighty forces will come to your aide”. Good day everybody!