News and Analysis

The following are articles relevant to the Professional Investigator.   Click on the title to make a comment or join the conversation.



Apple’s former insider trading watchdog indicted for insider trading – 25 October 2019

A former Apple lawyer who oversaw the company’s insider trading policy has been indicted on insider trading charges. Prosecutors allege Gene Levoff traded shares based on his knowledge of Apple’s financial results before they were made public.

Former Australian intelligence official charged with breaching secrecy laws – 22 October 2019

Federal police have charged former Australian intelligence official Roger Uren with breaching secrecy laws after ASIO discovered a cache of classified files during a raid on his home in late 2015. Yan has been charged with bribing the former president of the United Nations General Assembly, John Ashe.

Banks prepare to issue myGov compatible digital identities – 22 October 2019

The Reserve Bank of Australia (RBA) has confirmed that the first version for a new federated identity credential known as “TrustID” has been completed. Used in conjunction with online card payments as well as other online transactions, the use of digital identity has the potential to seriously reduce payments fraud worth more than $470 million a year.

Is Australia’s new whistleblower protection regime whistling against the wind? – 16 October 2019

With only 11 weeks to go until Whistle blowing policies must be implemented, ASIC has issued a Draft Regulatory Guide to assist organisations, however  the  guide may risk the hindering the objectives of the Whistleblower Protections Act,  because some provisions appear to extend an organisation’s obligations beyond what is required and seek to impose a detailed and complex policy.

Make-up techniques a potential weapon against unwanted facial recognition surveillance – 15 October 2019

Australian Government is currently reviewing a bill, that if successful, would allow the Department of Home Affairs to draw biometrics from driver’s licence photos and share it across Commonwealth, state and territory agencies for identity matching. In the meantime, scientists in Europe are working to overcome so-called “obfuscation” and “impersonation” techniques (such as make up to make a person look old) that allow people to fly under the radar from unwanted surveillance.

DV survivors face digital stalking, harassment, identity crime – 14 October 2019

Domestic abuse perpetrators intimidate, threaten, stalk, and monitor their victims by sending abusive texts, hiding GPS devices in toys and use fake Facebook and Instagram accounts. Article explains that these types of  Technology-facilitated coercive control (TFCC) techniques require the use of innovative cybersecurity responses.

ANU says blaming China for massive data breach is speculative and ‘harmful’ – 2 October 2019

A forensic investigation into the high-profile cyber-attack on the Australian National University has found it was an ‘extremely sophisticated’. China has been reported as the prime suspect in the attack, with intelligence officials fearing the data stolen could be used to compromise university alumni pursuing careers with the Australian government.