top of page
Search


Who Has the Authority to Seize Assets: A Global and Local Breakdown of Roles and Circumstances
Seizing assets (of any kind) is a powerful legal tool used to recover debts, enforce judgments, or investigate crimes. Many believe only law enforcement officers can seize assets, but the reality is far more complex. Various roles and authorities exist worldwide, each with specific powers and limits. This post explores who can seize assets internationally, then breaks down the differences by country, state, and region. It also highlights examples where non-law enforcement ent
Glyn MacLean
Jan 67 min read


The Hidden Dangers of Smart Toys and Home Monitoring Devices: Protecting Your Privacy from Criminals
Smart toys and home monitoring devices have become common in many households. They offer convenience, entertainment, and peace of mind. Yet, these connected gadgets can also open doors to serious privacy and security risks. Criminals exploit vulnerabilities in devices like baby monitors, toys with cameras and microphones, and home surveillance systems to access private data. This article explores how these breaches happen, the dangers they pose, and practical steps to protect
Glyn MacLean
Jan 24 min read


Understanding Biometric Data Breaches: Implications for Consumers in 2026 and Beyond
Biometric data breaches have become a growing concern as more facilities collect and store sensitive identity information such as fingerprints, facial recognition data, and iris scans. Unlike passwords or credit card numbers, biometric data is unique and permanent, making breaches especially serious. This post explores notable biometric data breaches , how they happened, and explores the fallout consumers and organisation may face from this in 2026 and beyond. The article als
Glyn MacLean
Jan 15 min read


Temporary Issue with TOTAL AV Malware Scan Error and How to Fix It
When running a full system malware scan with TOTAL AV, some users encounter an error message that reads: "The operation couldn't be completed. (AVClientLib.ServiceClientOnDemandProtectorError error 0.)". This error interrupts the scanning process and can cause concern about the security of your device. Fortunately, this is a known, temporary issue that can be resolved with a few practical steps. This post explains what causes this error, how to fix it, and what you can do to
Glyn MacLean
Dec 29, 20253 min read


Essential Security Strategies for Protecting Your Home and Business During Holiday Closures
Going away for the holidays should bring peace and joy, not worry about break-ins or theft. Unfortunately, holiday periods often see a spike in burglaries as criminals take advantage of empty homes and businesses. Understanding how to protect your property with both smart and traditional security measures can make all the difference. This post covers key considerations, detailed checklists for homes and businesses , examples of security device compromises, and global burglar
Glyn MacLean
Dec 17, 20258 min read


How Amazon Web Services (AWS) could stop CRYPTO CRIME by Fake Crypto Trading Platforms QUICKLY.
As I consider the last 10 years of my experience reviewing #crypto #crime enterprise architecture, I note that vast numbers of the #websites that pop up like whack-a-mole to dupe investment consumers out of their life savings were built on #AWSservices. This is well known. I have long argued from my time as a senior FinTech executive (who wrote END USER LICENSING AGREEMENTS), that a CUSTOMER DISPUTE RESOLUTION PROCESS would be sufficient to stop crime in its tracks. This inv
Glyn MacLean
Dec 17, 20254 min read


Drawing on 'lessons of loss' to improve discernment of investment risk in the 2026 Crypto Market
In this post I am going to share past lessons learnt from the causative nature of victim losses from my almost 10-years operating as a victim advocate. Then we will take a look at my personal research dillgence for a speculative future look at the 2026 Cryptocurrency Market. FOR EDUCATIONAL PURPOSES. Lessons from cyber, crypto and financial crime research and insights from assisting victims of fraud to assemble their evidence to seek justice. Simple ideas distilled from 10-
Glyn MacLean
Dec 16, 202515 min read


Stay Vigilant: Protect Your Crypto Wealth and Personal Security in the Age of Mobility Tech Crimes
Talking openly about your crypto portfolio online is a serious risk. In recent years, criminals have grown more sophisticated, using advanced mobility technology to target high net worth individuals (HNWI). Sharing details about your crypto wealth can make you a prime target for theft, kidnapping, and other crimes. This post explains why you should never reveal your crypto holdings publicly and explores the rise of mobility tech crimes involving devices like Flipper Zero, ESP
Glyn MacLean
Dec 14, 20254 min read


How USDT: Tether's Collaboration with Law Enforcement Protects Against Financial Crime and Assists Recovery.
The rise of cryptocurrencies has brought new opportunities and challenges. Among these challenges, financial crime involving digital assets has become a significant concern for governments and law enforcement agencies worldwide. What is Tether doing to mitigate USDT based crime? Tether (USDT), one of the most widely used stablecoins, plays a crucial role in addressing these issues. Through active collaboration with law enforcement, Tether helps recover illicit funds and block
Glyn MacLean
Dec 12, 20256 min read


The Illusion of Clarity in Crypto Investigations: Understanding Victim Dynamics and Evidential Challenges
The world of cryptocurrency investigations often appears straightforward at first glance. Blockchain data is public and immutable, which suggests that tracing criminal behavior should be simple and definitive. Yet, the reality is far more complex. Today, many investigators and observers overestimate the clarity that blockchain analysis can provide. This post explores why crypto investigations frequently fall short in court, the role of victims in these cases, and the critical
Glyn MacLean
Dec 9, 20254 min read


What is OSINT and why does it matter?
What is OSINT? OSINT, or Open Source Intelligence, refers to the process of collecting and analyzing publicly available information from various sources to produce actionable intelligence. This information can come from a wide range of mediums, including: Social media platforms Public records and databases News articles and blogs Academic publications Government reports Websites and forums Why Does OSINT Matter? OSINT is significant for several reasons: Cost-Effectiveness:
Glyn MacLean
Nov 27, 20252 min read


Navigating Complex Fraud and Cyber Crime Essential Guidelines for Victims
Complex fraud and cyber crime are growing threats that affect millions of consumers worldwide every year. These crimes often involve sophisticated tactics that can confuse and overwhelm victims, making recovery difficult. If you have fallen prey to such fraud, knowing the right steps to take can protect your finances, identity, and peace of mind. This guide offers clear, practical advice for victims of complex fraud and cyber crime. It covers how to recognize fraud, immediate
Glyn MacLean
Nov 27, 20255 min read


Black Friday Week Specials
BLACK FRIDAY (WEEK) SPECIALS - If you want to engage me on a crypto tracing, OSINT, identity, evidence or cyber project then this week is a good time for you to save some $$$. One Size doesn't fit all and so I am not putting up specific products and services. If you know me by now, you know what I can do. If you don't know me, then I will be able to demonstrate my skills and the tools I use on a video conference call in real-time. This will prove the authenticity of value
Glyn MacLean
Nov 24, 20251 min read


Identify a Sextortion Email Scammer
The Dark Night Online | TRACK THIS CRIMINAL - This BTC address belongs to a #SEXTORTION #SCAMMER deploying an email #scam campaign....
Glyn MacLean
Apr 28, 20252 min read


USA: Guilty until proven innocent?
TDNO FOUNDER Glyn MacLean lecturing to Advisory Accountants on fraud prevention. The case below which spanned over two-years was...
Glyn MacLean
Apr 24, 20252 min read


Offsetting Losses Against Tax
#ACCOUNTANTS, #LAWYERS & other Professional Services AGENCIES: FINANCIAL CRIME VICTIMS could benefit from ACCOUNTING: TAX DEDUCTIONS...
Glyn MacLean
Jun 6, 20242 min read


Face Search - Update
FACECHECK ID - This post reports the results of weeks of in-depth research into the third-party software vendor and web app called...
Glyn MacLean
May 30, 20247 min read


Moral Code: the modern dilemma
PROGRAMMATIC GASLIGHTING is a common method of predatory criminals who program obfuscation (cover their tracks) at scale. A criminal will...
Glyn MacLean
May 21, 20245 min read


What happens if someone solicits you?
It has come to light that a person and (or) persons may be contacting THE DARK NIGHT ONLINE clients and partners, either misrepresenting...
Glyn MacLean
May 16, 20244 min read


Wolves growl at shepherds.
You and I are here in this moment because the world has too many predators. Who can you trust to be a good shepherd? To stand up against...
Glyn MacLean
May 15, 20242 min read
bottom of page
