Category Archives: Cyber Security Issues

The Legality of Familial DNA Searches

As a runner, I’ve often told my female runner friends, “Don’t run alone!” There have been cases of solo female runners being attacked on the lovely running trails we have in and around the city I live in. That advice … Continue reading

Posted in A How To Blog on Murder Plot Ideas, About James J. Murray, About Murder, All About Murder, Blog Writers, Blogging, Characteristics of Murder, Committing The Perfect Murder, Creating Emotional Drama in a Murder Scene, Cyber Security Issues, Deciding What Types of Fictional Characters Fit Into Your Plot, Designing Murder Plots, DNA Forensic Science, DNA Testing Flaws, DNA Testing Techniques Called Into Question, Familial DNA Searches, How to Choose a Murder Weapon for a Plot Idea, Ideas for Murder Scenes, James J. Murray Blog, Killing Off Characters in Your Novel, Methods of Murder, Murder Mayhem and Medicine, My Will Be Done - A Short Story, New Blog, New Forensic Tools, Plot Development, Plot Ideas and Where They Come From, Plotting Murder Scenes, Plotting The Perfect Murder, Privacy Issues and Online Genealogy Services, Standards for Familial DNA in Criminal Cases, The Science of Murder, Tools of Murder, Unique Murder Plots, Writing Dramatic Murder Scenes | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | 2 Comments

Exploiting Computer Chip Flaws

In my Jon Masters thriller series, my protagonist Jon has a friend named Ed Ochoa. Ed is a computer genius and often does some cyber-magic to produce secure, and usually unavailable, information that helps Jon out of a variety of … Continue reading

Posted in A Jon Masters Novel, A Murder Mystery Novel, A New Science Thriller Novel, A Thriller Novel, About James J. Murray, Accuracy in Writing, Achieving Writing Perfection, All About Writing, Better Fiction Writing, Blog Writers, Blogging, Bloodless Death Scene Writing, Character Driven Writing, Committing The Perfect Murder, Computer Hacking, Computer Processor Vulnerabilities, Creating Interesting Fiction Characters, Creating Unique and Interesting Character Flaws, Cyber Attacks in 2018, Cyber Security Issues, Cybercriminals, Cyberterrorism, Cyberwar, Data Security, Designing Murder Plots, Developing Better Writing Skills, Developing Story Plots, Developing Storyline Ideas, Developing Writing Skills, Elements of Murder, Error-Free Computer Processing, Evidence Free Murder, Fiction Based on Facts, Fiction Based on Real Life, Fiction Writing - A Believable Lie, Growing As A Writer, Imperfect Murder The Novel, Imperfect Murder Thriller Novel, Internet Security, James J. Murray Blog, James J. Murray's IMPERFECT MURDER Novel, James J. Murray's LETHAL MEDICINE Novel, Jon Masters Thriller Series, Lethal Medicine Thriller Novel, Lethal Medicine-The Novel, Mastering Your Craft, Meltdown Computer Chip Flaws, Murder Mayhem and Medicine, New Blog, New Thriller To Download, Plot Development, Plot Ideas and Where They Come From, Plotting The Perfect Murder, Prescription For Murder Blog, Publishing A Novel, Spectre Computer Chip Flaws, Story Development, The Art of Storytelling, The Art of Writing, The Writings of James J. Murray, Tools of Fiction Writing, Unique Murder Plots, Using Cyber Security To Murder | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

CYBER ATTACKS and MURDER

When I develop a new murder mystery idea, one of the primary issues that must be solved is determining how the murderer gains access to his victim, preferably without leaving evidence that can lead back to the villain. In this … Continue reading

Posted in A How To Blog on Murder Plot Ideas, All About Murder, Blog Trends, Blog Writers, Blogging, Culture Shock, Cyber Security Issues, Cybercriminals, Cyberterrorism, Cyberwar, Developing Storyline Ideas, Fiction Based on Facts, Future Shock, Guest Blogging, Internet Security, James J. Murray Blog, Lapinsky, Using Cyber Security To Murder, Using Malware For Murder, Walt Lapinsky Blog, Websense, wrLapinsky | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , | 2 Comments