Month: August 2012
-
Listening Devices Might Not be the Only Threat to Confidential Business Matters
In one of my recent posts, I talked about how we did a Technical Surveillance Countermeasures (TSCM) sweep for spy listening devices in the offices of a business. We didn’t find any eavesdropping devices in their offices, but we did determine that one of the other businesses in the building was being bugged. When we…
-
Combining Hidden Asset Research and Computer Forensics Makes for Informed Divorce Decisions
I don’t usually keep track of celebrity lives, but I read the news about Tom Cruise and Katie Holmes getting divorced. Apparently he had no idea – or at least that what the news reported. After dealing with many divorce situations as a private investigator, I can say that that is not all that uncommon,…
-
Medical Issues are One Reason we Find Missing Relatives
Not all investigative work is tied to bad guys. In fact, here at , we get many calls from people asking us to find a family member. We find missing siblings and parents. In fact, we find missing relatives of all sorts. Some have been estranged for years and old hurts are fading. Other cases…
-
Cellphone Expert Analysis Comes Down to the Minute Details
We recently had a cell phone forensics case that illustrates exactly why cellphone forensic analysts are often considered cellphone experts. Cell phone forensics was being completed to determine whether or not malware or cellular spyware had been installed on a client’s phone. The user was suspicious because there were some people who knew things that…