Month: October 2012
-

Bug Sweep in Preparation for Top-Level Confidential Board Meetings
I just heard that the Teacher’s Union in a major metropolitan city has sent a notice of intent to strike to the school district. I won’t comment on that, but it did remind me of a case took on not too long ago when another company needed a Technical Surveillance Countermeasures (TSCM) specialist and specialized…
-

Smart Candidates undertake Due Diligence Investigations before Throwing their Hat in the Ring
It’s election time and you know what that means: politics. It is often for the best of intentions that someone decides to run for public office, but even those candidates are subjected to the arrows from the opposition. For that reason, when anyone decides to put their name out there as a candidate, it should…
-

Computer Forensic Analysts Provide Factual and Objective Data
When computer forensics investigators extract data, it is handled completely objectively. Many times, we don’t know the implications of what is – or is not – found in the data. We compile the information and turn it over to the client. That’s just the way it is with computer forensics analysis. For example, was involved…
-

Data Extracted in Computer Forensics Results in Additional Charges
Even though the protocol and process a computer forensics investigator uses to extract and analyze data from a computer are the same no matter who owns the computer, ownership does make a difference in the outcome once the facts are uncovered. For one thing, the owner of the machine has to provide appropriate permission for…
-

Proves Violation of Court Order
Infidelity in marriages breaks down the trust between spouses, which is why it often ends in divorce. You might think after the marital infidelity investigation and subsequent divorce proceedings; everything between two ex-spouses is done. Often, that just isn’t the case – especially when there are children involved. When infidelity in marriages results in ex-spouses,…



