All in Investigations

Month: June 2013

  • Get Accurate Information with Professional Due Diligence and Background Checks

    Get Accurate Information with Professional Due Diligence and Background Checks

    We’ve seen a pattern develop here at . Despite what you might believe, it seems that more men than women get stung when it comes to dealing with people. Women seem to have that radar that sniffs out suspicious behavior, like it’s an intuitive sense. We have been asked by men, women and businesses to…

  • Decrease Threats by Reducing Vulnerability to Cell Phone Spy

    Decrease Threats by Reducing Vulnerability to Cell Phone Spy

    Let’s talk cell phone spyware detection. Remember this number: 95%. McAfee estimates that’s the percentage of malware ever devised that has been created in the past year. And, the amount of malware detected by them increased 44% last year, too. Those are dismal numbers that illustrate the growing threat to online security. Many of the…

  • When a Child Custody Battle Turns into a Missing Person Search

    When a Child Custody Battle Turns into a Missing Person Search

    As investigators with years of experience, everyone at knows how emotionally-charged many situations can be, especially those involving family – like death, estates and divorce.When we pick up a call from a divorce attorney and we get the news that something bad has happened, we approach it from an objective viewpoint, which the parties involved…

  • Are Cell Phone Forensics at Risk?

    Are Cell Phone Forensics at Risk?

    The majority of states have adopted laws against texting while driving, but I just read an editorial saying that few of the laws are being enforced. Now legislators and the public want insurance companies to know who is using a cell phone while operating a vehicle and let that drive rates. Some are even calling…

  • Taking Them to Court? Search for Assets First

    Taking Them to Court? Search for Assets First

    An attorney for a lady calling herself a reluctant landlord was on the other end of the phone call to . The attorney explained that she was one of the many people who ended up renting out a property she could not sell. That also meant she was not an experienced landlord. She had run…

  • HR Due Diligence Checklist Routine for Hiring

    HR Due Diligence Checklist Routine for Hiring

    Not only do logos get updated to keep up with the times, so do those little sayings that come out of the mouths of parents beginning when their children are at a very young age. They apply to work as well as life and are a call for everyone to conduct some level of due…

  • Computer Forensics Consultant First Line of Defense Against Spear Phishing

    Computer Forensics Consultant First Line of Defense Against Spear Phishing

    Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game…

  • Security Starts with TSCM

    Security Starts with TSCM

    got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the…

  • Sometimes It’s Not Spyware Found During a Computer Forensic Examination

    Sometimes It’s Not Spyware Found During a Computer Forensic Examination

    A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an…