Month: June 2013
-
Get Accurate Information with Professional Due Diligence and Background Checks
We’ve seen a pattern develop here at . Despite what you might believe, it seems that more men than women get stung when it comes to dealing with people. Women seem to have that radar that sniffs out suspicious behavior, like it’s an intuitive sense. We have been asked by men, women and businesses to…
-
When a Child Custody Battle Turns into a Missing Person Search
As investigators with years of experience, everyone at knows how emotionally-charged many situations can be, especially those involving family – like death, estates and divorce.When we pick up a call from a divorce attorney and we get the news that something bad has happened, we approach it from an objective viewpoint, which the parties involved…
-
Taking Them to Court? Search for Assets First
An attorney for a lady calling herself a reluctant landlord was on the other end of the phone call to . The attorney explained that she was one of the many people who ended up renting out a property she could not sell. That also meant she was not an experienced landlord. She had run…
-
HR Due Diligence Checklist Routine for Hiring
Not only do logos get updated to keep up with the times, so do those little sayings that come out of the mouths of parents beginning when their children are at a very young age. They apply to work as well as life and are a call for everyone to conduct some level of due…
-
Computer Forensics Consultant First Line of Defense Against Spear Phishing
Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game…
-
Security Starts with TSCM
got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the…
-
Sometimes It’s Not Spyware Found During a Computer Forensic Examination
A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an…