Category: Bug Sweeps
-
The Objective Truth, is the Investigator’s Target
During her 30-year career as a private investigator, Caryn Gloyd has provided hundreds of court testimonies. She has logged thousands of hours of surveillance or digital forensics. She has spent countless hours tracking down and interviewing potential witnesses or suspects. In other words, Gloyd has seen it all and heard it all. But when she…
-
Successor Busted in TSCM Investigation
Here at we use a lot of high tech equipment and software. But along with that comes years of investigative experience. And we employ both good old fashioned detective work with the digital tools in just about every case we handle. One case involved a son and his father and the company the father had…
-
Suspicions Lead to Fruitful Bug Detection
We had a client who had taken on a special, highly confidential project at work. The reason he called was because he was concerned about inadvertently leaking information. He kept asking “Is my phone tapped?” He wasn’t paranoid, but suspicious. What made him suspicious? Electronic devices were acting “weird” and although he said he had…
-
TSCM Sweep Rounds Up the Bad Guys
Truth is the basis for fictional story lines, that’s for sure. was called in on a case by an attorney that had a female client who was being blackmailed. The blackmailer said he had video of her inside her apartment in a 28-floor building. He described the apartment and conversations held there in detail so…
-
RV TSCM Sweep Not a Joke
Comedy really is no laughing matter. No, it’s big business and people’s livelihoods. When a call came into from an attorney who said his client was a jokester, we weren’t quite sure what to expect. At first, we thought he was being sarcastic about something a client was asking him to do, but no, the…
-
Security Starts with TSCM
got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the…
-
Sometimes It’s Not Spyware Found During a Computer Forensic Examination
A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an…