All in Investigations

Category: Bug Sweeps

  • The Objective Truth, is the Investigator’s Target

    The Objective Truth, is the Investigator’s Target

    During her 30-year career as a private investigator, Caryn Gloyd has provided hundreds of court testimonies. She has logged thousands of hours of surveillance or digital forensics. She has spent countless hours tracking down and interviewing potential witnesses or suspects. In other words, Gloyd has seen it all and heard it all. But when she…

  • Successor Busted in TSCM Investigation

    Successor Busted in TSCM Investigation

    Here at we use a lot of high tech equipment and software. But along with that comes years of investigative experience. And we employ both good old fashioned detective work with the digital tools in just about every case we handle. One case involved a son and his father and the company the father had…

  • Cell Phone Forensics Reveals Who is Watching You

    Cell Phone Forensics Reveals Who is Watching You

    One thing that we realize here at is that a couple doesn’t have to actually be married to be caught in an emotionally charged – and challenging – situation. For instance, one case we had was a couple who had been together for many years and had two children together. They never married and their…

  • Suspicions Lead to Fruitful Bug Detection

    Suspicions Lead to Fruitful Bug Detection

    We had a client who had taken on a special, highly confidential project at work. The reason he called was because he was concerned about inadvertently leaking information. He kept asking “Is my phone tapped?” He wasn’t paranoid, but suspicious. What made him suspicious? Electronic devices were acting “weird” and although he said he had…

  • TSCM Sweep Rounds Up the Bad Guys

    TSCM Sweep Rounds Up the Bad Guys

    Truth is the basis for fictional story lines, that’s for sure. was called in on a case by an attorney that had a female client who was being blackmailed. The blackmailer said he had video of her inside her apartment in a 28-floor building. He described the apartment and conversations held there in detail so…

  • RV TSCM Sweep Not a Joke

    RV TSCM Sweep Not a Joke

    Comedy really is no laughing matter. No, it’s big business and people’s livelihoods. When a call came into from an attorney who said his client was a jokester, we weren’t quite sure what to expect. At first, we thought he was being sarcastic about something a client was asking him to do, but no, the…

  • Cellular Forensics Even Applies to Drop Phones

    Cellular Forensics Even Applies to Drop Phones

    Data Extraction. That’s what provides the evidence so many of our clients want when they request a mobile phone forensic analysis. Cell phone forensic tools allow a cellular forensics specialist to create an exact image of the cell phone hard drive and from that, complete a mobile phone analysis. The analysis will uncover any evidence…

  • Bug Detection Out of the Office

    Bug Detection Out of the Office

    During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how.…

  • Security Starts with TSCM

    Security Starts with TSCM

    got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the…

  • Sometimes It’s Not Spyware Found During a Computer Forensic Examination

    Sometimes It’s Not Spyware Found During a Computer Forensic Examination

    A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an…