
During her 30-year career as a private investigator, Caryn Gloyd has provided hundreds of court testimonies. She has logged thousands of hours of surveillance or digital forensics. She has spent countless hours tracking down and interviewing potential witnesses or suspects. In other words, Gloyd has seen it all and heard it all. But when she […]

Here at we use a lot of high tech equipment and software. But along with that comes years of investigative experience. And we employ both good old fashioned detective work with the digital tools in just about every case we handle. One case involved a son and his father and the company the father had […]

One thing that we realize here at is that a couple doesn’t have to actually be married to be caught in an emotionally charged – and challenging – situation. For instance, one case we had was a couple who had been together for many years and had two children together. They never married and their […]

We had a client who had taken on a special, highly confidential project at work. The reason he called was because he was concerned about inadvertently leaking information. He kept asking “Is my phone tapped?” He wasn’t paranoid, but suspicious. What made him suspicious? Electronic devices were acting “weird” and although he said he had […]

Truth is the basis for fictional story lines, that’s for sure. was called in on a case by an attorney that had a female client who was being blackmailed. The blackmailer said he had video of her inside her apartment in a 28-floor building. He described the apartment and conversations held there in detail so […]

Comedy really is no laughing matter. No, it’s big business and people’s livelihoods. When a call came into from an attorney who said his client was a jokester, we weren’t quite sure what to expect. At first, we thought he was being sarcastic about something a client was asking him to do, but no, the […]

Data Extraction. That’s what provides the evidence so many of our clients want when they request a mobile phone forensic analysis. Cell phone forensic tools allow a cellular forensics specialist to create an exact image of the cell phone hard drive and from that, complete a mobile phone analysis. The analysis will uncover any evidence […]

During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney. His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how. […]

got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the […]

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an […]