TSCM

Surveillance Equipment Documents Workers Compensation Fraud

Like nearly every other business owner he knew, Lance paid close attention to the bottom line. He felt responsible for employees working in his chain of convenience stores. Many of those employees had been with Lance for more than a decade. In fact, Lance believed his stores were surviving the economic crunch because employees were friendly and fair to customers, just as Lance was friendly and fair to workers. That was exactly why Lance was upset about a workman's compensation claim filed two months ago by a new employee. According to the claim, the employee injured his back and neck when he slipped and fell on a freshly mopped floor. Other employees told Lance the wet area was marked with a cone and no one [...]

Bad Partner Revealed Through Comprehensive Investigation

As a risk-taking entrepreneur, John was accustomed to feeling stressed. But for months, John felt more on edge than ever. Two of his three business partners had readily agreed to the sale of one of their jointly owned companies. But for some reason, the fourth partner adamantly disagreed. With a majority vote, the partners did not need Eric's vote in order to sell. But John didn't want animosity. He continued to try to discuss the decision with Eric. But suddenly, Eric, the business accountant, was so angry that he refused to turn over tax records requested by potential buyers. As if that situation wasn't enough of a headache, John secretly feared that he was being watched or even followed. He avoided discussing this with his [...]

on the Case for Large and Small Clients

Since 1960, has proudly served as a professional helpmate to all types of cases. We have worked on numerous cases involving government agencies, municipalities, insurance companies, investors, business owners, bankers and bail bondsmen. More often than not, we can track down the guy guilty of employee embezzlement for thousands of dollars. We can even find offshore bank accounts, hidden assets and even missing assets. We can prove insurance fraud in many cases involving false claims made to insurance companies. But some private citizens might assume that our fact-finding service is set aside only for those with deep pockets. That assumption could not possibly be farther from the truth. Our firm is filled with a unique mix of investigators with all kinds of backgrounds. Some are [...]

What DO Private Investigators DO?

It’s not unusual for furious people to call or visit . They aren’t furious with us, but with a situation and that is the reason they are contacting us. And sometimes with that fury comes an intent that we cannot service. For instance, one man recently came in with a situation that had him in a blind rage. He was red in the face and yelling. He knew an employee was stealing from his supply house and he wanted this employee stopped. He wanted us to, “threaten him with his job and intimidate him into confessing publicly.” We let him have his say and then we told him we would not, could not do as he requested. He stopped and told us he thought that [...]

Cell Phone Forensics: We’ve Come a Long Way Baby!

When you’re talking cell phone forensics, a cell phone is a cell phone, right? Whoa! Nothing could be further from the truth. The brand or manufacturer is one variable, but so is each model produced. So to say you have an iPhone is only touching the tip of the information that a cellphone expert needs to successfully complete a mobile phone forensic analysis. With the growing number of manufacturers and models, cell phone forensic tools must adapt and evolve as well. Sim card forensics from a year ago are not sim forensics needed in mobile forensic tools today to keep up with the new technology. Of course, professionals on the cutting edge of cell phone investigation maintain not only a library of data mining software [...]

Are You a Targeted Individual for Blackmail

Are you a TI? That is, a Targeted Individual? A Targeted Individual is someone who is illegally or covertly harassed, abused, stalked or spied upon continuously by a group of people, an organized surveillance. Being a Targeted Individual is more than a boyfriend, spouse or colleague who installs cell phone spyware or conducts cell phone surveillance. It is less about following and spying and more about harassment and psychological abuse, potentially physical harm as well. That being said, one of the first steps taken by may be mobile phone hack detection or mobile phone spyware detection. Let me explain using a scenario that is becoming more and more common and compel clients to call . Zach was a prominent real estate executive in a large [...]

So You Wanna Be a Private Eye

All you have to do is Google “become a private investigator” to find all sorts of blogs, books and sites dedicated to showing you how to become your own, self-employed private eye. Trouble is, most of the advice given to prospective investigators involves searching the Internet for leads and practicing following people without detection – and most of the “tips” are based on the old, outdated stereotypes. After decades in the business, knows there is a level of skill, knowledge and resources that separates the professionals from the wannabes. Professional investigators have specialists and experts on call: Personal asset search investigators Divorce asset investigators Child custody investigators Infidelity investigators Handwriting analysis experts Forensic examiners Computer forensics specialists Certified computer examiners Technical Surveillance Countermeasures experts Social [...]

4 Reasons Businesses Should Conduct Technical Surveillance Countermeasures

Sometimes business owners and leadership of businesses can’t believe that their business would be the target of any corporate espionage or illegal activity. But innovative small businesses have become not only a hotbed of technological advances, but the victim of crimes that devastate their enterprise. For that reason, here at , we want every business owner to be aware of the top 4 reasons to conduct Technical Surveillance Countermeasures (TSCM). TSCM is most commonly referred to as bug detection. But TSCM is also used to detect phone tapping devices, listening devices, electronic surveillance equipment and other sorts of spy equipment. Knowing that TSCM is for spy detection, some business owners might immediately say they don’t need these services. But if any of these situations come [...]

Cell Phone Forensics Creates Timeline to Prove Innocence

The smart cell phone is becoming one of the most influential producers of evidence for authorities. has been on the forefront of cell phone forensics since the beginning. As cellular forensics evolves, we stay in step with developments. Locating cellular locations and turning cellular tower triangulation into forensic cellular evidence has become more commonplace and almost a routine in many investigations. Mobile phone analysis to extract data including emails, instant messages and text messages provides evidence, too. The evolution of the technology has continued and now, much of the information in a phone is also stored “on the cloud.” Forensic data analysis by a computer forensic specialist using data extraction software and protocol can produce evidence that is court-worthy. It’s also true that many phones [...]

Computer Forensic Investigations Overwhelm Authorities

In a recent article in The Police Chief, First Sergeant Charles Cohen, of the Indiana State Police identifies the challenges facing authorities in the field of computer forensics. He says that computer forensic investigators, detectives, and prosecutors all have similar lamentations: There is an unacceptable backlog of computers and devices waiting for examination. By the time computers are examined, it is often too late to follow many of the leads that are produced. Most detectives do not understand computer forensics and what it can accomplish to further their investigations. Many computer forensic examiners do not understand the investigation, causing them to overlook relevant information and expend resources needlessly. These are some of the reasons why attorneys and their clients across the nation turn to when [...]

Go to Top