We had a gentleman who was on the verge of selling his multi-million dollar company. He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island. In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable. The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings. He had this feeling that something wasn’t right and he came to to hash over his suspicions to determine if that nagging warning was worth [...]
Some of the cases we get at can be pretty interesting – especially when it comes to suspected marital infidelity cases. Take for example, the case of the jealous, controlling husband who believed his wife was having an affair.
Bob* and Meredith* had only been married for a year. While they were dating, Bob had been very sweet and attentive toward Meredith. But after their marriage, Bob was becoming more overbearing. He not only controlled all of their finances with an iron fist, but whenever Meredith came home late from work, he would question where she had been and who she had been with.
When Meredith told her parents that Bob had accused her of having an extramarital affair with liaisons at a local hotel, [...]
Did you see the recent stories about the National Football League (NFL) conducting a bug sweep in the New York Jets’ locker room before their Week 7 game against the New England Patriots at Gillette Stadium? It was the talk of all the sports media outlets for several days, given DeflateGate and other instances in which the Patriots have been accused of potential cheating.
Funny thing though the Jets said they didn’t make the request for the listening device sweep. But Mike Florio of Pro Football Talk says the electronic bug detection sweep did occur. Eventually, NFL spokesperson Brian McCarthy responded by saying that the NFL has conducted regular, random sweeps of locker rooms for listening devices for years. However, the league does not provide [...]
After years of providing investigative services, here at , there are some things we understand. When someone’s home is burgled, the residents often lose the feeling of being safe and secure. But when someone’s homes is invaded twice in a very short time frame, that fear is mixed with confusion and uncertainty. Sandy* had moved out of her home after the second incident. She was afraid, and not quite sure why the burglary had been repeated.
In each instance, some possessions had been taken: a computer, some collectibles, and then some things like BlueRay movies, CDs and even a few books. It didn’t make sense to her and it sounded unusual to us, too.
Since there was a chance the home would be invaded again, especially [...]
Sometimes business owners and leadership of businesses can’t believe that their business would be the target of any corporate espionage or illegal activity. But innovative small businesses have become not only a hotbed of technological advances, but the victim of crimes that devastate their enterprise.
For that reason, here at , we want every business owner to be aware of the top 4 reasons to conduct Technical Surveillance Countermeasures (TSCM). TSCM is most commonly referred to as bug detection. But TSCM is also used to detect phone tapping devices, listening devices, electronic surveillance equipment and other sorts of spy equipment.
Knowing that TSCM is for spy detection, some business owners might immediately say they don’t need these services. But if any of these situations come up [...]
At , we understand that you need cold, hard facts.
Just the facts.
We have the most advanced tools to get that job done. We still use basic skills of traditional investigations, such as surveillance. But we have access to very sophisticated surveillance equipment. To conduct research, we use highly advanced data bases.
And when we have access to computers and cell phones, we search for the truth through digital forensics.
In addition, we are experts at TSCM – Technical Surveillance Countermeasures.
So when you suspect that your office has been bugged, we are the professionals who can answer that question for you. As we have all seen in movies about espionage, wire tapping or a phone tap can be used as a terrible tool to either [...]