Cellular and Computer Forensics

Anytime we use a digital device, we leave behind electronic “breadcrumbs” that detail information about who we are, where we were online, and what we did. This may include any type of storage media, hardware and operating systems, networks, and applications. From system logins, webpage visits, emails, Twitter Feeds, or smartphone GPS features, an electronic [...]

2022-11-02T05:56:57-05:00December 18th, 2017|Blog, Forensics|Comments Off on Cellular and Computer Forensics

Technical Security Countermeasures (TSCM)

Almost every predisposed concept we have of what a particular criminal should look like will ultimately turn out to be inaccurate. A skilled spy can blend in with almost any environment, utilizing equally covert techniques and tools to collect valuable information on a target. Everyday, corporate spies develop new ways of tapping into competitor’s technology. [...]

2019-04-20T10:33:00-05:00December 6th, 2017|Blog, private investigation|0 Comments
Go to Top