Stalkers, controlling spouses, creepy bosses and predators like tracking. The good things in our electronic environment can create problems for us… and opportunities for stalkers. Computer logins and email headers can disclose clues about location. Photos carry metadata that can include GPS
It’s fashionable on web sites to describe successes. Sometimes other case outcomes are more memorable, however. Here are some of our experiences. The whole family was concerned. Things were getting worse fast. We had been retained to inspect their Tacoma house for eavesdropping devices.
Typically professionals work in an environment that has thoughtful IT professionals safeguarding the network. In many cases the network health is audited to standards for medical, financial or government security. At home much of network security is left to the homeowner without much help from the
Whenever a client calls with a complex investigation we quickly run through a checklist of volatile evidence that they should preserve, including cellphones. These are obvious digital items that make sense to archive before they disappear: Alarm system logs, Access control activity, Video from the