Our baseline level of suspicion about the security of data and communications is high these days. Are smart devices recording conversations
About Kevin HooksThis author has not yet filled in any details.
So far Kevin Hooks has created 19 blog entries.
Please fill out the below form as completely as possible and “Submit” when finished. Not all information fields are required. We operate
Below are technologies to eavesdrop on a vehicle without using a tracking device or listening device. Concierge service (such as OnStar): Cellular
Please fill out the below form and click "Submit" when finished. We operate under a strict code of ethics and confidentiality is
As our lives are increasingly connected to the digital world, the need for cyber specialization has grown everywhere – including private investigation services. Today you will see some PI businesses label themselves as “cyber investigators.” But what does that mean, and how does it differ from someone calling themselves a “private investigator”? Let’s take a closer look.
If you feel you are under technical surveillance, our technical team is fully equipped to perform Technical Surveillance Countermeasures. TSCM is an industry term for searching and identifying electronic eavesdropping devices as well as modifications to allow normal house and business equipment to be used for electronic audio and video surveillance.
Whether it’s a vehicle, a person, or a package we can track it electronically. We lease tracking devices for daily and long-term use as well as use them on our investigations when legal to do so. Please contact our office to discuss your situations and we can have you equipped with a tracker within a few hours.
Cell Forensics - Device Data Extraction Forensics-Level Data Extraction Extracting data and deleted data from devices is a valuable
Code of Virginia Title 8.01. Civil Remedies and Procedure Chapter 8. Process § 8.01-296. Manner of serving process upon natural persons. Subject