Investigation and Security Blog

Challenges for an Investigator in Finding Hidden Financial Assets

top-10-hidden-a_53046936 Hidden Financial Asset Challenges
Hidden Assets are often an issue in litigation proceedings especially involving The Bankruptcy process as intended to allow debtors to reorganize and to establish a plan to repay creditors, or enable an orderly liquidation of the debtor's property. Often, debtors are tempted to hide or not disclose assets in order to avoid losing the asset to credi...
Continue reading

Mergers and Acquisitions (M&A) Due Diligence

MA-Due-diligence M&A Due Diligence Silver Bullet Investigations
What is due diligence? The due diligence process allows potential buyers and investors to learn about the company in question with a signed full disclosure. The information requires precision and investigation for structuring a fair deal, for all involved stakeholders. M&A attorneys create a comprehensive checklist of requirements, and accounta...
Continue reading

14 Places Where People Hide Assets

Hiding-Financial-Assets Best places to hide Illegal assets
Hiding assets is a game people play to keep their money out of the hands of creditors. The actual financial hiding places are usually straightforward, as opposed to stuffing money in a mattress or hiding it in a tin can buried under a tree. Common Hiding Places Home Mortgage PayDown--A favorite tactic in Texas which has strong homestead protection ...
Continue reading

What is Computer Forensics?

computer-forens_51880002-1 Computer Forensics Can Support Almost Any Investigation
Technology is a daily part of our lives, making it more convenient. For the investigator, technology presents challenges as well as opportunities. Not only does a good computer forensics investigator need to have a pedigree of technical savvy in terms of certifications, background, skills, network and a cadre of hardware and software investment; he...
Continue reading

List of Audio Surveillance Laws by State

audio-surveilla_52790171 Investigators Should Always Comply with State Surveillance Laws
List of Audio Surveillance Laws by State Why was Linda Tripp indicted for recording Monica Lewinski's confession of her affair with Bill Clinton which caused his impeachment? Because she did not have both party consent to the recording and the call was made in Maryland. Had she been in Virginia or DC, perhaps the recording would have been admissibl...
Continue reading

Lessons Learned from the Robot Army

robot-army_51893238 Implementing lessons learned are key to the successful development of complex systems
 Foreground My last position at the FBI was Chief of the Technology Innovation Section within the Information Management Division.One of my key responsibilities was overseeing the development of the FBI's new Central Records Complex, a $220 million facility.This project combined a construction project with new as well as legacy IT systems, a h...
Continue reading

How to Password Protect a MAC Folder

How to password protect a folder on Mac: Assigning a password to files and folders hides/locks the contents of your file or folder from anyone wanting to open it and thereby secures it with a password. ***Please note--once you have a password protected folder or file, don't forget it, because there is no way to recover it. There are different steps...
Continue reading

What is Bankruptcy Fraud?

bankruptcy_51920013 What is bankruptcy fraud
What is bankruptcy fraud? The definition of bankruptcy is a legal proceeding involving a person or business that is unable to repay their outstanding debts. The bankruptcy process begins with a petition filed by the debtor (most common) or on behalf of creditors (less common). The majority of people who do file for bankruptcy are transparent w...
Continue reading

Computer Forensics vs. Phone Forensics

phone-vs-comput_51880002 Smartphones and computer forensics present different challenges.
What is Computer Forensics? Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital i...
Continue reading

Four types of surveillance explained

surveillance-camera-icon The objective of your surveillance will determine what method is employed.
For investigative agencies, surveillance is categorized into either physical or electronic. Physical surveillance entails putting "eyes on" a subject, and observing that person's locations, movements, and actions.Electronic surveillance employees a variety of devices to monitor the subject.Whether physical or electronic, each method can also be fur...
Continue reading

Part III: You Have Executive Support. Now What?

blog-post-5-exe_51681314 Use executive support effectively for the good of your organization
Act like it is going to happen In Part I, I mentioned making executive support public.For any complex project, it is important to develop a constituency – a group of stakeholders who will benefit or play a role in the initiative's success.The broader your initiative's constituency, the better its chances for success.Part of building a broad constit...
Continue reading

Part II: Maintaining Executive Support for Your Initiative

blog-post-5-exe_51681314 Executive support is not a one time event - make sure you maintain it!
 Hold regular meetings Once you have the attention of your executive, it is important that you keep that attention.Set a meeting schedule and stick to it. This helps set a battle rhythm for your project to keep things moving. For a major project I managed, I set meetings every other month. As the project neared its delivery date, I moved to a ...
Continue reading

Part I: Obtaining Executive Support for Your Initiative

blog-post-5-exe_51681314 Executive support is vital to completing any organization-wide initiative
Obtaining leadership buy-in is essential to move forward any major project or initiative forward.Whether obtaining needed resources or changing workplace culture, leadership support is critical when venturing into new territory or making significant changes.But how do you get that support? Align with organization priorities (what does the executive...
Continue reading

The Importance of Keeping Security Controls Up to Date

shutterstock_610811747 Make sure your security controls still make sense
Today I am visiting the DMV for the second time in my quest to exchange my out of state license for a Texas driver's license. Like many others, I didn't have all the required documentation with the during the first visit.Part of Texas' licensing process is to verify the applicant's SSN.Acceptable documents included a Social Security Card and variou...
Continue reading

Nine Ways to Safeguard Your Family Gatherings During COVID

Holiday_Season_Masks Stay safe and enjoy the holidays
I was surprised to learn recently that the majority of COVID-19 infections now occur at home.With the recent surge of new cases and the upcoming holiday season, here are some alternatives for reducing transmission risk during holiday family gatherings. The official CDC guidance is available here, and it has updated information for Thanksgiving gath...
Continue reading

6 Reasons Why We Should Be Willing to Return Our Client’s Money

Sales Cycle Long term relationships are built on trust and client satisfaction
Bawn is making a bold statement to its attorney clients: if they are not satisfied with our investigative work, we will return their funds. The initial response wasn't exactly resounding: "Are you crazy?" When we outline the reasons why we should hold ourselves to this standard, we feel it is the best course of action for both Bawn and its clients....
Continue reading

Information Sources of the Private Investigator

Private_Investigator_Resources_cropped Knowing where to find information is only the first part of developing an intelligence picture
A large portion of investigative work today is done online, making use of various databases and services to put together a picture before initiating interviews or some form of surveillance.An experienced analyst will ferret out small items within these online resources to separate the signal from the noise, and provide a thoughtful report upon whic...
Continue reading

Bawn Commences Operations in Austin, Texas

Austin_TX_skyline_sunset Bawn sets up shop in Austin, Texas
Bawn LLC is pleased to announce the opening of its headquarters office in Austin, Texas. Bawn is an investigation and security agency focused on supporting the needs of legal firms and private industry. Comprised of former federal law enforcement, military, and intelligence professionals, Bawn provides sophisticated investigative services to addres...
Continue reading

How Leaders can Foster a Culture of Innovation

Throughout private industry and government, employees and managers are constantly being exhorted to be innovative. We set up innovation teams, labs, and contests to encourage employees to do more with technology. They are told "Be Innovative!" and to go forth a create the next market disrupting idea.

Continue reading

By accepting you will be accessing a service provided by a third-party external to