Investigation and Security Blog

Challenges for an Investigator in Finding Hidden Financial Assets

top-10-hidden-a_53046936 Hidden Financial Asset Challenges
Hidden Assets are often an issue in litigation proceedings especially involving The Bankruptcy process as intended to allow debtors to reorganize and to establish a plan to repay creditors, or enable an orderly liquidation of the debtor's property. Often, debtors are tempted to hide or not disclose assets in order to avoid losing the asset to credi...
Continue reading

Mergers and Acquisitions (M&A) Due Diligence

MA-Due-diligence M&A Due Diligence Silver Bullet Investigations
What is due diligence? The due diligence process allows potential buyers and investors to learn about the company in question with a signed full disclosure. The information requires precision and investigation for structuring a fair deal, for all involved stakeholders. M&A attorneys create a comprehensive checklist of requirements, and accounta...
Continue reading

14 Places Where People Hide Assets

Hiding-Financial-Assets Best places to hide Illegal assets
Hiding assets is a game people play to keep their money out of the hands of creditors. The actual financial hiding places are usually straightforward, as opposed to stuffing money in a mattress or hiding it in a tin can buried under a tree. Common Hiding Places Home Mortgage PayDown--A favorite tactic in Texas which has strong homestead protection ...
Continue reading

What is Computer Forensics?

computer-forens_51880002-1 Computer Forensics Can Support Almost Any Investigation
Technology is a daily part of our lives, making it more convenient. For the investigator, technology presents challenges as well as opportunities. Not only does a good computer forensics investigator need to have a pedigree of technical savvy in terms of certifications, background, skills, network and a cadre of hardware and software investment; he...
Continue reading

List of Audio Surveillance Laws by State

audio-surveilla_52790171 Investigators Should Always Comply with State Surveillance Laws
List of Audio Surveillance Laws by State Why was Linda Tripp indicted for recording Monica Lewinski's confession of her affair with Bill Clinton which caused his impeachment? Because she did not have both party consent to the recording and the call was made in Maryland. Had she been in Virginia or DC, perhaps the recording would have been admissibl...
Continue reading

How to Password Protect a MAC Folder

How to password protect a folder on Mac: Assigning a password to files and folders hides/locks the contents of your file or folder from anyone wanting to open it and thereby secures it with a password. ***Please note--once you have a password protected folder or file, don't forget it, because there is no way to recover it. There are different steps...
Continue reading

What is Bankruptcy Fraud?

bankruptcy_51920013 What is bankruptcy fraud
What is bankruptcy fraud? The definition of bankruptcy is a legal proceeding involving a person or business that is unable to repay their outstanding debts. The bankruptcy process begins with a petition filed by the debtor (most common) or on behalf of creditors (less common). The majority of people who do file for bankruptcy are transparent w...
Continue reading

Computer Forensics vs. Phone Forensics

phone-vs-comput_51880002 Smartphones and computer forensics present different challenges.
What is Computer Forensics? Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital i...
Continue reading