Investigation and Security Blog

Mergers and Acquisitions (M&A) Due Diligence

MA-Due-diligence M&A Due Diligence Silver Bullet Investigations
What is due diligence? The due diligence process allows potential buyers and investors to learn about the company in question with a signed full disclosure. The information requires precision and investigation for structuring a fair deal, for all involved stakeholders. M&A attorneys create a comprehensive checklist of requirements, and accounta...
Continue reading

What is Computer Forensics?

computer-forens_51880002-1 Computer Forensics Can Support Almost Any Investigation
Technology is a daily part of our lives, making it more convenient. For the investigator, technology presents challenges as well as opportunities. Not only does a good computer forensics investigator need to have a pedigree of technical savvy in terms of certifications, background, skills, network and a cadre of hardware and software investment; he...
Continue reading

List of Audio Surveillance Laws by State

audio-surveilla_52790171 Investigators Should Always Comply with State Surveillance Laws
List of Audio Surveillance Laws by State Why was Linda Tripp indicted for recording Monica Lewinski's confession of her affair with Bill Clinton which caused his impeachment? Because she did not have both party consent to the recording and the call was made in Maryland. Had she been in Virginia or DC, perhaps the recording would have been admissibl...
Continue reading

Lessons Learned from the Robot Army

robot-army_51893238 Implementing lessons learned are key to the successful development of complex systems
 Foreground My last position at the FBI was Chief of the Technology Innovation Section within the Information Management Division.One of my key responsibilities was overseeing the development of the FBI's new Central Records Complex, a $220 million facility.This project combined a construction project with new as well as legacy IT systems, a h...
Continue reading

How to Password Protect a MAC Folder

How to password protect a folder on Mac: Assigning a password to files and folders hides/locks the contents of your file or folder from anyone wanting to open it and thereby secures it with a password. ***Please note--once you have a password protected folder or file, don't forget it, because there is no way to recover it. There are different steps...
Continue reading

Computer Forensics vs. Phone Forensics

phone-vs-comput_51880002 Smartphones and computer forensics present different challenges.
What is Computer Forensics? Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a sound manner with the aim of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital i...
Continue reading

Part III: You Have Executive Support. Now What?

blog-post-5-exe_51681314 Use executive support effectively for the good of your organization
Act like it is going to happen In Part I, I mentioned making executive support public.For any complex project, it is important to develop a constituency – a group of stakeholders who will benefit or play a role in the initiative's success.The broader your initiative's constituency, the better its chances for success.Part of building a broad constit...
Continue reading

Part II: Maintaining Executive Support for Your Initiative

blog-post-5-exe_51681314 Executive support is not a one time event - make sure you maintain it!
 Hold regular meetings Once you have the attention of your executive, it is important that you keep that attention.Set a meeting schedule and stick to it. This helps set a battle rhythm for your project to keep things moving. For a major project I managed, I set meetings every other month. As the project neared its delivery date, I moved to a ...
Continue reading

Part I: Obtaining Executive Support for Your Initiative

blog-post-5-exe_51681314 Executive support is vital to completing any organization-wide initiative
Obtaining leadership buy-in is essential to move forward any major project or initiative forward.Whether obtaining needed resources or changing workplace culture, leadership support is critical when venturing into new territory or making significant changes.But how do you get that support? Align with organization priorities (what does the executive...
Continue reading

The Importance of Keeping Security Controls Up to Date

shutterstock_610811747 Make sure your security controls still make sense
Today I am visiting the DMV for the second time in my quest to exchange my out of state license for a Texas driver's license. Like many others, I didn't have all the required documentation with the during the first visit.Part of Texas' licensing process is to verify the applicant's SSN.Acceptable documents included a Social Security Card and variou...
Continue reading

Bawn Commences Operations in Austin, Texas

Austin_TX_skyline_sunset Bawn sets up shop in Austin, Texas
Bawn LLC is pleased to announce the opening of its headquarters office in Austin, Texas. Bawn is an investigation and security agency focused on supporting the needs of legal firms and private industry. Comprised of former federal law enforcement, military, and intelligence professionals, Bawn provides sophisticated investigative services to addres...
Continue reading

How Leaders can Foster a Culture of Innovation

Throughout private industry and government, employees and managers are constantly being exhorted to be innovative. We set up innovation teams, labs, and contests to encourage employees to do more with technology. They are told "Be Innovative!" and to go forth a create the next market disrupting idea.

Continue reading

By accepting you will be accessing a service provided by a third-party external to