graphic from article

Technology in My Divorce

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics, Mobile Forensics

The standard issues involved with a divorce or separation are most often very difficult. In the past decade I have seen these difficult situations made even more difficult because of technology. Text messages, emails, smartphones, and other technology are relevant in many of the cases we see. As computer forensics consultants, we are asked to check computers for keylogging software …

screenshot of metadata

Computer Forensics: What is metadata?

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

What is metadata and why is it important in a computer forensics investigation? A brief definition or explanation of metadata is “data about data.” What does that exactly mean? Data is the file. Data is the Word document, the Excel document, or any other user-created document on the computer. Meta is information about that document. This can include where it’s …

HPG article

Truth or Consequences? Choose Investigators Wisely

Tasha Dyson, CFECompliance

A recent article from HPG provided excellent information about how companies and organizations can take a proactive stand against harassment (read the original article here). As part of the precautions to take, the article recommended an investigation of the complaint. We couldn’t agree more. Few organizations realize that private investigators offer a vast and virtually untapped pool of investigative talent. …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha Dyson, CFECompliance, Security Program Development, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

Question Mark Key on Computer Keyboard

Electronically Stored Information – More than Just Domestic Cases

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

Question Mark Key on Computer Keyboard[/caption]>I receive calls from attorneys and clients on a daily basis. Some I have worked for in the past and some got my name from a colleague. In most cases, there is an issue involving electronic data, computers, mobile devices or the internet. Anytime electronically stored information becomes part of a civil or criminal matter, …

digital forensics expert

Five Computer Forensics Myths Debunked

Russell W. Gilmore, CISSP, CISM, EnCEComputer Forensics

The media has presented a picture of computer forensics and the collection of data from a mobile device as a glamorous, fast process only used in high profile cases such as murder, espionage, and corruption. This is not the case. Let’s address a few common myths about computer forensics. Myth 1: Computer forensics is only used in high-profile cases or …

Campus Safety article about Penn State fine

Dept. of Ed Levies $2.4M Clery Act Fine Against Penn State Over Sandusky Case

Christine L. Peterson, CPP, ISPCompliance, News

It appears that the Department of Education (ED) is prepared to assess Penn State the largest Clery Act fine to date. Read the entire article here. Not only is the fine larger than other fines we have seen assessed, it is exponentially larger. What does this mean for the many other institutions that are currently under investigation or will be …

Campus Safety threat assessment article

3 Mistakes That Can Derail Your Threat Assessment Process

Christine L. Peterson, CPP, ISPSecurity Program Development, Workplace Violence

Campus Safety Magazine published 3 Mistakes That Can Derail Your Threat Assessment Process. Although this article addresses students in an educational environment, it includes lessons for employers as well. How can security professionals protect the individual as well as the whole community? Violence in the workplace is more common than many believe – and it is also often predictable and …

Campus Safety article on safety during investigations

Keeping the Campus Safe during a Title IX Investigation

Christine L. Peterson, CPP, ISPCompliance, Training, Workplace Violence

Should campus security conduct a behavioral threat assessment concurrent to a Title IX sexual violence investigation? Campus Safety’s feature on Threat Assessment Teams provides three steps to help maintain security during an investigation. Read more: 3 Steps to Keeping Victims and Campuses Safe During Title IX and VAWA Investigations     Plan. Protect. Prosper. Protus3 specializes in security system design, …

Rusty Gilmore

Rusty Gilmore Interviewed by WRAL

Protus3Computer Forensics, News

An investigation that began in Wake County of nude photos of high school students on Instagram has expanded to at six more North Carolina counties, bringing the total to at least nine, a spokeswoman for the state Department of Justice said Wednesday. School system representatives have said they are cooperating with authorities in the investigation, and authorities are urging parents …