When many people think of surveillance, it is in the context of domestic situations and divorces. However, this post and our work at Kimmons Investigative Serives, Inc. is about corporate situations and how businesses use our covert surveillance services. It is important to know that covert surveillance must comply with constitutional mandates as well as […]
Digital Evidence, Data Recovery, and Forensic Analysis Techniques
In today’s digital age, the acquisition and preservation of digital evidence play a crucial role in various fields, including law enforcement, cybersecurity, and forensic investigations. With the increasing reliance on digital devices and technology, it is imperative to have effective methods in place to acquire and preserve this evidence. Digital evidence acquisition involves the process […]
What are Internal and External Risks in Business and How to Handle Them
Starting and growing a business creates success and employment for Americans. Small businesses employ approximately 64% of all American workers. The owners can grow wealth and retire comfortably by operating and growing a successful business. But, there are risks, both internal and external, and success will depend upon avoiding or overcoming them. Internal Risk Internal […]
Podcast: Managing a Targeted Threat
Check out our latest podcast at: A Private Investigator’s View into Managing a Targeted Threat
Computer Forensics: An Overview
Computer Forensics: An Overview By: Reese Kimmons, MS ISA When you delete a document or file from your computer, it doesn’t just go away. Your operating system merely marks the space the data occupied as being available for use again. Until that space is overwritten, and sometimes even after it is, all or part […]
PrivacyCon 2020: What you’ll see on the webcast
PrivacyCon is going virtual this year. As the just-released agenda for the fifth annual Gathering of the Gurus demonstrates, you’ll want to mark July 21, 2020, on your calendar and watch the webcast for thought-provoking research into topics related to consumer privacy and data security. Read the entire article here.
FTC releases agenda for Safeguards Rule virtual workshop
Financial institutions collect personal information from customers every day, from names and addresses to bank account and Social Security numbers. The Gramm-Leach-Bliley Act’s Safeguards Rule requires those institutions to develop, implement, and maintain a comprehensive information security program. As part of its regulatory review process, the FTC has proposed changes to the Rule. Join us […]
Statement by DNI Ratcliffe on Recent Press Reporting
WASHINGTON, D.C. — Director of National Intelligence (DNI) John Ratcliffe today released the following statement: “I have confirmed that neither the President nor the Vice President were ever briefed on any intelligence alleged by the New York Times in its reporting yesterday.” FOR IMMEDIATE RELEASE ODNI News Release No. 25-20 June […]
DNI Ratcliffe Statement on Impact of Unauthorized Disclosures on Force Protection
WASHINGTON D.C. – Director of National Intelligence John Ratcliffe today issued the following statement: “U.S. and coalition force protection is a critical priority for both the President and the Intelligence Community. The selective leaking of any classified information disrupts the vital interagency work to collect, assess, and mitigate threats and places our forces at risk.” […]
Six steps toward more secure cloud computing
For businesses, cloud services are kind of like clouds. At their best, they can be soothing and expansive. But for companies that fail to appreciate the security implications, their ethereal presence may hide dangerous storms within. As cloud computing has become business as usual for many businesses, frequent news reports about data breaches and other […]