Gaslit
Can you find the completely self-contained battery-powered wireless camera with audio capabilities? A recent client said her privacy had been repeatedly compromised by her spouse from inside their home. Her… Read More »Gaslit
Can you find the completely self-contained battery-powered wireless camera with audio capabilities? A recent client said her privacy had been repeatedly compromised by her spouse from inside their home. Her… Read More »Gaslit
What do I do if I think there are cameras in my house? What do I do if I think my car has a tracker? If you are asking… Read More »Are You Being Tracked?
It used to be the stuff of spy thrillers, but electronic eavesdropping devices are now part of everyday life. The low cost and easy availability of hidden microphones and cameras,… Read More »Warning Signs 2022: Is My Home Bugged?
ATLANTA (Nov. 11, 2019) Hawk Professional Investigations, a national leader in TSCM bug sweep services, security and investigations, has hired Robert McDonough as Associate, Security Consulting.
ATLANTA (Apr. 26, 2019) – Tim Keener, U.S. Secret Service (Retired) and Director of Global TSCM & Physical Security for Hawk PI, will present a seminar on Debugging & Detection… Read More »HPI’s Tim Keener to speak at Georgia Private Investigators Conference
ATLANTA (Feb. 25, 2019) – The legal community is abuzz after news broke of a recording device found in a law firm in West Palm Beach. The story has brought… Read More »Privacy Concerns Growing After Recording Device Found at Law Firm
We are proud to announce the addition of Tim Keener, a 20-year veteran of the U.S. Secret Service, to the Hawk PI Security Team.
In his role as Director for Global TSCM and Physical Security, Tim will develop and deploy comprehensive strategies and programs for security assessment, planning and implementing to create technically secure environments for sites, events and individuals.
You can now add non-bluetooth wireless keyboards and mice to your list of “hackables”. Bastille, a cybersecurity research company, recently discovered two vulnerabilities affecting wireless, non-Bluetooth keyboards and mice. These… Read More »Hackable Keyboards and Mice
Who would have imagined that a 5th century BC book by a Chinese military strategist would be relevant in modern time – in sports, business and even our personal lives.… Read More »The Art of Love and War
Is your company susceptible to being targeted for corporate espionage? Are you making it easy for someone to infiltrate your company’s proprietary information? The ruinous effects of corporate espionage have… Read More »Top 6 Vulnerabilities: An Open Door for Corporate Espionage