Hawk PI Expands Security Capabilities
ATLANTA (Nov. 11, 2019) Hawk Professional Investigations, a national leader in TSCM bug sweep services, security and investigations, has hired Robert McDonough as Associate, Security Consulting.
ATLANTA (Nov. 11, 2019) Hawk Professional Investigations, a national leader in TSCM bug sweep services, security and investigations, has hired Robert McDonough as Associate, Security Consulting.
ATLANTA (Apr. 26, 2019) – Tim Keener, U.S. Secret Service (Retired) and Director of Global TSCM & Physical Security for Hawk PI, will present a seminar on Debugging & Detection in Today’s Technological Environment at the Georgia Association of Professional Private Investigators Spring Training Conference. The event, held April 25-26, offers continuing education opportunities for…
ATLANTA (Feb. 25, 2019) – The legal community is abuzz after news broke of a recording device found in a law firm in West Palm Beach. The story has brought up privacy concerns and questions throughout the legal community and into the business world. This event happened in Florida which is a two-party consent state…
We are proud to announce the addition of Tim Keener, a 20-year veteran of the U.S. Secret Service, to the Hawk PI Security Team.
In his role as Director for Global TSCM and Physical Security, Tim will develop and deploy comprehensive strategies and programs for security assessment, planning and implementing to create technically secure environments for sites, events and individuals.
The Carroll County Board of Education on Thursday approved the purchase of the SHIELD security system for Glanton-Hindsman Elementary in Villa Rica. The school system is continuing to install protective measures as part of its safety initiative. Ithica Elementary, Roopville Elementary and Villa Rica Middle already have the SHIELD system installed. The SHIELD is a security system…
You can now add non-bluetooth wireless keyboards and mice to your list of “hackables”. Bastille, a cybersecurity research company, recently discovered two vulnerabilities affecting wireless, non-Bluetooth keyboards and mice. These vulnerabilities could allow hackers to eavesdrop on your keystrokes and expose your sensitive data including credit card and banking information, social security number and passwords.…
There is no doubt that digital evidence on cell phones and mobile devices is changing the landscape of the U.S. legal system. Though the depths of this impact have yet to be fully understood or measured. In 2015, the Institute of Justice (a branch of the Department of Justice) collaborated with the Rand Corporation to…
Who would have imagined that a 5th century BC book by a Chinese military strategist would be relevant in modern time – in sports, business and even our personal lives. The Art of War by Sun Tzu is devoted to the subject of warfare and discusses strategies for waging and ultimately winning a war. The…
Is your company susceptible to being targeted for corporate espionage? Are you making it easy for someone to infiltrate your company’s proprietary information? The ruinous effects of corporate espionage have increased exponentially to the point that the FBI has invested in a campaign to raise awareness and alert business executives and owners to this risk.…
Bug sweeps are the every day term for locating a hidden camera or listening device. However, in the security and investigation field, it is known as TSCM or Technical Security Counter Measures. The TSCM equipment utilized by Hawk Professional Investigations examines radio and infrared frequency using a variety of input instruments to detect carrier current…
Confidential personal conversations have been compromised or proprietary company information ends up in the hands of competitors. You notice unusual clicks, hums, static, or other noises on your telephone, maybe even when it’s not in use. You may also notice changes in radio and TV reception. Your home or business has been broken into, but…