Birmingham Private Investigator

Expansion of Services to Alabama

Hawk PI Announces Expansion of Services to Include AlabamaATLANTA (Mar. 11, 2021) – Hawk PI, a full-service investigative firm, is expanding their service area to include Alabama. The firm will be based in Birmingham and will provide investigative services including surveillance, bug sweeps, background checks and more throughout all of Alabama including Huntsville, Mobile and…

Digital Forensics Expert Beth Messick

Hawk PI Enhances Digital Forensics Capabilities

Hawk PI Enhances Digital Forensics Capabilities with the Addition of Nationally-Recognized Expert Beth MessickATLANTA (Mar. 10, 2020) Hawk PI, a leader in digital and technical investigative techniques, announces the addition of retired GBI digital forensics expert, Beth Messick. In this role, she will provide advisory services to attorneys and businesses in the digital forensics aspects…

TSCM Bug Sweep Expert

HPI’s Tim Keener to speak at Georgia Private Investigators Conference

ATLANTA (Apr. 26, 2019) – Tim Keener, U.S. Secret Service (Retired) and Director of Global TSCM & Physical Security for Hawk PI, will present a seminar on Debugging & Detection in Today’s Technological Environment at the Georgia Association of Professional Private Investigators Spring Training Conference. The event, held April 25-26, offers continuing education opportunities for…

Apple’s FaceTime Bug is Just the Tip of the Iceberg

While Apple’s newly discovered FaceTime bug grabs global headlines, experts warn that all mobile devices are vulnerable to privacy exploits.  The vulnerability in FaceTime, discovered by a 14-year-old Fortnite player in Arizona, allows a caller to eavesdrop – and in some cases view live video – of the person being called, even before the recipient…

Computer Privacy Vulnerabilities

Hackable Keyboards and Mice

You can now add non-bluetooth wireless keyboards and mice to your list of “hackables”. Bastille, a cybersecurity research company, recently discovered two vulnerabilities affecting wireless, non-Bluetooth keyboards and mice. These vulnerabilities could allow hackers to eavesdrop on your keystrokes and expose your sensitive data including credit card and banking information, social security number and passwords.…

Case Study: Catfishing

Catfish /’kat, fiSH/ – to lure someone into a relationship by means of an online fictional persona. Words with new meanings are popping up all over the place. For example, the word catfish is also a verb used in connection with an online profile that stretches the truth or is fictitious. However for most people,…