April 2017  


In This Issue

Every time we work a case for you, we donate a portion of the profits from that case to the charity of your choice...  

 

Learn More

 






join


When you have unanswered questions, We Find Answers®.

We are grateful to have the opportunity to provide you valuable information via our free bimonthly e-newsletter and our unparalleled investigative services.

We take special care to ensure the information we provide you in "The Leeeyzawn" is the latest and most current information available. In this edition we have addressed how using computer forensics can protect your business, and the damage that can be done to victims of eavesdropping.

We want to write about topics that you can use in your business and are interested in. Please e-mail us your topics of interest to leeeyzawn@arkansas-investigations.com.

We encourage you to share our e-newsletter with others in your sphere of influence.

Sincerely,
Your Team at Arkansas Investigations

Using Computer Forensics to Protect Your Business
You know that computers contain a lot of information, much of it mission-critical to your business. You likely house sales data, customer data, inventory management, passwords, proprietary data, research projects, business expansion information, competitor's information, and other sensitive information on your business computers. You can't afford to be without your system, and you certainly can't afford for someone else to get their hands on it. And that is exactly what entices some employees to commit computer fraud.

Case Study: An agency was concerned when they learned that an employee might have accessed the agency's client list and provided, without consent, proprietary information about those clients to an unauthorized party. It was reported to us that the disgruntled employee had been involved in a disagreement with staff over the collection and use of client information. The agency hired us to analyze their network system and confirm whether or not the unauthorized access occurred, and if so who had done it and when. Through our analysis we found information that confirmed the activity and identified who had done it, when, and what specific information had been accessed, as well as additional evidence that the information was being funneled to outside unauthorized personnel who were using the information for their own nefarious purposes. Result: The employee was discharged along with threats of civil lawsuit being made against him/her and the third party if the information was ever disclosed.

When an employee abuses your system, you are a victim. You are robbed of... Read More 
Eavesdropping and Its Victims 
There's an old adage that, "eavesdroppers seldom hear anything good of themselves. " In spite of this saying the practice of eavesdropping dates back to 1487, according to Dave Wilson of Wordorigins.org, and it still a wildly popular practice of obtaining information today.

Many businesses, owners, and attorneys place locks on their doors and security systems on their business to protect their assets from theft, loss, and damage, but consider for a moment if you were being attacked from inside-and without your knowledge! So how do you know if your business is compromised, and what can you do to prevent it?  

Covert listening devices, more commonly referred to as a bug or wiretap, are a combination of miniature radio transmitters with a microphone. The use of bugs, called bugging, allows individuals to eavesdrop, or secretly listen to a conversation, without the other individuals knowledge or consent. While this practice is quite often considered unethical, it is a common surveillance technique used in espionage and police investigations.  

According to Pursuit Magazine, there are several warning signs that your office may have been bugged. Those signs include:  

 

About Us
Arkansas Investigations is a premier investigative agency that provides a wide range of investigative services to legal professionals, businesses and individuals anywhere in the state of Arkansas (plus Oklahoma and Louisiana). We are strong advocates for our clients. We conduct quality investigations and provide clear and concise reports of our findings. Our 35-plus years of hands-on experience and training provide our clients with a reliable work product in which they can have confidence. We go above and beyond the call of duty. Our staff includes a Certified Fraud Examiner (CFE), an experienced legal investigator, a Certified Law Enforcement Instructor (CLEI), a paralegal and a Certified Forensic Computer Examiner as well as a Certified Hacking Forensic Examiner. Our motto is "We Find Answers®" - and that's exactly what we do! Learn more...
Contact Us

reverse logoArkansas Investigations
425 West Capitol Ave, Suite #220
Little Rock, AR 72201.

Office: 501-372-2202
1-501-605-0360 (24 hours)
info@arkansas-investigations.com
www.arkansas-investigations.com
© 2017 Arkansas Investigations, an Over-Flow Productions, Inc. company. All rights reserved.