Part of being a good private investigator is keeping up with the research and trends of fraud and deviant behavior.  The Association of Certified Fraud Examiners (ACFE) produces numerous articles on fraud and fraud prevention.  Recently, I came across a very interesting article by Ryan C. Hubbs, a fellow Certified Fraud Examiner (CFE).  In the [...]

  Instant Communication, Covered Tracks, and Cheating Websites – Cheating Is Now Easier to Hide than Ever. Secret affairs have been breaking marriage commitments as long as lovers have been saying “I do.” However, with the rise of the Internet, having an affair is now as simple as the click of a mouse or the touch [...]

Ray Gilley, the president and lead private investigator of McCann Investigations, a Dallas/Fort Worth private investigation firm, has been proudly awarded a Certified Fraud Examiner (CFE) credential by the Association of Certified Fraud Examiners (AFCE), the world’s largest anti-fraud organization and a leading provider of anti-fraud training and education. To meet the strict requirements established [...]

In part one of this post, I discussed the dangers of the trusted assistant.  I said that, although the trusted assistant is the person that every CEO needs (the right hand that ensures that everything works smoothly), in some cases that same assistant can go afoul and take advantage of the trust placed in him [...]

Executives today would be lost without their trusted assistants who help them manage their lives and stay organized and on track. While most assistants have the best interest of their boss and company in mind, there is a growing epidemic of the bad assistant. A bad assistant has exceptional skills and work ethic yet begins committing [...]

In the last post, I wrote about the warning signs of a problem Chief Information Officer or IT Manager in organizations today.  For a brief review, the signs include, but are not limited to, the following: The Chief Information Officer never takes time off.  As we spoke on before, this does leave the individual looking [...]

The Chief Information Officer or IT Manager has a position like no other in companies today.  Specialized knowledge and skill-set put this person in a position to do great things in today’s business world.  More than ever, companies today depend on the IT department to facilitate almost all areas of the company.  While the Chief Information [...]

Are You about to Hire the Wrong Person? On one late Friday afternoon, I received an email from an employer in Dallas, asking me to do a last-minute digital background check on a potential future employee that the company wanted to hire that very day. It seems that a prior company had been given the task of [...]

What is Network Forensics? Network forensics, or IT forensics, is a field of computer science that involves extracting forensic evidence from computer networks, particularly for use as criminal evidence. The extraction can either be proactive, actively capturing network packets for use as evidence, or it can be from network log files or logged information on [...]

Digital intruders often replace system programs with custom versions. Such programs perform malicious operations, such as monitoring keystrokes or providing remote access to the attacker. These invaders are often difficult and time consuming to detect. To make this process as efficient as possible, McCann Investigators utilize two of the industry’s most respected tools – Nessus [...]