Blog

McCann Investigations is a full service computer forensics and private investigations firms providing a full range of services to law firms, public and private companies and financial services firm in cases such as family law, corporate intelligence, due diligence, embezzlement, fraud, digital debugging, IT Vulnerability Assessments and non compete enforcement

So You’re Worried About the Ashley Madison Hack?

July 27, 2015

This past week another high-profile computer intrusion became public, but this hacking incident has some consumers worrying more than normal. Why is that you ask? Well, the website that was hacked is AshleyMadison.com which markets itself as a dating website for married people. Yes, you read that correctly, the site specifically targets married cu.....

READ MORE >

The Cardinal Rule For The Connected Age

July 6, 2015

Although stealing signs has been commonplace in major league baseball for decades, the type of theft that occurred last year from the Houston Astros computer network appears to be unprecedented in professional sports. Many readers will likely have read the startling news that the Federal Bureau of Investigation is investigating allegations that a member of the St. Louis Cardinals organization h.....

READ MORE >

Best Practices for Non-Compete Agreements

October 30, 2014

Having a non-compete agreement in place doesn't ensure that an employer will be able to enforce it.  Getting the terms of the agreement in place from the beginning are key to being sure that it will hold up in court.  Enforcing a non-compete agreement will no doubt require some sort of legal wrangling and not having the proverbial ducks in a row will not ensur.....

READ MORE >

This Is a Nightmare. Get the CSI Team in Here Now. No no, the Computer Forensics Team. Not the Blood Guys.

October 30, 2014

Open on a panning shot of Florida coastline. Closeup on alligator blinking lazily then slowly submerging into water. Quick flash to water snake swimming towards camera. Cut to sweaty, clearly overworked, office worker typing frantically away at computer. He sighs heavily, flops back in chair, revealing sweat marks under arms, and loosens tie and top button on shirt. He mops his brow with a sogg.....

READ MORE >

Choose a Certified Fraud Investigator to Protect Yourself and Your Property

October 30, 2014

When people think of crimes involving fraudulent documents, they usually think of something like insurance fraud. This kind of crime is usually committed by an individual and does not involve stealing or forging information about anyone other than themselves. With insurance fraud, an insurance claim could be exaggerated, or an accident could be caused on purpose, but few people ever end up bein.....

READ MORE >

Make Forensic Accounting Work Right for You

October 30, 2014

In simplest terms, forensic accounting is the practice of using accounting techniques to investigate embezzlement and fraud, as well as to analyze financial information in legal proceedings. Understanding the full definition of forensic accounting, however, is necessary for those who may want to investigate whether or not some kind of fraud, such as insurance fr.....

READ MORE >

Mobile Investigation – INFOGRAPHIC

October 30, 2014

mccann_infographic_499x790

READ MORE >

What Is Insurance Fraud?

October 30, 2014

Insurance fraud, simply put, is any action that someone takes in order to gain money, advantage, or really anything they are not otherwise entitled to from an insurance agency. Some common actions are arson, form alteration, or simple claim exaggeration. Insurance fraud investigation attempts to stop, catch, and prosecute the .....

READ MORE >

Recycled phones retain their previous owners’ data

October 30, 2014

Retrieve the SIM card. All cell phones require a little removable card called a SIM card.  According to Wikipedia, "A SIM {subscriber identity module or subscriber identification module) is an integrated circuit that securely stores the international mobile subscriber identity (IMSI).  A SIM circuit is embedded into a removable plastic card. This plastic card is called "SIM card" and can be t.....

READ MORE >

Insurance Fraud Gets One Person Money That the Rest Have To Pay For.

October 30, 2014

Insurance fraud is no light matter. In fact, it is the second most costly white collar crime in the United States, right after tax evasion. The biggest problem with insurance fraud is that it is not a victimless crime. If someone succeeds at insurance fraud, everyone else using that insurance company has an increase in their p.....

READ MORE >

McCann is our source for backgrounds, due diligence, and investigations. They are timely, insight.....

Blair Garrou, Managing Director, Mercury Fund
SIGN UP
to our Newsletter:

Latest from the McCann Investigations Blog
So You’re Worried About the Ashley Madison Hack?

This past week another high-profile computer intrusion became public, but this hacking incident has some consumers worrying more than normal. Why is that you ask? Well, the website that was hacked is AshleyMadison.com which markets itself as a dating website for married people. Yes, you read that correctly, the site specifically targets married cu.....

READ MORE

The Cardinal Rule For The Connected Age

Although stealing signs has been commonplace in major league baseball for decades, the type of theft that occurred last year from the Houston Astros computer network appears to be unprecedented in professional sports. Many readers will likely have read the startling news that the Federal Bureau of Investigation is investigating allegations that a member of the St. Louis Cardinals organization h.....

READ MORE

McCann Investigations are accredited members of...