McCann White Papers & Case Studies

As subject matter experts, McCann Investigations provides clients with the latest in Private Investigations techniques and Computer Forensics tools. McCann is a one source solution for full scale investigations that encompasses multiple variances and result in complete and comprehensive gathering of facts and evidence.

From contentious divorce to embezzlement and fraud, learn how McCann can help.

You’re In the AshleyMadison Database: Guilty Until Proven Innocent

As we continue covering the high-profile hacking incident involving the theft of the AshleyMadison user database by hackers, we’ve entered a new phase now that the database of user names has been released. This phase involves individual users defending themselves against allegations of their involvement and use of the service. Marriages, careers, relationships and reputations hang in the balance…READ MORE

So You’re Worried About the Ashley Madison Hack?

This past week another high-profile computer intrusion became public, but this hacking incident has some consumers worrying more than normal. Why is that you ask? Well, the website that was hacked is AshleyMadison.com which markets itself as a dating website for married people. Yes, you read that correctly, the site specifically targets…READ MORE

The Cardinal Rule For The Connected Age

Although stealing signs has been commonplace in major league baseball for decades, the type of theft that occurred last year from the Houston Astros computer network appears to be unprecedented in professional sports. Many readers will likely have read the startling news that the Federal Bureau of Investigation is investigating allegations that a member of the St. Louis Cardinals organization…READ MORE

Ashely Madison Cyber Extortion: Are you about to be blackmailed?

The day that you hoped wouldn’t come has arrived. The user database from the Ashley Madison hack has been released by the hacker group Impact Team that obtained the user data from www.ashleymadison.com – a website specializing in facilitating affairs for married people…In a nearly immediate and unsurprising move, media outlets themselves have begun searching the data dump looking for persons of interest…READ MORE

White Paper – Married, But Dating: Rise of Online Affairs, A Private Investigators Insights

In today’s world Infidelity and affairs are a growing phenomenon. According to firsttoknow.com most men and women, 74% and 68% respectively, would cheat if they knew they wouldn’t get caught. A survey from August 2012 found that 66 percent2 of people think infidelity is most likely to happen at a work-related event. This has a significant impact on families and lives in the US…READ MORE

White Paper – Top 5 Actions to Take if Voter Fraud is Suspected

There are very few activities that are as important to the American way of life as the integrity of the election process. Those who manage elections are entrusted by the citizens of our nation with ensuring that elections are handled with the utmost…READ MORE

White Paper – Digital Intellectual Property Theft: Protecting your Organization from Potential Attacks

This paper explores the complexities of digital intellectual property. The sophistication of cyber assaults has increased at alarming rate allowing hackers to steal intellectual property from individuals and small companies, to large companies with a significant global presence. Threats come from not only state- sponsored cybercriminals, but also from internal employees. Companies must look at securing their data from the view point of a hacker, rather than a company trying to protect its assets.
READ MORE

Case Study: Mobile Device Forensics in Texting and Driving Cases

Mobile devices have become the main communication device used with many people preferring to text rather than have a phone conversation. Texting, and other forms of distracted driving such as talking on the phone or surfing the web…READ MORE

White Paper: The Digital Divorce

In 2009, Facebook was listed as a contributing factor to 20% of all divorces in the United States. It was also reported that in 2011 social networking was a factor in about one-third of divorces in the United Kingdom…READ MORE

White Paper: Allegations of Child Pornography in the Workplace

This paper discusses the very serious allegations of possession of child pornography in the workplace and how managers can best deal with the allegations and effect an in depth investigation. Due to the gravity of this type of allegation, the proper steps must be taken in order to ensure that managers conduct sound investigations in order to potentially damaging civil or criminal liability.
READ MORE

White Paper – Best Practices to Mitigate Non-profit Fraud

Non-profit Organizations have a wonderful history in our country and are an integral part of the American (and the world’s) social safety net. Studies suggest there are over 1.5 million not for profit charitable organizations in the United States and that Americans give these groups more than 300 billion dollars… READ MORE

The best time for a company to implement or fix inadequacies in their non-compete agreements is BEFORE an issue is raised or litigation needs to be filed. The potential damage on an otherwise healthy business… READ MORE

Case Study – Hire a Licensed IT Security Professional

Do you really know your IT person? This individual has access to you network and there is the potential for serious network breach and data loss. There are no licensing requirements IT security professionals.
READ MORE

Case Study – Smart Phone Deleted Data Recovery

Although data has been deleted from a smart phone, often that data is recoverable. If recovered by a licensed computer forensics expert, this data is admissible in court cases. READ MORE

Case Study – Mobile Device Forensics in Texting and Driving Cases

Texting and driving is the number one cause of death for teenagers and many drivers admit to texting while driving. READ MORE

Case Study – The Risks of Incomplete Background Investigations in Partnerships

Partnerships in businesses are formed with the intent of benefiting both partners. However, an incomplete background investigation can put the business at risk. A comprehensive background investigation of a potential partner can prevent catastrophe. READ MORE

Case Study – Cyber Stalking and Spyware in Divorce Cases

Warring spouses are embracing technology in divorce cases. Spyware and key loggers are relatively inexpensive and easy to install for even the most novice computer user. READ MORE

White Paper – The Rise of the Online Affair, A Private Investigator’s View

Technology has given rise to the online affair. If there is infidelity occurring, it is taking place on computers, laptops and especially smart phones. READ MORE

White Paper – The Unchecked Power of the Senior Most IT Professional

The Senior Most IT Professional has an atypical power structure that differs from any other professional in his or her class. The CEO is constantly scrutinized by the shareholders, the CFO is overseen by a 3rd party audit committee, and the COO is under frequent discussions with the CFO and CEO. READ MORE

White Paper – Victims of Identity Theft Should Consider Hiring a Private Investigator

Identity Theft is a crime that has been around for a long time, but has only in recent decades gotten out of control. Looking toward the future, it seems that this crime will continue to be on the forefront of expanding criminal enterprise. READ MORE

White Paper – Digital Debugging: What is Spyware and How is it Detected and Prevented

If one heard the phrase “my phone is bugged” ten or fifteen years ago, the first image that would come to mind would be a scene from some 1980s movie in which the main character discovers a recording device attached to his landline phone socket. READ MORE

White Paper – An Insurance Overview

Several companies rely on Cyber Insurance to minimise their risk as company. While cyber insurance helps offer an extra layer of defense in a company’s robust cyber security program, it is not a substitute for managing the company’s cyber risk.

The Cost of Data Breach for Companies

In 2011, the average cost to business owners per record compromised was $1941, almost $200 per record. At that rate a lost laptop, cyber liability attack, rogue employee hack or data breach to a company storing 5,000 records could mean up to $1,000,000 in legal, reporting & remediation expenses, or more.

White Paper – Awareness of Cyber Security for Small Businesses

Small and medium-size businesses, totalling more than 28.2 million organisations, make up for 99.7 percent of all U.S. employers and create over 60 percent of all new U.S. private sector jobs. They also produce over 47 percent of the country’s Gross National Product1. When looking at the SMB sector as a whole, it’s easier to understand the importance of a healthy and secure environment business environment.

White Paper – Modern Eavesdropping

Eavesdrop is originally a noun pointing to the water dripping off the eaves of a building and the space between the wall and the dripping. By the early 1600s, to eavesdrop actually meant to stand in the eavesdrop of a house with the intent to hear conversations within and was criminalised. This is the first time the term “eavesdropping”1 was legally acknowledged.

White Paper – Physical and Cyber Spyware

From Flash Drive Cufflinks in Gold Casing, that cost only $50 and can help you smuggle in malware or surveillance software to spy coins that can transport micro SD cards and covert key-chain or button video cameras. Sure they look like toys for children, but what if someone in a sensitive position actually used them?

White Paper – The Ease of Hiring a Hacker

The ease of hacking can be showcased by the fact that if someone searched for “hiring hackers” on Google, the first page of the search results usually displays at least 4, sometimes 5 niche websites selling professional hacking services, 3 or 4 articles explaining the process of hiring a hacker online for personal “projects” and maybe one referring to various trends on the cyber security market, involving hackers. The same goes for similar keywords like “hackers for hire”, “professional hacker”, “hire a hacker”.

White Paper – Can Spyware be Disguised within Emails, Social Media, Web Chats

Emails, social media, web chats and other methods of communicating online are now one of the most used aspect of internet for users. To put this into perspective in 20151, out of the total world population of 7.2 billion, 3.01 billion use the internet and 2.01 billion of them have active social media accounts i.e. approximately 30% and 3.65 billion i.e. 51% are mobile users. This makes 30-51% connected users vulnerable to spyware and phishing online.

White Paper – What Are Common Techniques For The Invasion of Privacy For Individual

Invasion of privacy is majorly on it’s way up. An annual study of internet security vulnerabilities released in 2011, showed that mobile vulnerabilities1 nearly doubled, increasing by 93% in 2011, with a particular rise in threats targeting the Android operating system. It is estimated that worldwide mobile phone fraud will reach $40 billion2 in a few years. This trend is certainly not limited to mobiles, it has also been seen in tracking vehicle GPS.

Financial Sector Security

McCann Investigations understands the need to protect the different sensitive sectors of the nation’s infrastructure. With decades of experience in digital security and investigations, McCann experts have seen one sector that presents the most susceptibility to attacks that would affect the average American: the financial and banking sector. The threats to this sector are diverse and ever changing. Bank operators need to stay informed of all emerging trends and threats to their sector.

Food Defense: What It Is, Why We Need It, and Where It’s Going

There is almost no other industry that affects more people than the nation’s food supply. For the purposes of this discussion, food includes all commercially produced consumables (i.e. food, water, beverages, pharmaceuticals). In this paper, I will give an overview of security issues facing the food industry and talk a bit about the idea of “food defense.” READ MORE

Healthcare Facility Safety

Unlike other types of sensitive facilities, the security needs of healthcare facilities are unique in that the facilities are generally very open public facilities. They’re also quite common throughout all different types of communities. From government-funded county hospitals to enormous metropolitan medical centers to suburban and rural clinics; healthcare facilities are literally found everywhere. READ MORE

White Paper Laws Affecting Critical Infrastructure

Keeping up with changes in law and regulations is a multifaceted task that includes not only reading and digesting the statute as written, but also studying the legal implications and impacts to our customers and us. READ MORE

EXTENSIVE LIBRARY of RESOURCES

McCann continually engages the important topics that are most relevant to our clients.  McCann publications provide insight and information to our clients with our white papers, guides and case studies.  All publications are available in iTunes, Paperback, or FREE digital download.  

VIEW THE RESOURCES LIBRARY