White Papers

McCann White Papers & Case Studies

As subject matter experts, McCann Investigations provides clients with the latest in Private Investigations techniques and Computer Forensics tools. McCann is a one source solution for full scale investigations that emcompass multiple variances and result in complete and comprehesive gathering of facts and evidence.


From contentious divorce to embezzlement and fraud, learn how McCann can help.


White Paper - Top 5 Actions to Take if Voter Fraud is Suspected

There are very few activities that are as important to the American way of life as the integrity of the election process. Those who manage elections are entrusted by the citizens of our nation with ensuring that elections are handled with the utmost...READ MORE


White Paper - Digital Intellectual Property Theft: Protecting your Organization from Potential Attacks

As digital technology continues to advance, so do the tactics used by cyber criminals. Many experts agree that digital intellectual property (IP) theft is on the rise – the United States Department of Commerce recently estimated that stolen IP could cost companies...READ MORE


Case Study: Mobile Device Forensics in Texting and Driving Cases

Mobile devices have become the main communication device used with many people preferring to text rather than have a phone conversation.  Texting, and other forms of distracted driving such as talking on the phone or surfing the web...READ MORE


White Paper: The Digital Divorce

In 2009, Facebook was listed as a contributing factor to 20% of all divorces in the United States. It was also reported that in 2011 social networking was a factor in about one-third of divorces in the United Kingdom...READ MORE


White Paper: Allegations of Child Pornography in the Workplace

Although there are many potentially sensitive topics and issues that fall into the rubric of security or human resources managers’ responsibilities, there is none more radioactive than an allegation of child pornography being seen or found in the workplace...READ MORE


White Paper - Best Practices to Mitigate Nonprofit Fraud

Nonprofit Organizations have a wonderful history in our country and are an integral part of the American (and the world’s) social safety net. Studies suggest there are over 1.5 million not for profit charitable organizations in the United States and that Americans give these groups more than 300 billion dollars... READ MORE


The best time for a company to implement or fix inadequacies in their non-compete agreements is BEFORE an issue is raised or litigation needs to be filed. The potential damage on an otherwise healthy business... READ MORE


Case Study - Hire a Licensed IT Security Professional

Do you really know your IT person? This individual has access to you network and there is the potential for serious network breach and data loss. There are no licensing requirements IT security professionals. READ MORE


Case Study - Smart Phone Deleted Data Recovery

Although data has been deleted from a smart phone, often that data is recoverable. If recovered by a licensed computer forensics expert, this data is admissible in court cases. READ MORE


Case Study - Mobile Device Forensics in Texting and Driving Cases

Texting and driving is the number one cause of death for teen agers and many drivers admit to texting while driving. READ MORE


Case Study - The Risks of Incomplete Background Investigations in Partnerships

Partnerships in businesses are formed with the intent of benefiting both partners. However, an incomplete background investigation can put the business at risk. A comprehensive background investigation of a potential partner can prevent catastrophe. READ MORE


Case Study - Cyber Stalking and Spyware in Divorce Cases

Warring spouses are embracing technology in divorce cases. Spyware and key loggers are relatively inexpensive and easy to install for even the most novice computer user. READ MORE


White Paper - The Rise of the Online Affair, A Private Investigator's View

Technology has given rise to the online affair. If there is infidelity occurring, it is taking place on computers, laptops and especially smart phones. READ MORE


White Paper - The Unchecked Power of the Senior Most IT Professional

The Senior Most IT Professional has an atypical power structure that differs from any other professional in his or her class. The CEO is constantly scrutinized by the shareholders, the CFO is overseen by a 3rd party audit committee, and the COO is under frequent discussions with the CFO and CEO. READ MORE


White Paper - Victims of Identity Theft Should Consider Hiring a Private Investigator

Identity Theft is a crime that has been around for a long time, but has only in recent decades gotten out of control. Looking toward the future, it seems that this crime will continue to be on the forefront of expanding criminal enterprise. READ MORE


White Paper - Digital Debugging: What is Spyware and How is it Detected and Prevented

If one heard the phrase "my phone is bugged" ten or fifteen years ago, the first image that would come to mind would be a scene from some 1980s movie in which the main character discovers a recording device attached to his landline phone socket. READ MORE



We use McCann as our investigators for complex situations that require the highest level of confi.....

Karl Oswald, CEO, Jackrabbit Steel Products, Inc.
to our Newsletter:

Latest from the McCann Investigations Blog
Best Practices for Non-Compete Agreements

Having a non-compete agreement in place doesn't ensure that an employer will be able to enforce it.  Getting the terms of the agreement in place from the beginning are key to being sure that it will hold up in court.  Enforcing a non-compete agreement will no doubt require some sort of legal wrangling and not having the proverbial ducks in a row will not ensur.....


This Is a Nightmare. Get the CSI Team in Here Now. No no, the Computer Forensics Team. Not the Blood Guys.

Open on a panning shot of Florida coastline. Closeup on alligator blinking lazily then slowly submerging into water. Quick flash to water snake swimming towards camera. Cut to sweaty, clearly overworked, office worker typing frantically away at computer. He sighs heavily, flops back in chair, revealing sweat marks under arms, and loosens tie and top button on shirt. He mops his brow with a sogg.....


McCann Investigations are accredited members of...