Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, January 15, 2017

The new century has brought new challenges for small businesses and corporations that haven't been seen before  international espionage, hacking; sophisticated spying at an alarming rate. The team at Brian Blackwell Investigations is prepared to help. From loss prevention, property surveillance and security consulting to cyber-security, privacy and crises management.

Brian Blackwell Investigations works with small businesses, corporations and government agencies to combat against cyber-security threats, intellectual and property thefts. Problems addressed and solutions developed to resolve: hacking, intrusions, disruptions, manipulations, theft of data and identities, and securing information technology infrastructure. Many U.S. companies have fallen victim to such threats virtually unknown just a few years ago. Throughout 2016, multiple high-profile ransomware attacks targeted hospitals and other institutions, which often paid ransoms of tens of thousands of dollars each instead of pursuing even more costly data recovery methods. The explosive growth in devices that make up the Internet of Things (IoT) has also contributed to threats, including a distributed denial of service attack using infected baby cameras and other IoT devices in 2016 that took large portions of the U.S. Internet infrastructure offline. Lax security practices make businesses and corporations of all sizes vulnerable. Cyber attacks are a key roadblock to technological advances that can have a positive societal impact.


Monday, October 26, 2015

Seattle WA TSCM Electronic Bug Detection

Despite the laws designed to protect us from these types of invasions of privacy, electronic bugs and wiretaps are regularly used to spy on people involved in litigation, divorce, sensitive business, and well-to-do individuals. Imagine if all of your conversations with friends, family, business associates, your lawyer, doctor or accountant were being monitored by someone.

In the age of technology we live in, it has become increasingly easy and economical for even the most conservative budgets to be able to afford to purchase and install electronic surveillance devices. These devices can be video or audio in nature and can be and usually are extremely covert in nature. Due to their relative size and intent of being undetected, they are extremely hard for the lay person to recognize, locate and remove.

Even if you are not involved in business, litigation, or divorce, ordinary people have been victimized by criminals and others who "bugged" their home, automobile and workplace, and gained access to telephone data lines using electronic bugs. The police receive too many calls from "unbalanced" people who claim that someone or the government is bugging their home to pay attention to legitimate concerns like yours, and most law enforcement agencies are not properly equipped and trained to conduct an effective sweep. Your phone service provider is also not able to help you. We suggest that you do not call your phone service provider for assistance. This set of circumstances leaves you on your own. That’s were we come in.

To ensure you haven't fallen prey to technical surveillance, Brian Blackwell Investigations conducts professional electronic counter measures to detect covert surveillance eavesdropping devices ("bugs") and hidden cameras that may have been placed in your home, your automobile, or your offices. The removal of which is known as Technical Surveillance Countermeasures (TSCM.)

Technical Surveillance Countermeasures are steps taken to detect and prevent unwanted surveillance. Technical surveillance often takes the form of eavesdropping by bugging a vehicle, home, tapping a phone line, or installing hidden cameras, with the intention of committing corporate espionage, privacy invasion, extortion, identity theft, information theft, or stalking. Being the victim of technical surveillance can endanger your personal safety, and leave you vulnerable to potential financial damages.

Did You Know?

  • A simple modification to your telephone handset can leave the microphone connected all the time allowing anyone to listen in to all conversations in the room
  • A telephone transmitter or recorder which transmits or records all of your telephone conversations may be installed in the phone, the socket or junction box, anywhere on the line, as far back or even inside the exchange
  • A bug may be installed without entering your premises
  • A socket or light switch may be replaced with an identical unit that contains a built in transmitter or SD card recorder, powered by the mains
  • Software is available for phones using the Android and iPhone operating systems that can record all room and telephone conversations, the recordings are then sent by the phones internet connection to a server where the person who has installed it can listen to the recordings on their PC. Copies of text messages, emails and conversations people are having nearby can also sent to the server.

Some Indications That You May Be A Victim Of Bugging

  • Confidential information seems to be getting out to competitor
  • Competitors seem to be just one step ahead all the time
  • Your home or premises have been broken into and very little or nothing was taken
  • Sockets or switches show signs of being moved slightly, i.e.: the wallpaper may be disturbed
  • Various vehicles parked near to your premises, that appear to be empty
  • You hear unusual sounds (crackling, clicks, volume changes) while talking on your phone
  • Repairers or unknown companies turn up to carry out work when they have not been called
  • Furniture or items appear to have been disturbed
  • Interference on your radio or television

Electronic Bug Location and "Debugging"

We use modern, advanced debugging equipment combined with investigative know-how to find bugs that may have been placed by an unsavory competitor, an insecure spouse, greedy family member, criminals.

We will do the job discreetly. No one else needs to know your concerns. All of our cases are handled in a completely confidential manner.

Brian Blackwell Investigations | Seattle, WA

Sunday, May 24, 2015

Comprehensive Background Checks

A new nanny or babysitter, a potential tenant or renter, your child's coach, online dating, prospective business partner  in today's society, there are good reasons for wanting to verify the backgrounds of people engaged in your life. In some situations, not knowing someone's history can have dire legal, financial, and personal impacts. Instant, online background checks have become widely available and are fairly inexpensive, however, they are often quite limited in scope and not always up-to-date. Though admittedly more costly, a thorough investigation conducted by Brian Blackwell Investigations delivers more reliable, accurate and comprehensive results.

Components of our background investigation service includes:
  • Social Security Number (SSN) Trace revealing all current and reported addresses for the last 7-10 years as well as any aliases utilized by a subject
  • Statewide Criminal and Civil Records Checks  conducted according to subject's address history
  • County Level Criminal and Civil Records Checks often times requires hands-searching documents in the actual courthouse of record
  • DMV Records  can reveal more than driving history as they can document an individual's history of substance abuse and/or criminal activity
  • Property Records lists all real property parcels owned by an individual or business, as recorded by county tax assessors statewide
  • Bankruptcy and Lien Records
  • Political Contributions
  • U.S. Securities and Exchange Commission (SEC) Filings
  • Customized and advanced background services are also available

Background checks provide agencies and individuals with extremely important information. However, it is very important to be aware of their inherent limitations. Be aware that there is no such thing as a national criminal records check. There is one "nationwide" criminal database, the FBI database, also known as NCIC (National Crime Information Center) database. The FBI database is not public record and cannot be legally accessed by anyone other than criminal justice agencies. This is one of the reasons why we physically hand-search documents in the actual courthouse of record.

Having handled a wide range of research assignments, Brian Blackwell Investigations stands behind its ability to deliver meticulously thorough background checks in addition to diligently investigating any of your personal matters. We are sensitive to the private nature of these types of investigations and work with our clients to acquire information as quickly, quietly and efficiently as possible. We provide the information you need to protect your financial stability, safety, and most importantly, your family.


Brian Blackwell Investigations | Seattle, WA

Saturday, October 4, 2014

Security Tips

Family Security

Family is at the center of most anyone's universe. Most people would do almost anything for their family, including protecting them from known dangers and harm. Protecting your family becomes increasingly difficult because we live in an open society where we share the same public places as criminals. The only place where we really have any control over our environment is in our home.


Whenever a family member leaves the home, they leave the zone of protection you have created. You should develop a good family security plan to keep your family members reasonably safe once they leave the home. To properly create a family security plan, you must first examine the public routines of each family member and then develop the actions necessary that can protect them from criminals.

A smart way to begin creating a proper family security plan is to talk about different "what if" scenarios with each family member. For example: if this happens, what will I do? When developing a family security plan, you should create safety precautions and protective measures to employ when you use the ATM machine, shop at the mall or walking to your automobile on the street at night should anyone attempt to assault or rob you.

Sidebar: in many cases, the victim is still murdered even though they do precisely what the perpetrator says. Doing exactly what they say doesn't ensure your safety or survival. You may want to develop defensive tactics and prepare to fight back if ever in a deadly situation. Fight for your life!

Security at Shopping Centers and Malls

Even though shopping centers and malls come in different sizes, the one thing they all have in common is a parking lot. You are at greatest risk in parking lots. Criminals can more easily blend in with the rest of us in parking lots. Criminal predators can easily walk by us in parking lots without us knowing it because of the public setting. 

Many shoppers walk to and from their vehicle not aware of the dangers around them because they are consumed by their thoughts. Many crimes at shopping centers and malls occur when shoppers are distracted by fumbling for their car keys and putting shopping bags or children into their vehicle, taking attention away from anyone nearby. You should always have your car key out and ready to unlock your vehicle so you can quickly enter and secure yourself inside your vehicle. You should always think about your safety.

The best defense is awareness. Awareness can allow you to plan ahead and anticipate dangerous situations that might occur. Good planning including selecting safe times to shop and making arrangements not to shop alone if at all possible, and where to park your automobile. Of course, the safest time to shop is during daylight hours, and the best place to park is in high traffic areas and not next to large automobiles.

Visually scan the parking lot for suspicious people before parking and exiting your vehicle and when walking to your vehicle after shopping. You should always enter and exit your automobile quickly and immediately secure your automobile. Look around the area where your automobile is parked before approaching it and retreat inside a store if anyone suspicious is loitering in the area.

  • Be alert to predators in the parking lot
  • Plan when to go and where to park
  • Never get out of your automobile if it isn't safe to do
  • Scan the area around your vehicle as you approach it
  • Enter and exit your automobile quickly and lock the doors
  • Retreat inside a store if anyone looks or acts suspicious


Home Security

Protecting your home and family from criminal intrusion should be high on your list of priorities. The most common threat to anyone's home is burglary. According to the FBI, a burglary occurs every 15 minutes somewhere in the United States.

Burglary isn't always a non-confrontational crime. Sometimes, burglars are caught in the act and attack the person who caught them. Becoming a victim of burglary can be devastating, leaving a person feeling vulnerable and violated. The majority of house and apartment burglaries occur during the daytime when people are at work or school.

Burglaries are normally committed by young males, less than 25 years old, looking for items that are small, expensive and can be easily converted into cash. The favorite items for burglars are cash, jewelry, small electronic devices, and firearms.

Burglars prefer to gain access to a dwelling through an unlocked door or open window. However, statistics show that 70% of burglars use some amount of force to enter dwellings using ordinary household tools like screwdrivers, small pry bars and channel-lock pliers.

Although home burglaries might seem random in occurrence, they actually involve a selection process. The burglar's selection process involves choosing an unoccupied home with the easiest access, the greatest amount of cover and best escape routes.

You can minimize your risk by making your home unattractive to potential burglars. The first step is to "harden the target" - making your home difficult to enter. Burglars generally will avoid a home that requires a lot of effort to enter. The more you "harden the target" the better.

Many burglars enter a home through the back or side doors. Experienced burglars know that the garage door (when connected to the house) is usually the weakest point of entry into a house followed by the back door. Garage doors and back doors provide the most cover for burglars.

To properly secure exterior doors, use high quality Grade 1 locks to prevent twisting, prying and lock picking; use quality deadbolt lock, which has a beveled casing to inhibit the use of channel-lock pliers to shear off lock cylinder pins; use a quality door knob-in-lock set, which has a dead latch mechanism to prevent someone from slipping the lock with a shim or credit card.

  • Use a solid core or metal door for exterior doors 
  • Use a heavy duty deadbolt lock with a 1 inch throw bolt 
  • Use a knob-in-lock set with a dead-latch mechanism 
  • Use a wide-angle peephole on your front door


The weakest point on most doors is the strike plate that holds the latch or lock bolt in place. The average strike plate on a door is secured with only lightweight door frame molding and can be torn away with a firm kick.

You should upgrade to a four screw, heavy duty high security strike plate using three inch wood screws to cut deep into the door frame stud. Use long screws in the door knob lock strike plate and use two long screws in each door hinge for added strength. This will deter most door forced entries.

Because of inherently defective latch mechanisms, sliding glass doors are very vulnerable to being easily forced open from the outside. You can prevent this from happening by inserting a thick wooden dowel or thick stick into the door's track or using track blockers that can be screwed down onto the track (door stoppers.)

Since older sliding glass doors can be lifted off their track somewhat easily, you should install anti-lift devices such as a pin that extends through both the sliding and fixed portion of the door. You can find many locking and blocking devices to prevent a sliding glass door from being lifted or forced open in most any hardware store.

It is wise to place a highly visible alarm system decal and beware of dog decal on sliding glass doors near the door latch. Burglars usually avoid alarm systems and dogs for obvious reasons.

  • Place a blocking device into the track of sliding glass doors
  • Keep the latch in good working condition and properly adjusted
  • Keep rollers in good working condition and properly adjusted
  • Use anti-lift devices on sliding glass doors like through-the-door pins
  • Display visible alarm system and beware of dog decals near the latch

Windows are left unlocked or open more often than doors. An open window seen from the street might be the sole reason for your home to be selected by a burglar. Ground floor windows are susceptible to break-ins for obvious reasons. Upper floor windows become attractive to burglars if they can be accessed from a stairway, balcony, tree or fence.

You should use blocking devices on windows such as track blockers that are screwed down onto the track because windows have latches not locks. A blocking device can prevent a person from sliding the window open from the outside. Through-the-frame pins work well for vertical sliding windows and wooden dowels work well for horizontal sliding windows. It's wise not to allow the window to open more than five inches and it's critical that you make sure that no one can reach inside the window from the outside and remove the blocking device.

In sleeping rooms, window blocking devices must be capable of being easily removed from the inside for safety reasons - to escape a fire - and to comply with fire codes. Employing anti-lift devices are necessary to effectively secure ground level and aluminum windows that slide horizontally.

To prevent the window from being lifted out in the closed position, install screws half way into the upper track of the movable glass panel. As a good deterrent, put highly visible alarm system, beware of dog and other crime prevention decals on ground level window.

  • Secure all windows with blocking devices
  • Allow windows to open no more than five inches
  • Make sure no one can reach inside and remove the blocking device from outside
  • Use anti-lift devices to prevent windows from lifted out
  • Put alarm and beware of dog decals on ground level windows

Lighting

A home that is dark inside at night sends the message to burglars that you are away. Interior lighting is necessary to show signs of activity inside your residence. To deter burglars, you should use light timers. Light timers should be used when you are not at home. They click the light on and off to simulate occupancy. The same light timers can also be used to turn on radios and televisions to further enhance the illusion of occupancy. It is also comforting to enter a lit residence.

Exterior lighting is also important and becomes critical if you have to park in a common area parking lot or underground garage and need to walk to your front door. The purpose of good lighting is to allow you to see if a threat (suspicious person) is lurking in your path. If you can see a potential threat in advance, you have an opportunity to avoid it. Exterior lighting should be bright enough for you to see at least 100 feet. Good lighting is definitely a deterrent against criminals because they don't want to be seen or identified.

Another important area that should be well lit is the perimeter of your home especially at the entryway. Lighting on the front of any property should always be on a timer to establish an appearance of occupancy at all times. Using security lights with infrared motion sensors is a smart way to deter burglars. The heat motion sensor can be adjusted to detect body heat and can be programmed to reset after only one minute.

  • Use interior light timers to show occupancy
  • Exterior lighting should give you 100 feet visibility
  • Use good lighting along the pathway and at your door
  • Use light timers to automatically turn lights on and off
  • Use infrared motion censor security lights

Alarm Systems

Alarm systems definitely have a place in a home security plan and can be very effective if used properly. Alarm systems increase the
possibility of a burglar being caught by the police. Burglars will normally bypass a property with visible alarm decals or signs. Never write your alarm system pass code on or anywhere near the alarm keypad.



Alarm systems need to be properly installed and maintained. Alarm systems should have an audible horn or bell to be effective in case someone does break into your home and should be programmed to automatically reset after only one or two minutes. Alarm systems also can monitor for fire. If you use a central station to monitor your alarm, make sure your notification call list is always up-to-date.

  • Alarm systems can be effective deterrents
  • Alarm systems must be properly installed, programmed, and maintained to be effective
  • Alarm systems need to have an audible horn or bell to be effective and should automatically reset after only 1 or 2 minutes
  • Make sure your notification call list is up-to-date

You should never open your front door when someone knocks unless you know the person. Make sure you have a wide-angle peephole on your door so you can have a visual identification of anyone knocking.

Safes

Having a fire-resistant safe that cannot be easily moved is a smart investment. A home safe is designed to keep the smash and grab burglar, curious children, dishonest babysitters, housekeepers, and nannies from gaining access to important personal property. It's wise to anchor a home safe into the floor or permanent shelving.

Identification

We recommend that you photograph your valuables in their location around your home and make a list of their make, model and serial numbers. This is important for proof when filing an insurance claim. Be sure to safeguard your list.

Keep receipts of items in case you need to prove their value, and photocopy important documents. Keep receipts and photocopied documents in a secure place. Engrave your name on all electronic devices -- TV's, stereos, computers.


© Brian Blackwell Investigations 1998

Brian Blackwell Investigations | Seattle, WA 
Licensed Private Investigator