Insider Insights: Navigating the Shadows with Covert Results2024-02-28T16:25:48+00:00

INSIDER INSIGHTS

Navigating the Shadows with Covert Results

School Security

On March 27, 2023 the city of Nashville changed forever. An unspeakable and terrible tragedy occurred when a coward entered the Covenant School located at 33 Burton Hills Blvd in Nashville, Tennessee and murdered six innocent people, three of them were children. Evelyn Dieckhaus, Hallie Scruggs and William Kinney, all 9 years old and three adults; Cynthia Peak, Katherine Koonce, and Mike Hill are the six names that will forever be etched in Nashvillians. What a sad day! Covert Results was called to assist in preparation and planning of the security for the celebration of life for Hallie Scruggs and future armed security at the school.

April 5th, 2023|Security|

Successful Surveillance Operations

Your coach was right - you must be ready for the ball before it reaches your glove. It's easy to overlook, but having a plan of action can help make sure that no matter what comes your way, you will handle it competently and decisively. When playing baseball or softball this means knowing whether to simply throw to first or turn a double play; when surveying an area, understanding ahead-of-time what objectives are hoped to be achieved from the information collected ensures everything runs smoothly upon execution.

March 22nd, 2023|Surveillance|

How to Stay Safe on Spring Break

Spring Break 2023 is upon us and everyone is flocking to warmer weather to catch some sun and a much needed break. At Covert Results we have compiled a list of the top 9 tips to keep you and your family safe while traveling on spring break vacation this year. Many seem basic and “no brainers” but sometimes it’s the common sense stuff that goes out the window when we are trying to have fun. 

March 15th, 2023|Armed Security|

How Female Private Investigators Excel

Covert Results was founded by Robert Young in 2018, but many people and clients do not know that his mother-in-law (yes you read that correctly) is actually his business partner. She was a Metro Nashville Police Detective for more than 30 years and is an expert in many fields when it comes to anything law enforcement related. Jeannine is always willing to jump in, never scared to go anywhere or do anything when it comes to investigations. 

In the beginning…

March 8th, 2023|Private Investigator|

Are There Good Hackers?

Time is precious. Time is money. Time affects everything that we do. So how do you feel when a hacker targets you and your precious time and interrupts that time by attempting to hack into your business and personal life? And if the hacker is successful and actually compromises your data then there is nothing you can do…or is there?

So what is a hacker and where did that even come from? In the 1960s, 'hacker' emerged as a designation for an individual with expert programming knowledge who could craft highly efficient code; they had a knack for "hacking away" superfluous instructions and streamlining programs. Basically a guy cut some corners and boom…a hacker was born.

March 2nd, 2023|Cybersecurity|

How To Conduct Surveillance

Surveillance is gathering any source of evidence for an investigation, or as we like to call it; human intelligence gathering. The (3) three main types of surveillance that private investigators utilize are: surveillance in the vehicle, on foot, and surveillance from remote cameras.  

Before we dive deep into our story on surveillance, we want to ask you a question. Do you know who “Karen” is? Karen is a slang term for a white woman perceived as entitled or demanding beyond the scope of what is normal, this person is usually the one asking to speak with the manager. It’s now a trend on social media; where every entitled person people meet, is referred to as Karen.

So, if you’re a private investigator what do you do when you’re sitting on a public roadway and Karen comes up to you and accuses you of stalking? 

February 23rd, 2023|Surveillance|

Catfish Task Force

A catfish is a person who sets up a false or fake profile on a social network or dating site for the purpose of deception and fraud. Generally speaking, the goal of the person who is creating the fake account— known as the catfish, is financial gain. 

Storytime…

In a recent sextortion blog posted by Covert Results, a lot of people got interested and reviewed the blog. We had multiple calls with individuals admitting that sextortion had happened to them. We know this is a problem all across the world, with AI and technology getting a lot better. People have to be more cautious about what kind of information they’re putting out on the internet.

February 16th, 2023|Cybersecurity, Private Investigator|

What’s Your Plan?

Super Bowl LVII is nearing, where the Philadelphia Eagles are going to face the Kansas City Chiefs. This is going to be a great match up! These two teams have been planning all year — they play regular season games, play and win play off games and now only two are left for the Super Bowl, the grand finale! 

If you’re a business owner and you’re not feeling prepared, you should plan ahead just like a professional team. Do better; plan better, and prepare with armed security. Planning ahead includes: taking a look at your security budget and potentially hiring armed security for your event, venue, building, business, or personal protection.

February 8th, 2023|Security|

Drugs or Children?

According to the National Center for Drug Abuse Statistics (NCDAS), almost 32 million people (11.7% of the population) were actively using drugs as of 2021, with marijuana, prescription stimulants, and methamphetamines as the most popular drugs of choice. 

The US drug market on average spends over $100 billion annually on drugs.

In another study, funded by the National Institutes of Health, it’s found that 10% of US adults have had a drug use disorder at some point in their lives.

February 1st, 2023|Private Investigator|

How To Prevent Spear Phishing

Spear Phishing is a type of phishing attack that targets people through malicious emails. It is more of an attack on a specific person as opposed to regular phishing emails that seem to be less sophisticated and more of a broad net. This typically targets high net-worth individuals, companies, and organizations – where a group of hackers constantly attempt to gain access to their networks and important information.

January 25th, 2023|Cybersecurity|

Categories

Our Services

Go to Top