Active Incident? 24/7 Response →
Witness

Witness Field Notes

Plain-language notes from the work.

What we publish here is the actual material we wish more clients had read before the engagement began. No SEO fluff. No fear-marketing. Real answers to the questions buyers are typing into Google.

For Individuals·8 min read

Romance Scam Recovery: What Forensics Can and Cannot Recover

If someone promised they could recover the money, walk away. Here is what a real forensic investigation looks like — and what it can actually deliver.

Read article →

For Individuals·7 min read

How to Tell If Someone Installed Stalkerware on Your iPhone

If you suspect someone is reading your messages, the apps in the App Store will not tell you. Here is what does.

Read article →

For Individuals·7 min read

Is Your Email Hacked? 10 Signs and How to Verify Forensically

Most people change their password and assume the problem is over. The attacker is usually still there. Here is what to actually check.

Read article →

For Individuals·6 min read

AirTag Stalking: How to Detect One and What to Do

AirTags ping your phone after a few hours of separation from their owner — but only if your phone trusts them. Here is what does and does not trigger an alert, and how to find one that did not.

Read article →

For Individuals·8 min read

Is Your Spouse Cheating Digitally? Forensic Signs vs Paranoia

If you are reading this, the answer is usually yes. Here is what to look for, what to preserve, and what not to do — because the wrong DIY move can destroy your case in family court.

Read article →

Concepts·11 min read

What Does a Digital Forensics Investigation Actually Look Like?

The TV version is wrong, the marketing version is worse. Here is what an actual forensic case looks like from intake to court-ready report.

Read article →

Small Business·10 min read

Small Business Cybersecurity Checklist (Under 50 Employees)

Most small business cybersecurity guides are vendor checklists in disguise. This one is what we actually tell clients to do, in priority order.

Read article →

Small Business·9 min read

Hit by a BEC Scam? The First 48 Hours for Small Businesses

Wire fraud via fake invoice or vendor switch hits small businesses hardest. The recovery window is days, not weeks. Here is the playbook.

Read article →

For Attorneys·9 min read

Can Deleted Text Messages Really Be Recovered for Court?

What recovers, what doesn't, and what your judge will accept. Written for family-law and litigation counsel.

Read article →

For Attorneys·10 min read

Spoliation in Family Law: Sanctions When the Other Side Deletes Digital Evidence

When the other side wipes a phone two days after the preservation letter, you have a case for sanctions. Here is what your forensic expert needs to find and how to present it.

Read article →

Family Office·11 min read

Family Office Cybersecurity: 10 Risks Most Wealth Managers Miss

Most family offices have a CFO running the security program by accident. Here is what they are missing — and what a single incident actually costs.

Read article →

Family Office·8 min read

Sextortion of Executives and HNW Individuals: A Forensic Response Playbook

Paying makes it worse. Posting a public statement makes it worse. Here is what actually works — quietly, quickly, and with evidence preserved for the prosecution that may follow.

Read article →

About the field notes

Quinnlan Varcoe, Founder & CEO

Schedule Your Session

Need a case worked, not an article read?

Direct conversation with Quinn. NDA-protected. Most engagements begin within 48 hours.

Trusted by partners across the practice

DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management
DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management