Police Magazine Logo
MenuMENU
SearchSEARCH

TrueActive Monitor 5.0

TrueActive Monitor, true to its name, monitors all PC activities on a computer it's been installed on, including any programs running; keystrokes made; and files altered, created, deleted, moved, or renamed.

September 1, 2004
TrueActive Monitor 5.0

 

4 min to read


Last month I told you about forensic software that helps you find out how criminals have already used their computers. This month, let's look at a product from TrueActive Software that allows you to conduct live PC surveillance to find out how people are using their computers as they act. It's called TrueActive Monitor 5.0, or "TAM."

This Windows-based computer monitoring software used to be called WinWhatWhere Investigator. The company changed the name of the software (as well as the company name) to TrueActive due to some confusion. Name change or not, the software comes with a successful law enforcement track record over the past five years and, at about $100 for a license, it's affordable enough for most agencies.

Ad Loading...

TrueActive Monitor, true to its name, monitors all PC activities on a computer it's been installed on, including any programs running; keystrokes made; and files altered, created, deleted, moved, or renamed. In fact, its "live monitoring" will let you "see" screen captures by activating its customizable setup where you can set screen capture periods anywhere from once every second to once a day.

Another tool in TrueActive's setup bag of tricks is stealth e-mail. Want to be notified of an action or event that you want to watch happen? Just set the stealth e-mail to send a message indicating that activity to any valid e-mail recipient via the Web. The data can be sent whenever an Internet connection is made or on a timed basis. Just remember the obvious: the PC you're monitoring must have e-mail access first if TrueActive is going to secretly notify you.

Other options include administrative password protection, reporting modules, choice of a user-defined or pre-defined selection list of activities to monitor, Web page password capturing, and video capturing if a camera is attached to the computer.

Additionally, if the site you are monitoring is networked, TrueActive has a solution for you. Its "network manager" permits you to install, monitor, edit the setup, and start and stop monitoring remotely with a simple-to-understand user interface that indicates the status of each program installation as well as the PC's name and who is logged on to it.

So when you find yourself forced to work within a foreign I.T. department, you won't necessarily have to visit the PC you want to monitor. It can be handled remotely, if the appropriate directory services are in place, from anywhere within its network cloud. The significant benefit with this feature is the fewer people involved with your surveillance, the better.[PAGEBREAK]

Ad Loading...

Data collected by TAM can be stored wherever you feel is appropriate. If you want to use the local drive, go ahead. But remember, a curious user may discover files if you leave them there. A better solution in a networked environment would be to store files on the server where they can be protected from prying eyes using Windows' own security features. Or, you may also decide you don't need to store files at all. In that case, TAM's setup routines will allow you to automatically delete after a set period of time between one day and 30 months. It also allows you to determine an archiving period if one is appropriate for the work you are conducting.

Data collected from the monitored computer is stored in TAM's database in proprietary format. The reporting module has tools allowing compression, conversion, and searching of data with a simple point and click. You may also export items from the reporting screens into text files, html documents, and pictures. TAM also provides you the ability to print out copies of the data reports.

Recently, there has been more and more discussion about privacy in the work place. If you're using TAM to monitor employees' computer habits at work this can be a sticky subject.

In California, the legislature attempted to pass a law that would equate the use of a work computer with using a work telephone, on which employers may not monitor employees' conversations. I don't agree with the premise that they are the same. Although telephone technologies are evolving rapidly, they are not capable of the same functions as a PC. In the end, the governor at the time agreed and vetoed the bill. This is a complex issue and needs much discussion and thought before we establish a standard.

If you believe using this product is a violation of employees' privacy, you can program TrueActive Monitor to display a splash screen or banner page to the user and customize the message to fit the guidelines set by your agency. If nothing else, a disclaimer would certainly mitigate any claims of, "I didn't know I was being watched," or, "They violated my privacy rights." In either case, until a court of law decides the privacy implications of monitoring software, use common sense when using the tool and ask your local prosecuting attorney for his or her opinion on its admissibility.

Ad Loading...

TrueActive Monitor is a good solution and possibly a preemptive tool to the growing problem of computer misuse. It might offend some because of its "Big Brother" aspect, but it can certainly help you determine what you're dealing with. Whether it's a criminal situation or an employee who has way too much time on his or her hands, TrueActive Monitor is watching.

Bob Davis supervises the San Diego Police Department's computer lab. He has 26 years of experience on the force.

Subscribe to our newsletter

More Technology

Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →
Ad Loading...
Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

A police department’s guide to fleet management and vehicle health

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
Ad Loading...
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →
Promotional graphic for Patrolfinder featuring a police chief’s headshot inside a circular frame alongside a police SUV in the background. The headline reads: “Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture.”
SponsoredMarch 17, 2026

Built for Patrol: How One Police Chief Fixed Communication, Boosted Visibility, and Changed the Culture

Patrol work hasn’t changed—but the expectations on officers have. See how one police chief helped officers get the right information at the right time, improve patrol visibility, and strengthen trust without adding complexity or surveillance. This real-world story shows how patrol-driven technology can make the job safer, smarter, and more effective—starting on day one.

Read More →
Back small device with headline ATD Gunshot Detection System and a logo for Acoem set against a tinted blue background image of a large city.
TechnologyFebruary 25, 2026

Acoem ATD to Showcase 96-Attribute Acoustic Intelligence Engine for Gunshot Detection

Unlike legacy gunshot detection architectures that require multiple sensors arranged in fixed meshes, Acoem ATD localizes threats with a single sensor by analyzing both the muzzle blast and the ballistic shockwave of a projectile.

Read More →
Ad Loading...
Image of a persons hands on keyboard of laptop with screen that displays multiple images from security cameras
TechnologyFebruary 11, 2026

Genetec Adds New Capabilities for Security Center SaaS Users

Genetec has launched new investigation capabilities in Genetec Security Center SaaS to reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments.

Read More →