Monthly Archives: January 2015

Forensic Data Recovery Reveals the Culprit

When Marcus reflected back on how he felt a few months ago, before his attorney hired a private investigator, his knees felt weak. For a long time, Marcus feared that he might never be able to prove the truth. He feared that he might be unjustly sentenced to a prison term. He worried that he would lose his family and all that he worked for so many years to financially achieve. First, Marcus spent long hours searching for clues. He tried in vain to speak to detectives at the police department. But it seemed that everyone assumed he was guilty long before a trial date was even set. As the weeks rolled by, Marcus became more upset. He was frustrated and felt like he was [...]

Virtual Currency and Bad Guys

Private investigators like consider staying on top of technology one of the requirements of the job. So when the bad guys start a trend of using a new technology, we are ready with investigative strategies to stay in step with them. We do a lot of computer investigation, forensic computer analysis and mobile phone forensics. In our experience, bad guys are trying to move money through services like Bitcoin. Many believe that transactions through these services are undetectable. While tracing the transactions takes extra skill and perseverance, they are not completely hidden. One example is that in order to get funds into the systems, the virtual currency has to actually be purchased. And purchases leave a paper trail. Computer forensics specialists, especially those who are [...]

Background Research Investigations Tell You Who You Are Hiring

The statistics on identity theft coming out are staggering and scary. Individuals are worried about losing control of their lives. Because authorities are overwhelmed with complaints, victims are usually sent away with the directive to come back once they have documentation of the culprit. has helped countless individuals and families get the intel and evidence they need in order to file charges and lawsuits. There is another side of identity theft that is infiltrating business. Applicants and successful candidates are not always who they say they are. References are friends and incriminating information is left out and hidden as well as possible. What is an employer to do? Due diligence is routine in establishing major new partnership, and should be the norm when hiring employees, [...]

So You Wanna Be a Private Eye

All you have to do is Google “become a private investigator” to find all sorts of blogs, books and sites dedicated to showing you how to become your own, self-employed private eye. Trouble is, most of the advice given to prospective investigators involves searching the Internet for leads and practicing following people without detection – and most of the “tips” are based on the old, outdated stereotypes. After decades in the business, knows there is a level of skill, knowledge and resources that separates the professionals from the wannabes. Professional investigators have specialists and experts on call: Personal asset search investigators Divorce asset investigators Child custody investigators Infidelity investigators Handwriting analysis experts Forensic examiners Computer forensics specialists Certified computer examiners Technical Surveillance Countermeasures experts Social [...]

4 Reasons Businesses Should Conduct Technical Surveillance Countermeasures

Sometimes business owners and leadership of businesses can’t believe that their business would be the target of any corporate espionage or illegal activity. But innovative small businesses have become not only a hotbed of technological advances, but the victim of crimes that devastate their enterprise. For that reason, here at , we want every business owner to be aware of the top 4 reasons to conduct Technical Surveillance Countermeasures (TSCM). TSCM is most commonly referred to as bug detection. But TSCM is also used to detect phone tapping devices, listening devices, electronic surveillance equipment and other sorts of spy equipment. Knowing that TSCM is for spy detection, some business owners might immediately say they don’t need these services. But if any of these situations come [...]

Cell Phone Forensics Creates Timeline to Prove Innocence

The smart cell phone is becoming one of the most influential producers of evidence for authorities. has been on the forefront of cell phone forensics since the beginning. As cellular forensics evolves, we stay in step with developments. Locating cellular locations and turning cellular tower triangulation into forensic cellular evidence has become more commonplace and almost a routine in many investigations. Mobile phone analysis to extract data including emails, instant messages and text messages provides evidence, too. The evolution of the technology has continued and now, much of the information in a phone is also stored “on the cloud.” Forensic data analysis by a computer forensic specialist using data extraction software and protocol can produce evidence that is court-worthy. It’s also true that many phones [...]

Computer Forensic Investigations Overwhelm Authorities

In a recent article in The Police Chief, First Sergeant Charles Cohen, of the Indiana State Police identifies the challenges facing authorities in the field of computer forensics. He says that computer forensic investigators, detectives, and prosecutors all have similar lamentations: There is an unacceptable backlog of computers and devices waiting for examination. By the time computers are examined, it is often too late to follow many of the leads that are produced. Most detectives do not understand computer forensics and what it can accomplish to further their investigations. Many computer forensic examiners do not understand the investigation, causing them to overlook relevant information and expend resources needlessly. These are some of the reasons why attorneys and their clients across the nation turn to when [...]

Private Investigators Aid in Fugitive Recovery

A couple of other bail bondsmen had warned Nick about working with the guy. They took the time to explain to Nick that, while this was a high-profile case, which would obviously provide Nick's business with a lot of attention, the bail was astronomical. And along with that point, the client, a banker named McMann, had access to loads of cash and would likely be a serious flight risk. But Nick was new to the business and hungry for publicity. He knew that McMann would leave the jail wearing an ankle bracelet for house arrest so Nick trusted that McMann would have little opportunity to skip bail. Nick ignored the warnings from others and put up the cash for McMann's bail. Sure enough, the seasoned [...]

Today’s Investigative Skills

Unfortunately, some people continue to hold onto old stereotypes. Uninformed members of the general public still envision a private investigator as a trench coat-wearing figure, hiding behind a newspaper in a motel lobby. Of course, more informed members of the community, those who actually stay in touch with the times, know better. They not only know, they deeply respect the fact that many private investigators are amazingly talented researchers. We have many resources at our fingertips. We also have the ability to think fast on our feet. The investigators in this firm are all of those things plus a lot more. Intellectually, we are at the top. At , we take great pride in our skill sets and our track record. Most of the time, [...]

Go to Top