Monthly Archives: February 2015

There is no Run-of-the-Mill or Routine in Good Investigative Work

Ethics is a constant priority at . Our professional reputation among law enforcement officials, government officials, lawyers and international business men remains untarnished. With every case we accept, our ethical pursuit of the truth is highly respected. Our clients never have to question the level of our confidentiality and integrity. They never have to question whether our investigative team has the skills to swiftly address the specifics of their case. Variety is one of the reasons why produces good results. Some private investigators work on capital punishment and other criminal defense cases with defense attorneys. Others investigate questionable insurance claims and overt insurance fraud. Before the term 'no-fault divorce' entered the court system, investigators were often hired to provide evidence of extramarital affairs or other [...]

Investigative Industry More Than 150 Years Old and Growing

Like every other career in America, private investigation has been positively affected by technology. In fact, technology has helped go global, literally. Our reputation and relationships with law enforcement and other investigative professionals now spans several countries. We are extremely proud of that fact. The more worldly we become, the more possible it is to meet the needs of clients with international cases. Because is a very well-known and well-respected firm, attorneys and judges trust out ethics when we provide evidence for the courts. And because of that very polished reputation, attorneys come to us with an immediate comfort level, knowing their clients will be well-served. They trust that we are highly confidential. We get things done. Specialists in computer forensic investigation and on the [...]

Advanced Persistent Threat Threatens Digital Security

The worry over security is at its highest level in history. Corporations and manufacturers have full-time staff and departments fighting to eliminate vulnerabilities and safeguard company secrets and information. Some organizations conduct regularly scheduled computer forensic analysis on employee’s business devices. Forensics consultants are on retainer and computer forensic services are a line item on the budget. Likewise, company issued cell phones are collected and routine mobile phone hack detection and mobile phone spyware detection are conducted. While employees might take advantage of a vulnerability in the system, companies are also concerned with security breaches that are unknown to employees such as spyware being uploaded inadvertently by an employee. The idea of corporate espionage mostly conjures up visions of covert operations to STEAL something – [...]

What DO Private Investigators DO?

It’s not unusual for furious people to call or visit . They aren’t furious with us, but with a situation and that is the reason they are contacting us. And sometimes with that fury comes an intent that we cannot service. For instance, one man recently came in with a situation that had him in a blind rage. He was red in the face and yelling. He knew an employee was stealing from his supply house and he wanted this employee stopped. He wanted us to, “threaten him with his job and intimidate him into confessing publicly.” We let him have his say and then we told him we would not, could not do as he requested. He stopped and told us he thought that [...]

A Date is Such a Little Detail Until an Investigation Hinges on It

The world seems to get smaller every day – and more confusing. With global business and transportation becoming a norm, Americans must become more aware and accepting of different ways of doing things. The liter is more prevalent around the world than the gallon. Measurements are based on the metric system in most countries other than the United States. While these might seem like little things, one very simple, yet critical, difference is that of the format of dates. are very cognizant of the differences because in our line of work, it can really matter. In fact, a date may be a life or death bit of information. Because we conduct so many computer forensic investigations on business devices that conduct transactions in the global [...]

Owners have Options When Business Reviews are Faked

Marketing and PR firms continually tell their clients about the importance of client reviews and testimonials. Good reviews online and on sites like Yelp can mean a thriving business or severely damage the bottom line. That’s why fictitious reviews are a growing problem. First of all, positive reviews bought and posted degrade the credibility of the review sites, so professional sites are on guard against them. And, if detected, will remove them. If the abuse is continual or excessive, the business could also be removed from the review site. So business owners who are solicited by firms that guarantee positive reviews, and a certain number of them, will likely get burned in the end. The other side is the negative reviews and the damage that [...]

Cell Phone Forensics: We’ve Come a Long Way Baby!

When you’re talking cell phone forensics, a cell phone is a cell phone, right? Whoa! Nothing could be further from the truth. The brand or manufacturer is one variable, but so is each model produced. So to say you have an iPhone is only touching the tip of the information that a cellphone expert needs to successfully complete a mobile phone forensic analysis. With the growing number of manufacturers and models, cell phone forensic tools must adapt and evolve as well. Sim card forensics from a year ago are not sim forensics needed in mobile forensic tools today to keep up with the new technology. Of course, professionals on the cutting edge of cell phone investigation maintain not only a library of data mining software [...]

Are You a Targeted Individual for Blackmail

Are you a TI? That is, a Targeted Individual? A Targeted Individual is someone who is illegally or covertly harassed, abused, stalked or spied upon continuously by a group of people, an organized surveillance. Being a Targeted Individual is more than a boyfriend, spouse or colleague who installs cell phone spyware or conducts cell phone surveillance. It is less about following and spying and more about harassment and psychological abuse, potentially physical harm as well. That being said, one of the first steps taken by may be mobile phone hack detection or mobile phone spyware detection. Let me explain using a scenario that is becoming more and more common and compel clients to call . Zach was a prominent real estate executive in a large [...]

Go to Top