Bug Sweeps

  • Permalink Gallery

    International Investigators on the Case for Large and Small Clients

International Investigators on the Case for Large and Small Clients

Since 1960, International Investigators has proudly served as a professional helpmate to all types of cases. We have worked on numerous cases involving government agencies, municipalities, insurance companies, investors, business owners, bankers and bail bondsmen.

More often than not, we can track down the guy guilty of employee embezzlement for thousands of dollars. We can even find offshore bank accounts, hidden assets and even missing assets. We can prove insurance fraud in many cases involving false claims made to insurance companies.

But some private citizens might assume that our fact-finding service is set aside only for those with deep pockets. That assumption could not possibly be farther from the truth.

Our firm is filled with a unique mix of investigators with all kinds of backgrounds. Some are [...]

Investigative Industry More Than 150 Years Old and Growing

Like every other career in America, private investigation has been positively affected by technology. In fact, technology has helped International Investigators go global, literally. Our reputation and relationships with law enforcement and other investigative professionals now spans several countries. We are extremely proud of that fact. The more worldly we become, the more possible it is to meet the needs of clients with international cases.

Because International Investigators is a very well-known and well-respected firm, attorneys and judges trust out ethics when we provide evidence for the courts. And because of that very polished reputation, attorneys come to us with an immediate comfort level, knowing their clients will be well-served. They trust that we are highly confidential. We get things done.

Specialists in computer forensic investigation [...]

Advanced Persistent Threat Threatens Digital Security

The worry over security is at its highest level in history. Corporations and manufacturers have full-time staff and departments fighting to eliminate vulnerabilities and safeguard company secrets and information.

Some organizations conduct regularly scheduled computer forensic analysis on employee’s business devices. Forensics consultants are on retainer and computer forensic services are a line item on the budget.

Likewise, company issued cell phones are collected and routine mobile phone hack detection and mobile phone spyware detection are conducted. While employees might take advantage of a vulnerability in the system, companies are also concerned with security breaches that are unknown to employees such as spyware being uploaded inadvertently by an employee.

The idea of corporate espionage mostly conjures up visions of covert operations to STEAL something – ideas, clients, [...]

Are You a Targeted Individual for Blackmail

Are you a TI? That is, a Targeted Individual?

A Targeted Individual is someone who is illegally or covertly harassed, abused, stalked or spied upon continuously by a group of people, an organized surveillance.

Being a Targeted Individual is more than a boyfriend, spouse or colleague who installs cell phone spyware or conducts cell phone surveillance. It is less about following and spying and more about harassment and psychological abuse, potentially physical harm as well. That being said, one of the first steps taken by International Investigators may be mobile phone hack detection or mobile phone spyware detection.

Let me explain using a scenario that is becoming more and more common and compel clients to call International Investigators.

Zach was a prominent real estate executive in a large [...]

So You Wanna Be a Private Eye

All you have to do is Google “become a private investigator” to find all sorts of blogs, books and sites dedicated to showing you how to become your own, self-employed private eye. Trouble is, most of the advice given to prospective investigators involves searching the Internet for leads and practicing following people without detection – and most of the “tips” are based on the old, outdated stereotypes.

After decades in the business, International Investigators knows there is a level of skill, knowledge and resources that separates the professionals from the wannabes.

Professional investigators have specialists and experts on call:

Personal asset search investigators
Divorce asset investigators
Child custody investigators
Infidelity investigators
Handwriting analysis experts
Forensic examiners
Computer forensics specialists
Certified computer examiners
Technical Surveillance Countermeasures experts
Social media engineers

Extensive data bases that are costly and only [...]

  • Permalink Gallery

    4 Reasons Businesses Should Conduct Technical Surveillance Countermeasures

4 Reasons Businesses Should Conduct Technical Surveillance Countermeasures

Sometimes business owners and leadership of businesses can’t believe that their business would be the target of any corporate espionage or illegal activity. But innovative small businesses have become not only a hotbed of technological advances, but the victim of crimes that devastate their enterprise.

For that reason, here at International Investigators, we want every business owner to be aware of the top 4 reasons to conduct Technical Surveillance Countermeasures (TSCM). TSCM is most commonly referred to as bug detection. But TSCM is also used to detect phone tapping devices, listening devices, electronic surveillance equipment and other sorts of spy equipment.

Knowing that TSCM is for spy detection, some business owners might immediately say they don’t need these services. But if any of these situations come [...]

Cell Phone Forensics Creates Timeline to Prove Innocence

The smart cell phone is becoming one of the most influential producers of evidence for authorities. International Investigators has been on the forefront of cell phone forensics since the beginning. As cellular forensics evolves, we stay in step with developments.

Locating cellular locations and turning cellular tower triangulation into forensic cellular evidence has become more commonplace and almost a routine in many investigations. Mobile phone analysis to extract data including emails, instant messages and text messages provides evidence, too.

The evolution of the technology has continued and now, much of the information in a phone is also stored “on the cloud.” Forensic data analysis by a computer forensic specialist using data extraction software and protocol can produce evidence that is court-worthy. It’s also true that many [...]

Investigators Save New Business

You might be surprised how many small business owners’ attorneys contact International Investigators. It’s not just the multi-million dollar enterprises who have to be on guard against corporate espionage and theft by employees. Take this case, for example:

When Mitch and his business partners moved from the West Coast to open a second decorative concrete business in the Midwest, they obviously hoped the new venture would be as successful as the first. But none of them were prepared with just how quickly the business grew. Mitch's finishing techniques were unlike any others. The “wow” factor was immediate. Suddenly the new business was the hot topic among many well-known developers and architects.

But that instant popularity prompted jealously among competitors. Unidentified concrete businesses seemed to be trying [...]

  • Permalink Gallery

    Business Espionage is Not Limited to High Tech and Multi-Million Dollar Firms

Business Espionage is Not Limited to High Tech and Multi-Million Dollar Firms

When people think corporate espionage, they think high-tech and industrial secrets. They don’t realize that corporate espionage includes any product, service or client list that a company has to make money. Everything from chocolate recipes to online marketing techniques can be the subject of business espionage. Here’s a case from the International Investigator files as an example:

While attending design school in England, Beth befriended another student, Miguel. They made an elaborate plan to open a business together once they graduated. While Miguel returned to his native Peru to wait for a visa, Beth returned to her native Florida and accepted a job with an already-established designer.

After Miguel's visa was granted and he arrived in Miami, he backed out of the plan with Beth to [...]

  • Permalink Gallery

    Remove the Rose-Colored Glasses to See Clearly with Investigative Services

Remove the Rose-Colored Glasses to See Clearly with Investigative Services

Joan was the type of woman who pretended not to see things. In fact, Joan liked to believe that as long as she didn't talk about a terrible issue, it would somehow just magically go away.

For the last four years of her thirty-year marriage, Joan was an ostrich. She suspected her husband of being a cheating spouse. But she buried her head in the sand. She suspected him of using cocaine again, even after he successfully completely rehab ten years ago. But Joan hid her head as often as possible. She also occasionally wondered if her husband was even capable of swindling Lewis, his longtime business partner. But unfortunately, Joan chose to wear those rose-colored glasses. And in the end, Joan was penniless.

When her [...]