Bug Sweeps

So You Wanna Be a Private Eye

All you have to do is Google “become a private investigator” to find all sorts of blogs, books and sites dedicated to showing you how to become your own, self-employed private eye. Trouble is, most of the advice given to prospective investigators involves searching the Internet for leads and practicing following people without detection – and most of the “tips” are based on the old, outdated stereotypes. After decades in the business, knows there is a level of skill, knowledge and resources that separates the professionals from the wannabes. Professional investigators have specialists and experts on call: Personal asset search investigators Divorce asset investigators Child custody investigators Infidelity investigators Handwriting analysis experts Forensic examiners Computer forensics specialists Certified computer examiners Technical Surveillance Countermeasures experts Social [...]

4 Reasons Businesses Should Conduct Technical Surveillance Countermeasures

Sometimes business owners and leadership of businesses can’t believe that their business would be the target of any corporate espionage or illegal activity. But innovative small businesses have become not only a hotbed of technological advances, but the victim of crimes that devastate their enterprise. For that reason, here at , we want every business owner to be aware of the top 4 reasons to conduct Technical Surveillance Countermeasures (TSCM). TSCM is most commonly referred to as bug detection. But TSCM is also used to detect phone tapping devices, listening devices, electronic surveillance equipment and other sorts of spy equipment. Knowing that TSCM is for spy detection, some business owners might immediately say they don’t need these services. But if any of these situations come [...]

Cell Phone Forensics Creates Timeline to Prove Innocence

The smart cell phone is becoming one of the most influential producers of evidence for authorities. has been on the forefront of cell phone forensics since the beginning. As cellular forensics evolves, we stay in step with developments. Locating cellular locations and turning cellular tower triangulation into forensic cellular evidence has become more commonplace and almost a routine in many investigations. Mobile phone analysis to extract data including emails, instant messages and text messages provides evidence, too. The evolution of the technology has continued and now, much of the information in a phone is also stored “on the cloud.” Forensic data analysis by a computer forensic specialist using data extraction software and protocol can produce evidence that is court-worthy. It’s also true that many phones [...]

Investigators Save New Business

You might be surprised how many small business owners’ attorneys contact . It’s not just the multi-million dollar enterprises who have to be on guard against corporate espionage and theft by employees. Take this case, for example: When Mitch and his business partners moved from the West Coast to open a second decorative concrete business in the Midwest, they obviously hoped the new venture would be as successful as the first. But none of them were prepared with just how quickly the business grew. Mitch's finishing techniques were unlike any others. The “wow” factor was immediate. Suddenly the new business was the hot topic among many well-known developers and architects. But that instant popularity prompted jealously among competitors. Unidentified concrete businesses seemed to be trying [...]

Business Espionage is Not Limited to High Tech and Multi-Million Dollar Firms

When people think corporate espionage, they think high-tech and industrial secrets. They don’t realize that corporate espionage includes any product, service or client list that a company has to make money. Everything from chocolate recipes to online marketing techniques can be the subject of business espionage. Here’s a case from the International Investigator files as an example: While attending design school in England, Beth befriended another student, Miguel. They made an elaborate plan to open a business together once they graduated. While Miguel returned to his native Peru to wait for a visa, Beth returned to her native Florida and accepted a job with an already-established designer. After Miguel's visa was granted and he arrived in Miami, he backed out of the plan with Beth [...]

Remove the Rose-Colored Glasses to See Clearly with Investigative Services

Joan was the type of woman who pretended not to see things. In fact, Joan liked to believe that as long as she didn't talk about a terrible issue, it would somehow just magically go away. For the last four years of her thirty-year marriage, Joan was an ostrich. She suspected her husband of being a cheating spouse. But she buried her head in the sand. She suspected him of using cocaine again, even after he successfully completely rehab ten years ago. But Joan hid her head as often as possible. She also occasionally wondered if her husband was even capable of swindling Lewis, his longtime business partner. But unfortunately, Joan chose to wear those rose-colored glasses. And in the end, Joan was penniless. When [...]

The Road to the Altar was Fast – And so was the Path to Divorce Court

More than anything, Ken did not want his sister to be right about the warnings she whispered before he tied the knot with Margo. His sister insisted that Margo's motivation for marriage had a lot to do with Ken's bank account and very little to do with love. Less than a year ago, Ken had lost his beloved first wife to cancer. He believed that he was destined to be a bachelor. So when he met Margo, Ken threw all caution to the wind. Ken ignored his attorney's advice to draw up a pre-nuptial contract. Now that a few months had gone by and several thousand dollars had flown out of his checking and savings accounts, that fog of bliss was beginning to clear. Ken [...]

Technology Advances: The Need to Sweep for Bugs Grows

At , we understand that you need cold, hard facts. No assumptions. No guesses. Just the facts. We have the most advanced tools to get that job done. We still use basic skills of traditional investigations, such as surveillance. But we have access to very sophisticated surveillance equipment. To conduct research, we use highly advanced data bases. And when we have access to computers and cell phones, we search for the truth through digital forensics. In addition, we are experts at TSCM – Technical Surveillance Countermeasures. So when you suspect that your office has been bugged, we are the professionals who can answer that question for you. As we have all seen in movies about espionage, wire tapping or a phone tap can be used [...]

Veteran Private Investigator Rides the Cutting Edge of Cyber Sleuthing

In a recent article in the Indianapolis Business Journal, CEO, Brenda McGinley explains what it means to be on the cutting edge of investigative work in the new millennium. Cyber sleuthing, something that didn’t even exist two decades ago is one of the fasting growing areas of investigation. Spying has gone digital through cell phones and computers. And, the spy doesn’t have to be anywhere near the subject. The news reveals that governments and big business have even been accused of spying on each other through the covert installation of spyware on computers and cell phones. But digital spying is not limited to the wealthy or the deep pockets of government and business. No, individuals are getting in the game, too, by purchasing illegal spyware [...]

Cell Phone Forensics Illuminates Murder

When the nearly naked dead body of a 28-year-old male was discovered in a wooded area near a lake, the local sheriff's department requested an autopsy, announced that a large amount of heroin was found in the young man's blood stream and treated the death as a drug overdose. Quickly, the case was closed. Although the grieving family members were enraged at the actions of local authorities, they gathered to bury the young father of three. But in the weeks following the funeral, they soon discovered that they could not let go of the case. They did not believe the conclusions drawn so quickly by the Sheriff's department. After all, this young man, called Chip by family and close friends, had absolutely no history of [...]

Go to Top