We recently got a call for a request for lie detection testing due to a spy on cell case. According to Luann, her husband of 20 years had been unfaithful for years. She was certain he had installed some type of cell spyware on her phone so that he could determine where she was, allowing him the opportunity to meet up with his lover. She also inquired into a cheating spouse investigator watching where he goes and with whom he spends his free time with. She even accused him of stashing away money so he could spend it on his girlfriend and wanted a financial investigation completed. She also accused him of employee embezzlement. Her frustration level was high and she demanded immediate results [...]
Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”. With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious. Google the internet for mobile phone bugging and you will find many “offshore” providers that sell highly sophisticated cell phone spy software for usually less than a hundred bucks. Carefully read the advertising material posted on these sites and you will find that they guarantee that the spy on cell software can’t be found. They provide a detailed tutorial explaining how to remotely install phone spying software on a target phone. Electronic eavesdropping is illegal in the United States and [...]
Herb called International Investigators, All In Investigations, Inc. in a panic one morning. His wife of 7 years told him she was visiting her sister again in another town approximately 200 miles away. He called her sister about an unrelated issue and that was when Herb found out that his sister-in-law had not seen his wife for quite some time. Angry that he had been lied to, he insisted we ping her cellphone to find out where she was! We told him we only cell ping for Licensed Bail Bond Recovery Agents looking for a fugitive. He then wanted us to remotely install spy cell phone software on her phone so he could listen to her conversations (spy on a cell phone) and know [...]
It was on a rainy day in March when Cleo realized something just wasn’t right with her phone. She had been on various websites throughout the day looking for ideas for her newest project and the phone kept getting bogged down; this was the way she described how slow the phone reacted to surfing the web. She also stated at times the phone would get hot to the touch and the battery life kept getting shorter and shorter, even though she had made sure the battery was almost drained before charging it.
When Cleo brought the phone to our office she informed us she was in the middle of a child custody case and was sure her ex-husband had a hand in the mysterious events [...]
It was just another abnormal day for Victoria. She sat at home in her lounge chair and noticed that her smoke detector looked a bit strange. She just ignored it at first, it was just a smoke detector and she had more than a strange smoke detector to ponder. She had just broken up with her live in boyfriend of 5 years. He had become a bit overbearing, demanding to know her every move, who she was with, who she talked to, even at times showing up at her place of employment. It was just too much to deal with, and even though she cared deeply, she cared more for her emotional state of mind.
Again, she went back to that smoke detector and decided [...]
Apps regularly pop up in divorce cases, experts say. Over 80% of U.S. divorce attorneys say they’ve seen a rise in the number of cases using social networking, according to the American Academy of Matrimonial Lawyers (AAML)
Sometimes it’s not the social networking sites themselves, but how they are accessed to gain information.
With that said, let’s remember, there are legal apps that are helpful when you have an aging parent, a teenage child, or apps that allow family members to see every phone’s location. These apps are helpful since everyone is aware they are installed on the phone.
But what if there is an app on your phone that does more than show your location? What if the app allows someone else to see your text [...]
Your words are repeated, your private communications are known, your strategy is exposed, your business has suffered and you just cannot say for sure how this was done. It can happen and has happened to many private individuals and businesses.
There is information that needs to be shared between business partners, attorney and clients that need to remain in strictest confidence and yet, somehow somebody or a competitor knows exactly what is going on.
We first want to say “mole”, but we know the individuals involved would also experience a loss if the information was shared to the outside world, so how is the information being shared?
Cellular devices are common practice. We use them for various types of communication. Telephonically, emails, texts and we use them [...]
Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We put our Client’s first, we work on their behalf, we do what is right and we stay within the law to make sure anything we find can be used in the court of law. We don’t tell our Clients we are their friends, but we act upon the same basis.
by Friends.com. If you look in the dictionary it will tell you that the definition of friendship is a state of being [...]
Computer forensic analysis can range in scope depending on the case. We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations. As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common. The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation.
I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]
Social Media: There are so many ways to communicate with social media, but if you break it down, your communication is either by word of mouth or the written word (picture). When you verbally communicate, your message is delivered and heard, then responded to or ignored, but you know right then whether your point was taken or rejected.
In the written form, usually by e-mail, text, or some form of social media, it is derived from a device, a cell phone, a tablet, a laptop or a tower computer. Your personal information is stored in these devices, and sometimes the cloud…and no matter what you write, text, post somebody somewhere that you don’t even know may have access it. That’s the chance we take when [...]