Technical Sweep Countermeasures (TSCM). We have many Clients who call for a TSCM service to ensure their home or office are safe to discuss private conversations. A TSCM sweep is conducted to determine if there are any covert (not openly acknowledge or displayed) audio or video devices within a home or business. Requesting a listening device detection or an electronic bug detection can expose various amounts of spyware that is concealed within normal products. For example, these types of devices could be a charger for a cellphone or computer with the capability to power your technology and spy on you at the same time, smoke detectors that will function properly, and listening devices that can be installed into products you welcome into your home [...]
When I receive an inquiry, I know the person on the other end may have a lot of questions and most have never had to hire a Private Investigator. Therefore, I am prepared to provide them with the most educated and verified answers possible, and if for some reason I cannot answer a question, I then conduct research or contact one of my sources who can assist me. Life situations and circumstances are difficult enough and giving false information does not help the Client. I am asked if their situation is common or uncommon, asked how I would proceed, what will I do, how long will it take and if it is possible or not. I am upfront, honest and ethical and would never [...]
Life Happens…sometimes we oversee our path and other times we are influenced by choices made by others. When situations arise out of our control and cannot be handled from within, we reach out for help. can be that source to help with life-changing matters.
10 Reasons You May NOT Need to Hire a Private Investigator
You are not Married or involved in a relationship
You are not being harassed or stalked
You have not engaged in a workplace relationship
You do not own a cell phone, computer or drive a car
You are not adopted and if you are you do not care to know your biological parents
You do not have any children, or you have not put a child up for adoption
We have, in the past, written blogs regarding Forensic Phone Data Extractions and cell phone data recovery for hundreds of cases. There are requests relating to FCC Regulations, deleted text messages for Divorce and Custody Cases needed for Court, or accidentally deleting information, loss of contacts numbers, call histories, but none compared to the request we received today. Our Client walked into our office and we were not quite prepared for her request. It wasn’t because we weren’t capable, it was because this was the first time, we were asked to conduct an Extraction for an emotional need. She told us her father had passed away almost five years ago and after his passing, she realized he had left a voicemail for her that [...]
Let’s say you are trying to find out if someone has installed an illegal spyware app on your cellular device, laptop, tablet or computer. You try to conduct a search that would indicate a malware application has been installed but are unsuccessful or you get information on the legal apps that are pre-programmed on your phone or “find a friend” or something similar.
The reason you cannot find it is probably due to the way the app was created and the capabilities of the app. There is a reason why these apps are called “Spyware” or “Malware”. They are designed to remain hidden on your phone without detection. Spyware or Malware apps can cost as little as$19.99 and can go up in price depending on [...]
I have heard Client’s say they don’t answer calls from private numbers, they don’t answer calls from numbers unknown to them and they basically just do not answer their phone. When asked why they have their phone they reply, to text, tweet, post and check Facebook, Instagram, Snapchat, Google search, listen to music, podcasts, and whatever else they do with their phone besides actually making and receiving phone calls. Communication comes in many forms and for anyone younger than 40, audio (actually talking) is the least type of communication used.
I think to myself, well then voicemail should soon be obsolete and maybe we don’t need our ears or our mouths, but then how can girls take photos of themselves with puckered lips? Now for [...]
There are many reasons an individual, attorney or a company would request an extraction from a device.
An accusation of cheating on your spouse or even worse you suspect your spouse of being unfaithful can likely be addressed by analyzing cellular user data. More than likely there is sufficient evidence on of your cellular devices to either give credibility for or against the accusation. Now, what if the smoking gun was a GPS location saved in a temporary folder destined to soon be deleted? Or what if the text messages between a cheating spouse and their fling have been deleted? Our digital forensics software easily carves out deleted data and GPS location data from phones, but not all phones keep deleted user data the same [...]
For those of us who have been divorced, we understand the process and procedures. We know that we either represent ourselves (which could create problems during and after the divorce) or we retain the services of a reputable law firm (which prevents the pro-se issues). We enter into a marriage full of hope and dreams and unfortunately, we are only in control of half of that relationship. We enter into a divorce with the expectation to right the wrongs and in many cases, there are activities that need to be investigated. The he/said she/said of the relationship holds little weight in court. Documented behavior and actions are required. Not all divorces are complicated, but in relationships that end due to deceit, hiring an investigative [...]
We recently got a call for a request for lie detection testing due to a spy on cell case. According to Luann, her husband of 20 years had been unfaithful for years. She was certain he had installed some type of cell spyware on her phone so that he could determine where she was, allowing him the opportunity to meet up with his lover. She also inquired into a cheating spouse investigator watching where he goes and with whom he spends his free time with. She even accused him of stashing away money so he could spend it on his girlfriend and wanted a financial investigation completed. She also accused him of employee embezzlement. Her frustration level was high and she demanded immediate results [...]
Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”. With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious. Google the internet for mobile phone bugging and you will find many “offshore” providers that sell highly sophisticated cell phone spy software for usually less than a hundred bucks. Carefully read the advertising material posted on these sites and you will find that they guarantee that the spy on cell software can’t be found. They provide a detailed tutorial explaining how to remotely install phone spying software on a target phone. Electronic eavesdropping is illegal in the United States and [...]