Cell Phone Spying

When a Cellphone Ping and Spyware Won't Work

Herb called International Investigators, Inc. in a panic one morning. His wife of 7 years told him she was visiting her sister again in another town approximately 200 miles away. He called her sister about an unrelated issue and that was when Herb found out that his sister-in-law had not seen his wife for quite some time.  Angry that he had been lied to, he insisted we ping her cellphone to find out where she was! We told him we only cell ping for Licensed Bail Bond Recovery Agents looking for a fugitive.  He then wanted us to remotely install spy cell phone software on her phone so he could listen to her conversations (spy on a cell phone) and know her GPS locations. [...]

  • hidden assets and phone bugging
    Permalink hidden assets and phone buggingGallery

    And If Hiding Assets Wasn’t Bad Enough, He Also Bugged Her Phone

And If Hiding Assets Wasn’t Bad Enough, He Also Bugged Her Phone

It was on a rainy day in March when Cleo realized something just wasn’t right with her phone.  She had been on various websites throughout the day looking for ideas for her newest project and the phone kept getting bogged down; this was the way she described how slow the phone reacted to surfing the web.  She also stated at times the phone would get hot to the touch and the battery life kept getting shorter and shorter, even though she had made sure the battery was almost drained before charging it.

When Cleo brought the phone to our office she informed us she was in the middle of a child custody case and was sure her ex-husband had a hand in the mysterious events [...]

Hidden out of Sight, Viewed from Afar

It was just another abnormal day for Victoria.  She sat at home in her lounge chair and noticed that her smoke detector looked a bit strange.  She just ignored it at first, it was just a smoke detector and she had more than a strange smoke detector to ponder.  She had just broken up with her live in boyfriend of 5 years.  He had become a bit overbearing, demanding to know her every move, who she was with, who she talked to, even at times showing up at her place of employment.  It was just too much to deal with, and even though she cared deeply, she cared more for her emotional state of mind.

Again, she went back to that smoke detector and decided [...]

Gaining Information in a Divorce Illegally

Apps regularly pop up in divorce cases, experts say. Over 80% of U.S. divorce attorneys say they’ve seen a rise in the number of cases using social networking, according to the American Academy of Matrimonial Lawyers (AAML)

Sometimes it’s not the social networking sites themselves, but how they are accessed to gain information.

With that said, let’s remember, there are legal apps that are helpful when you have an aging parent, a teenage child, or apps that allow family members to see every phone’s location.  These apps are helpful since everyone is aware they are installed on the phone.

But what if there is an app on your phone that does more than show your location?  What if the app allows someone else to see your text [...]

Bugged and Confused

Your words are repeated, your private communications are known, your strategy is exposed, your business has suffered and you just cannot say for sure how this was done.  It can happen and has happened to many private individuals and businesses.

There is information that needs to be shared between business partners, attorney and clients that need to remain in strictest confidence and yet, somehow somebody or a competitor knows exactly what is going on.

We first want to say “mole”, but we know the individuals involved would also experience a loss if the information was shared to the outside world, so how is the information being shared?

Cellular devices are common practice.  We use them for various types of communication.  Telephonically, emails, texts and we use them [...]

I’d Like to Phone a Friend

Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We put our Client’s first, we work on their behalf, we do what is right and we stay within the law to make sure anything we find can be used in the court of law. We don’t tell our Clients we are their friends, but we act upon the same basis.

by Friends.com. If you look in the dictionary it will tell you that the definition of friendship is a state of being [...]

  • Permalink Gallery

    He didn’t send the emails, but they came from his computer

He didn’t send the emails, but they came from his computer

Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common.  The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation.

I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]

No One is Ever Going to Hear My Conversations, Or are They?

Social Media: There are so many ways to communicate with social media, but if you break it down, your communication is either by word of mouth or the written word (picture). When you verbally communicate, your message is delivered and heard, then responded to or ignored, but you know right then whether your point was taken or rejected.

In the written form, usually by e-mail, text, or some form of social media, it is derived from a device, a cell phone, a tablet, a laptop or a tower computer. Your personal information is stored in these devices, and sometimes the cloud…and no matter what you write, text, post somebody somewhere that you don’t even know may have access it. That’s the chance we take when [...]

  • Permalink Gallery

    Don’t Do Nothing, Act Upon your Beliefs, you Could be Saving someone’s Life

Don’t Do Nothing, Act Upon your Beliefs, you Could be Saving someone’s Life

John knew he needed help. He had given his son, Thomas every opportunity to turn his life around and yet his son continued on the same downward spiral and then blamed his father for his many failures.  They say a parent is responsible for their children’s actions and that good parenting produces good children. That is no always the case. We tell our Clients that children learn by example, but some kids just never apply themselves and nothing a parent can do to encourage them to be more successful or responsible makes a difference. And this is exactly how our case began with John.

Thomas had some shady friends, although he had been childhood friends with them, he chose to maintain the friendship when he [...]

Dating through Social Media

In life it isn’t easy meeting the right person, the woman/man of your dreams in a chance meeting.

The one individual in the whole world that you feel completes you, gets you, loves you, and puts you above everything else.  The last face you see before you go to bed at night and the last voice you hear before you fall asleep.

The internet and social media brings these wants closer to you than you would have even been able to do on your own.  Once click and you see that perfect person posted on your screen with all the features you ever wanted, the smile that lights up your face, the eyes, the hair and finally the body; all are perfection, or are they?

We have [...]