digital forensics

I Now Pronounce You Husband and Ex-Wife

Statistics claim that more people are not getting married for fear of divorce and further state that 50% of marriages end in divorce. That means that one out of every two people will find themselves in divorce court or one of two people will know someone that has gone through a divorce or going through a divorce.

Legal ways to track a cheater

After the “I Do’s”, come the “I Can’t Believe He Would Do That To Me”. We hear that a lot here at International Investigators. The ”I can’t believe” is always followed by financial woes. Having been left is hard; having been left with no financial security is difficult. Many times we hear how the wife has to succumb to these facts. Our Client was unaware of their finances [...]

  • Permalink Gallery

    Cell Phones Are Compact Computers with the ability to be “Hacked”

Cell Phones Are Compact Computers with the ability to be “Hacked”

Remember when your “Mobile Phone” was in a case as big as a small brief case and each call cost you a couple of dollars per minute and not cents? You were among a very elite if you had a “Mobile Phone” back in the day. Today, it is reported that more than 91% of adults in a survey of over 2,500 people own cell phones. They are replacing landlines, GPS Devices and tablets and many times every member in the family is linked to their own cellular device. A cell phone allows the user to make calls, send text message and emails, surf the web, schedule to wake you up, remind you of appointments and even goggle answers to questions when in a [...]

Not Only Do I Hear What You Are Saying, So Is Someone Else

We had a gentleman who was on the verge of selling his multi-million dollar company.  He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island.  In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable.  The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings.  He had this feeling that something wasn’t right and he came to International Investigators to hash over his suspicions to determine if that nagging warning was [...]

Computer Forensics - A Powerful Tool in Investigations

Long before there were computers, internet connection and mobile phones, words were written by hand, pen/pencil and paper. If you made a mistake you would wad up the paper, throw it in the trash and start all over again, or use your trusty eraser and change the wording. Or you could use your “typewriter” and type a letter, same applied, if you made a mistake you would rip the paper out, roll in a new sheet and start all over. And if you had to research anything, you headed off to the library and conducted manual searches. If you didn’t check out a book, no one knew that you even opened up a book or copied the information.

What you did on pen and paper [...]

Computer forensics with International Investigators Inc.

Ever accidently delete a file on your computer only to try in vain to recover it.   Usually, a simple search in the recycle bin will allow you to recover the file.  However, if you permanently deleted the file (such as using the command Ctrl+Shift+Delete) then you won’t have much luck using the recycle bin.  There are available software that the home user can install that will provide a chance to recover the file but what if you don’t feel comfortable using such software or worse, the software did not yield the results you were hoping for?  This is where the professionals come in.

International Investigators has been in the game for years and employs its own forensics lab for both cellular and computer forensics investigations.  [...]

Correct approach to Computer Forensics

More than a few clients have walked through the doors of International Investigators requesting their cell phone or laptop be analyzed by our digital forensics lab. Quite commonly the client is dealing with marital infidelity and highly suspects their spouse of a secret affair.

The first questions we tend to ask in these cases pertain to the ownership of the device in question and inform the client that computer forensic firms in the US are legally obligated to obtain permission from the owner of the device and to follow a legal process for cell records in digital forensics. The same holds true for mobile phone forensics and during a cell phone investigation. A reputable forensic investigator should always gain written permission of the device owner [...]

Can Spyware Be Installed On My Cell Phone Wirelessly?

Here at International Investigators, we routinely get asked about cellular malware and how it is installed. One of the most common questions is if cell phone spyware can be installed on a cellular device Can Spyware Be Installed On My Cell Phone Wirelessly?

Wirelessly. The answer: YES. So, how does one go about installing malware on a phone if they don’t have physical access? Well, there are several ways this can be done and one of which is an IMSI catcher. The police and some of the big three letter spooky agencies use commercially manufactured IMSI catchers such as the Stingray which is built by the Harris Corporation. We won’t get into the actual capabilities of the Stingray as there are legal ramifications in doing [...]

Are You Sabotaging Your Own Business’s Digital Security?

You wouldn’t be the first business owner to use their work email address for non business related tasks. Sometimes it might make sense to use your business email account during online orders, quote applications, etc. However, this might not be the smartest move. When you send an email anywhere the email will move through various networks. If the company your dealing with has lax daisy network security system you could in fact be asking for malware to be directed right back at your own network via email responses.

There are other scenarios to consider as well. How many users and what type of privileges to the users on the business network have? Can they also send emails and if so are the emails monitored? If [...]

Can I Help You?

It was a hectic day here at International Investigators when the door opened and a small framed middle aged man walked in. He was a rather nerdy fellow with small eyes and bushy eyebrows. In his hand was a small box; 5 inches by 8 inches and he carried it like it was filled with precious gems. He walked right into my office, sat down and said, “I’m here to help you!” which I found strange, because I believed I was here to help him. When I asked what he could do for me, he laid the box down on my desk, opened it up and lifted a smart phone out of it. We both looked at each other with surprise, me because it [...]

  • Permalink Gallery

    You think it’s just a bump in the road, when in fact, it’s a full fledge road block

You think it’s just a bump in the road, when in fact, it’s a full fledge road block

Mary would drive home every night from work with a heavy heart and so many thoughts running through her mind. Every night she wondered what time her husband would arrive home, would he be waiting for her or her waiting for him. It was a dreadful game she played with herself.

For the last year and a half of her fifteen year marriage, Mary kept the thought of that little bump in the road to herself hoping it wouldn’t get any bigger, but that wouldn’t be the case for her. Mary felt she was dealing with an unfaithful husband and didn’t want to believe he could be a cheating spouse. An attorney friend recommended Mary to meet with International Investigators to determine if in fact [...]