Private Investigations

  • Permalink Gallery

    Accuracy of Initial Information Critical to Due Diligence Investigations

Accuracy of Initial Information Critical to Due Diligence Investigations

The first step International Investigators takes in a due diligence investigation or background check is to verify the information we have received on the subject. The online searches or a Google search just take the information given and if that information is inaccurate or incomplete, so are the search results. That’s not how we work.

For instance, let’s consider aliases. Aliases are not necessarily covert names used to hide identity in this regard. Aliases are names someone may have legally had at some point in their life:

Maiden name
Different names from prior marriages
Names prior to adoption
Names prior to legal name changes
Incorrect reporting or typos from various reporting agencies

Another important piece of information is a social security number. If a number is transposed or mis-reported, the information [...]

Cell Phone Forensics Exposes Source of Harassing Messages

International Investigators was recently called into an interesting case that could have easily escalated into violence or a life changed forever.

We got a call from an attorney who was representing a couple and their college-age daughter. The daughter was receiving harassing texts, calls and messages on her cell phone. They believed the former girlfriend of a new boyfriend was behind them.

Their attorney knew it was possible to peel back the layers to get to an IP address to determine the source, but he didn’t know exactly how. So he called us.

Part of the cell phone forensic process means obtaining records from the service provider. You have to use their language and have legal authority to request the records. Communicating and having the most precise [...]

  • Permalink Gallery

    Outside Investigator Can Search for Assets and Answers in Family Disputes

Outside Investigator Can Search for Assets and Answers in Family Disputes

When news stories seem to come out clustered around one topic, it makes it apparent that we need to talk about it. Just over the last couple of weeks, I have seen news reports or documentaries about family disputes and in both situations there were step-parents, siblings and step-siblings at odds with each other about the care of an elderly parent and their subsequent estate.

International Investigators is familiar with these situations. Sometimes a widow or widower is aging and becomes unable to handle their financial or medical care. One of the children is given power of attorney and siblings or other relatives suspect them of mismanaging funds and perhaps even the medical and daily care of the subject.

Others in the family suspect they are [...]

Cell Phone Records Critical to Defense Attorney’s Arsenal

Cell phone forensics is becoming as important a tool for attorneys as DNA evidence. All you have to do is stand in line at any store or sit in any restaurant to see that most customers are either talking on one or using it to find the best deal or discount coupon. That proliferation of devices creates a window for cell mapping, cell tower triangulation and other cell phone forensics tools that can provide evidence to support guilt or innocence in connection with crimes – and defense of clients.

One of the tools mobile phone forensic analysis includes is the use of cellphone records.

Records could include a variety of information, including:

Records for blocked callers
Records for restricted callers
Call history
Text and email history

  • Permalink Gallery

    Get Accurate Information with Professional Due Diligence and Background Checks

Get Accurate Information with Professional Due Diligence and Background Checks

We’ve seen a pattern develop here at International Investigators. Despite what you might believe, it seems that more men than women get stung when it comes to dealing with people. Women seem to have that radar that sniffs out suspicious behavior, like it’s an intuitive sense.

We have been asked by men, women and businesses to do what boils down to due diligence – background checks – for many reasons, some of which you might not initially consider. The thing is that going through the process could save you from a lot of problems down the line.

On a personal level, some of the situations where a background investigation might be warranted include:

Hiring a nanny, housekeeper or chef
Family disputes in estates or caregiving situations
Marital disputes, infidelity
Relationships, [...]

  • Permalink Gallery

    When a Child Custody Battle Turns into a Missing Person Search

When a Child Custody Battle Turns into a Missing Person Search

As investigators with years of experience, everyone at International Investigators knows how emotionally-charged many situations can be, especially those involving family – like death, estates and divorce.When we pick up a call from a divorce attorney and we get the news that something bad has happened, we approach it from an objective viewpoint, which the parties involved aren’t usually able to do.

This is especially true when the line between a divorce investigation blurs into a missing person search. Child custody is often a battleground and when one spouse, or side of the family, removes the child from the area and hides elsewhere, finding people who have any knowledge is a priority.

Years of experience, along with the extensive digital data available to us as professional [...]

Are Cell Phone Forensics at Risk?

The majority of states have adopted laws against texting while driving, but I just read an editorial saying that few of the laws are being enforced. Now legislators and the public want insurance companies to know who is using a cell phone while operating a vehicle and let that drive rates. Some are even calling for cell phone surveillance and cell phone tracking.

With all the cell phone forensics we do here at International Investigations, we know the technology is there to accomplish this. However it would not be a mobile spy like we are used to uncovering in our mobile phone forensic analysis process. No, it would be a cell phone deactivation device installed in the vehicle. And according to the survey, the public [...]

Taking Them to Court? Search for Assets First

An attorney for a lady calling herself a reluctant landlord was on the other end of the phone call to International Investigators. The attorney explained that she was one of the many people who ended up renting out a property she could not sell. That also meant she was not an experienced landlord.

She had run a credit check and checked references from prior landlords and the applicant’s job when the tenant first applied. Everything checked out. She didn’t think anything about hidden money or hidden bank accounts – she had no reason.

But after six months, the tenant lost her job and in the eighth month, quit paying rent. She learned quickly about the eviction process in her county and about what damage and mess [...]

HR Due Diligence Checklist Routine for Hiring

Not only do logos get updated to keep up with the times, so do those little sayings that come out of the mouths of parents beginning when their children are at a very young age. They apply to work as well as life and are a call for everyone to conduct some level of due diligence.

For instance, consider “Watch out for a wolf in sheep’s clothing.” No longer is ours an agrarian society so the adage updated to “Don’t judge a book by its cover.”  Now, we have “stranger danger” and a general suspicion that means “trust must be earned.”

Now items are routinely ticked off the HR due diligence checklist as applicants are considered. Now, the interviewing process can include a background check. What [...]

  • Permalink Gallery

    Computer Forensics Consultant First Line of Defense Against Spear Phishing

Computer Forensics Consultant First Line of Defense Against Spear Phishing

Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game fish.

Spear phishing is an attack targeted very specifically to one simple point of contact – an inconspicuous email crafted to entice the receiver to click a link that opens malware or connects to a site that can compromise the recipient’s network – including intranet business network contacts.

Computer forensics firms are seeing more and more evidence of the spear phishing technique as the bad guys are honing their infiltration skills [...]