Private Investigations

  • Permalink Gallery

    Is the Potential of a Computer Forensic Examination Part of Your Computer Usage Policy?

Is the Potential of a Computer Forensic Examination Part of Your Computer Usage Policy?

Employers hire people with the best of intentions. They hope the new employees will become loyal and exemplary representatives of the organization. But sometimes it just doesn’t work out that way.

Take for instance the case of a middle school teacher in Downers Grove, Illinois. According to a Chicago Tribune article, the teacher has resigned and given up her teaching certificate after it was discovered she had explicit photos of herself on her computer at school. There is an investigation underway as to whether or not the photos were shared with any minors.

Whenever employers suspect covert or criminal activity by an employee, one of the first places to look is their computer. A computer forensic investigator can complete a computer forensics electronic discovery that will [...]

  • Permalink Gallery

    Computer Forensic Investigations are Best Left to the Professionals

Computer Forensic Investigations are Best Left to the Professionals

A DIY approach to computer forensics opens up an unwanted can of worms – especially if evidence and factual data is found or recovered from the computer.

With computers being the primary tool used by employees in the vast majority of industries and firms, evidence of wrong-doing is often on the machines once the employee has been terminated or resigned. If there is even the hint that digital forensics may uncover evidence, it’s best to hire a professional computer forensics expert right away. After the employee leaves and the hardware is turned over to the IT department, even the initial booting up of the computer can taint any evidence that would be recovered.

Why? A few of the many reasons:

The chain of custody and tracking of [...]

  • Permalink Gallery

    Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?

Is Your Employee’s Phone a Mobile Spy Leaking Your Business Secrets?

All you have to do is sit in a coffee shop or lunchtime dining spot to hear that sensitive business information is being discussed. It may not be about a top secret merger or a hot new product, but information about how a company does business and who their customers are is bantered about in casual discussions.

And with the proliferation of ILLEGAL spyware available on the Internet, cell phone spying is becoming more and more a problem. Here at International Investigators, our mobile phone forensics team is being asked to conduct cell phone spyware detection for more and more businesses.

Cell phone monitoring is most often regarded as a way for someone in a relationship to keep tabs on their partner, or in a stalking [...]

Asset Investigation Uncovers Unexpected Truth

During a divorce, assets come into focus. Spouses – both husbands and wives often take steps that could have long-term implications.

If one spouse is hiding money in a divorce, the other spouse may be denied a fair settlement. On the other hand, hidden bank accounts or stock accounts that are subsequently located through an asset investigation could result in even greater loss than if the hidden money was originally disclosed.

Take for instance a case in Tennessee. It was a high asset divorce case with a prenuptial agreement. The wife was accused of installing spyware on her husband's computer in an effort to manipulate emails to show he was guilty of marital infidelity and had unknown bank accounts.

The pre-nup said she would receive 75% of [...]

  • Permalink Gallery

    Find Missing Person – Yes, sir! International Investigators is good at that!

Find Missing Person – Yes, sir! International Investigators is good at that!

Most of us have heard about families in which one relative, for whatever reason, becomes estranged from everyone else. Maybe it’s been 20 years or more since anyone knew the whereabouts of Uncle Joe, who left home after a bitter argument with his dad. Maybe a pregnant, unmarried cousin was pressured to give up her unborn child for adoption so she leaves the family and never reappears.

Whatever the reason might be for the empty chairs at annual family reunions and holiday dinners, finding those people suddenly becomes important when lost relatives are named to inherit from a deceased family member’s estate. It’s not unusual at all for everyone to blink and shrug and admit they have absolutely no idea how to locate people who [...]

  • Permalink Gallery

    Turn it Off and Stash it in a Drawer to Prevent Cell Phone Spying

Turn it Off and Stash it in a Drawer to Prevent Cell Phone Spying

My friend recently had a meeting with her attorney. I don’t know what they needed to discuss – we never talked about that. We did talk about the Cell Phone Policy her attorney had adopted and required everyone in the office – including clients – to adhere to.

Because of the escalating incidence of cell phone surveillance and cell phone spying, the firm adopted the policy. Every cell phone that came into the office had to be turned off and left locked in a designated cabinet during all visits and consultations. No active cell phone moved past the receptionist’s desk.

Here at International Investigators we understand why the legal firm has taken the stand. We see the increase in mobile device forensics brought on by the [...]

  • Permalink Gallery

    Hidden Asset Search Investigator Plays Big Part in Divorce Cases

Hidden Asset Search Investigator Plays Big Part in Divorce Cases

In our many years providing asset investigations and recovery services for attorneys and their clients, International Investigators has accumulated volumes of experience and knowledge. That’s why we are known as a premier Indiana asset search investigator. One of the reasons attorneys are quick to call us when they see assets in divorce is because we are experts in all the ways spouses try hiding money in a divorce.

According to Forbes.com, 80% of divorces involve one spouse who is actively seeking the divorce while the other spouse does not want to dissolve the marriage. Guess which one of those people will react with anger and resentment. Yes, it is most often the person who is being left behind. Maybe it’s just human nature to show [...]

  • Permalink Gallery

    Would a Bug Sweep of your Business Uncover any Spy Equipment?

Would a Bug Sweep of your Business Uncover any Spy Equipment?

Just like an average citizen might ask who would want anything from them enough to take the time to engage in cell phone tapping, businesses across the nation might ask who would install eavesdropping devices or engage in electronic surveillance in their organizations.

The answer is evident in a report from the National Counterintelligence Executive (NCIX). The report says that foreign spies account for economic espionage costing “the United States economy as much as $400 billion or more per year.” Some say that is grossly understated.

Now that’s BIG BUSINESS – and not the kind U.S. business wants to see. Is your business being targeted?

Corporate secrets and intellectual property are highly valued by competitors and years of research and development could be wiped out through computer [...]

  • Permalink Gallery

    Divorce and Children: Investigations of Marital Infidelity Used in Child Custody Decisions

Divorce and Children: Investigations of Marital Infidelity Used in Child Custody Decisions

What starts with a request from one spouse for International Investigators to find proof of a cheating spouse or other marital infidelity often expands into another area: child custody.

The requests to find evidence of an extramarital affair by an unfaithful wife or unfaithful husband continue to surge, which is why we have much experience in this area. Many times, one spouse is already talking with an attorney and they already believe there have been signs of an affair and just need evidence.

Other times, it is not a secret affair or a desire to catch a cheating spouse. It could be financial or personal infidelity. Little (or not so little) lies or secrecy surrounding finances or activities could be the impetus for surveillance as well.

And [...]

  • Permalink Gallery

    Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!

Technical Surveillance Countermeasures (TSCM) provides security – in more ways than one!

Many companies have Intellectual Property Protection insurance for protection. But insurance is only good after a theft or breach of confidential or proprietary information.

Wouldn’t it be a better idea to prevent a loss before it happens?

When a business hires International Investigators to do a bug sweep, or more precisely, TSCM, it’s because they want to be proactive and protect proprietary corporate information from being leaked or lost.

The TSCM process includes acting as a bug detector, revealing eavesdropping devices and spy equipment. But the actual bug detection services do much more. The benefits to a company or organization are much broader:

Protection of damage to income and profits
Continued viability of business strategy and processes
Security of intellectual property
Privacy, both corporate and personal is protected
Fiduciary responsibility to stakeholders, [...]