Blog

Verbal or Written Communications are Not Always Private

Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”.  With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious.  Google the internet for mobile phone bugging and you will find many “offshore” providers that sell highly sophisticated cell phone spy software for usually less than a hundred bucks.  Carefully read the advertising material posted on these sites and you will find that they guarantee that the spy on cell software can’t be found.  They provide a detailed tutorial explaining how to remotely install phone spying software on a target phone.  Electronic eavesdropping is illegal in the United States and many [...]

And If Hiding Assets Wasn’t Bad Enough, He Also Bugged Her Phone

It was on a rainy day in March when Cleo realized something just wasn’t right with her phone.  She had been on various websites throughout the day looking for ideas for her newest project and the phone kept getting bogged down; this was the way she described how slow the phone reacted to surfing the web.  She also stated at times the phone would get hot to the touch and the battery life kept getting shorter and shorter, even though she had made sure the battery was almost drained before charging it. When Cleo brought the phone to our office she informed us she was in the middle of a child custody case and was sure her ex-husband had a hand in the mysterious events [...]

A Good Attorney Never Asks a Questions without Already knowing the Answer

They depend on us, experienced private investigators, for the answers.   We are seekers of the truth, and that’s what the Judges and Juries want to know in order to make informed decisions.  Attorneys are only as good as the information they have to work with.   Sometimes their clients and the witnesses involved, have trouble providing exact accounts of pertinent circumstances involving the incident at hand.   Our databases and information sources are usually more sophisticated than the ones available to most law firm’s investigators and paralegals. In most cases, the information is obtained quickly. Our investigators are equipped with high-tech video and audio recording equipment that can memorialize statements and activities for evidence.  We have specialists on staff that are experts in the field of computer [...]

Mrs. Merrick’s Missing Heirs

Mrs. Merrick’s attorney had a problem. She needed to find two missing heirs but had little to go on; only names with no other identifying information. Mrs. Merrick set up a living trust twenty years before her death, but never updated it, making this heir search more difficult. She left her large estate to Mary Danielson and Mitchell Roberts or their heirs. That was it; no additional information as to her relationship with Mary and Mitchell, or their ages or location. The attorney’s firm was the trustee because Mrs. Merrick’s father had dealings with the firm in years past, but no one at the firm knew anything about her other than the fact that she was a widow and had no children. Before publishing notices [...]

Telling the Truth vs Living a Lie

It all started with a lie detection test at .  It was a she said, he said situation with both parties confident their beliefs of the situation would clear the air and settle the turmoil between them.  What it turned out to be was something much deeper and emotional than either expected and the direction of their relationship took a dramatic turn towards a journey neither he nor she imagined. First, let me explain that a detection of deception test is quite different than what is viewed on television programs.  Nobody is asked any questions during the test that have not been thoroughly discussed prior to the test, so in reality, anyone taking the test knows upfront what they are going to be asked.  You [...]

Corporate Espionage: How To Stop It In Its Tracks

This article is Part 3 of a 3-part series. The purpose of the series is to familiarize the reader with the most common indicators of corporate espionage and advice on how to combat it. This advice is a compilation of our experience at while investigating these types of cases. For a description of the differences between corporate espionage, economic espionage and competitive intelligence, click here for Part I: WHAT IS CORPORATE ESPIONAGE? To learn more about the root causes that invite espionage, click here for PART II:  5 RED FLAGS YOU’RE A VICTIM OF CORPORATE ESPIONAGE. Every company should have a plan or Standard Operating Procedure (SOP) to combat corporate spying. Your SOP needs to be specific. It won’t help you if it’s fuzzy, vague [...]

Did He or Did He Not Have Any Living Heirs

What happens when someone passes away and there isn’t any proof of living heirs?  The certain cases, the estate cannot be closed until this question is answered. We at International InvestigatorAll in Investigations. get many calls regarding heirs and if there are living relatives who are entitled to a portion of the estate? You read in the papers or hear others talk about an unknown relative who passed away leaving them with money and they didn’t even know they had a rich relative.  It’s a windfall for them but for the trustee of the estate, it can be a daunting experience.  And how are these unknown heirs or relatives found? Finding people has a starting point of the Subject at hand.  A background investigation upon [...]

5 Red Flags You’re A Victim Of Corporate Espionage

This article is Part 2 of a 3-part series. The purpose of the series is to familiarize the reader with the most common indicators of corporate espionage and advice on how to combat it. This advice is a compilation of our experience at while investigating these types of cases. For a description of the differences between corporate espionage, economic espionage and competitive intelligence, click here for Part I: WHAT IS CORPORATE ESPIONAGE? For this article, we are concentrating on low-tech tactics commonly used in corporate espionage. Computer hacking, surveillance equipment, and eavesdropping devices are probably found far more in economic espionage cases; but in our experience, low-tech spying is used with a high degree of success in corporate espionage. It’s cheap, hard to spot and [...]

Corporate Espionage: What Is It, How to Spot It and What to Do About It

Part 1: What Is Corporate Espionage? This article is Part 1 of a 3-part series. The purpose of the series is to familiarize the reader with the most common indicators of corporate espionage and advice on how to combat it. This advice is a compilation of our experience at while investigating these types of cases. Corporate espionage, also known as industrial espionage or business espionage, usually involves one company spying on another for economic gain. It is not the same as economic espionage, which involves nation-states spying on each other’s companies. For more information on economic espionage, read FBI Launches Nationwide Awareness Campaign at the FBI’s website here. In corporate espionage, Company A gains an economic advantage over Company B by collecting private information that [...]

Go to Top