cell phone forensics

Private Investigators Play Big Role in Detecting Workers Compensation Fraud

As professional investigators, we provide each of our clients with only the best combination of skill sets. Very proudly, we can boast that our investigators are long-time leaders in the areas of digital forensics including both forensic computer analysis and mobile phone forensics. In fact, our lab is one of only a few private, full-service forensics labs in the nation. But along with our dedication to mastering all of the newest technology, we also pay close attention to social issues and criminal activities which, unfortunately, continue to thrive. One of the fastest growing schemes is fraudulent claims filed for workers compensation benefits. In fact, in the most recent studies of this form of fraud, more than 45,000 active cases were active, involving employees pretending that [...]

Private Investigators Pull it All Out to Find Evidence to Refute False Accusations

We never know what the next phone call will bring us here at . Some of the most demanding cases have been those when someone is blamed for something that they did not do. It could be as serious as a felony where they face a long prison term, an accusation of employee embezzlement or a person whose spouse accuses them of marital infidelity. You can hear the frustration – and fear – in their voices when they describe a situation and ask: Have you ever been blamed for something you absolutely did not do? Have you ever been in the company of a rat, but no one else around you seems to also realize that the rat is a rat? Instead, he presents himself [...]

It’s Not Easy to be Forgettable, Even for Private Investigators

Everyone loves a new, shiny car, right? I mean, what’s not to love about a car that catches everyone’s eye as you drive by? Women are often just as excited about a shiny red convertible or a sleek steel gray luxury sedan as men. How about that great big truck with the fancy paint job and wheels that make you feel you can touch the sky? Isn’t that fun? And what about that new car smell… Cool cars and trucks might make your heart race, but for a private investigator, the primary descriptor goal of a vehicle is anything but showy – it’s forgettable. In fact, the goal is completely forgettable. Many tasks undertaken by are away from the subject’s eyes. Computer forensics investigations and [...]

Your Video May Prove Guilt to You, But Not in Court

Due to the constant flood of easily accessible technology, security cameras seem to be more plentiful than ever before: Many private residences now install security cameras around the exterior of their property. Business owners install cameras in work areas and building entrances. Parents with children often install surveillance equipment to keep tabs on the safety of their children with caregivers. Those constantly rolling cameras can often hold people accountable for bad behavior. But in the event of videotaping a suspected crime, people have a false security about their video skills. You might assume that you don't need the services of professionals like . After all you can do it yourself, right? After you read what goes into providing video evidence for court, you might just [...]

Identity Theft vs. Identity Fraud

Because we stay in the know, constantly arming ourselves with ways to assist our clients, is most concerned about how computers can sometimes turn our clients into victims. To explain our point, we wish to share some rather scary information with you: every two seconds, another American becomes the victim of identity fraud. In fact, according to research conducted by Javelin Strategy & Research, the number of identity fraud victims jumped in 2013 to 13.1 million. That was an increase of 500,000 from 2012. Most often, the media talks about identity theft, which occurs when your personal information is accessed, even if it is not necessarily to be used for financial gain. For example, a person steals your social security number and takes on your identity [...]

Investigative Industry More Than 150 Years Old and Growing

Like every other career in America, private investigation has been positively affected by technology. In fact, technology has helped go global, literally. Our reputation and relationships with law enforcement and other investigative professionals now spans several countries. We are extremely proud of that fact. The more worldly we become, the more possible it is to meet the needs of clients with international cases. Because is a very well-known and well-respected firm, attorneys and judges trust out ethics when we provide evidence for the courts. And because of that very polished reputation, attorneys come to us with an immediate comfort level, knowing their clients will be well-served. They trust that we are highly confidential. We get things done. Specialists in computer forensic investigation and on the [...]

Advanced Persistent Threat Threatens Digital Security

The worry over security is at its highest level in history. Corporations and manufacturers have full-time staff and departments fighting to eliminate vulnerabilities and safeguard company secrets and information. Some organizations conduct regularly scheduled computer forensic analysis on employee’s business devices. Forensics consultants are on retainer and computer forensic services are a line item on the budget. Likewise, company issued cell phones are collected and routine mobile phone hack detection and mobile phone spyware detection are conducted. While employees might take advantage of a vulnerability in the system, companies are also concerned with security breaches that are unknown to employees such as spyware being uploaded inadvertently by an employee. The idea of corporate espionage mostly conjures up visions of covert operations to STEAL something – [...]

Cell Phone Forensics: We’ve Come a Long Way Baby!

When you’re talking cell phone forensics, a cell phone is a cell phone, right? Whoa! Nothing could be further from the truth. The brand or manufacturer is one variable, but so is each model produced. So to say you have an iPhone is only touching the tip of the information that a cellphone expert needs to successfully complete a mobile phone forensic analysis. With the growing number of manufacturers and models, cell phone forensic tools must adapt and evolve as well. Sim card forensics from a year ago are not sim forensics needed in mobile forensic tools today to keep up with the new technology. Of course, professionals on the cutting edge of cell phone investigation maintain not only a library of data mining software [...]

Are You a Targeted Individual for Blackmail

Are you a TI? That is, a Targeted Individual? A Targeted Individual is someone who is illegally or covertly harassed, abused, stalked or spied upon continuously by a group of people, an organized surveillance. Being a Targeted Individual is more than a boyfriend, spouse or colleague who installs cell phone spyware or conducts cell phone surveillance. It is less about following and spying and more about harassment and psychological abuse, potentially physical harm as well. That being said, one of the first steps taken by may be mobile phone hack detection or mobile phone spyware detection. Let me explain using a scenario that is becoming more and more common and compel clients to call . Zach was a prominent real estate executive in a large [...]

Virtual Currency and Bad Guys

Private investigators like consider staying on top of technology one of the requirements of the job. So when the bad guys start a trend of using a new technology, we are ready with investigative strategies to stay in step with them. We do a lot of computer investigation, forensic computer analysis and mobile phone forensics. In our experience, bad guys are trying to move money through services like Bitcoin. Many believe that transactions through these services are undetectable. While tracing the transactions takes extra skill and perseverance, they are not completely hidden. One example is that in order to get funds into the systems, the virtual currency has to actually be purchased. And purchases leave a paper trail. Computer forensics specialists, especially those who are [...]

Go to Top