cell phone hack

Teenagers and Cell Phones

Here at International Investigators, we pay attention.  We listen and learn and share our expertise and case example outcomes with our Clients.  It usually starts out like “I bet you haven’t heard this before” and in most cases we have.  What we haven’t heard are the thought patterns and real life situations with a teenager.  Therefore, we asked an 18 year old female granddaughter of one of our employees the importance of her phone, what she does with it, how she sets up her passwords and who she shares with.  This is what she told us:

The life of an 18 year old is so drama filled and complexly effortless now that everyone has a cell phone. Just one touch of a button and you’ve [...]

Computer Forensics Done Right – or not at all

Recently the Department of Justice issued a US search warrant to Microsoft in regard to emails sent from an Ireland-based subscriber. According to an article in the Guardian, “The United States government has the right to demand the emails of anyone in the world from any email provider headquartered within US borders, Department of Justice (DoJ) lawyers told a federal appeals court…)

While they argue the case in court with Microsoft contending that the DoJ has exceeded its authority, computer forensics firms here in the US are legally bound to obtain permission from device owners and to follow a legal process for cell records in digital forensics investigations.

Some may believe that computer forensics investigations are done in the shadows. That may appear to be the [...]

Are You Being Victimized By Corporate Espionage?

According to a recent article on CNN, the head of the FBI’s counterintelligence division, Randall Coleman said that the bureau has seen a 53% increase in economic espionage cases. To warn and educate industry leaders, the FBI has launched a nationwide campaign.

In the article, Bill Evanina, head of the National Counterintelligence and Security Center, said, “Economic security is national security.” There is growing evidence of threats from several different nations, which is part of the concern from the government agencies.

Three scenarios highlight the types of situations of corporate espionage:

Insider Threats. This is a situation where individuals who are familiar with the inner workings of a company or products are recruited by outside organizations. Sometimes these individuals actually “spy” on the company and continue on [...]

Are You Aware of What You’re Leaving on That Sim Card?

The good old factory reset has done enough for you to get rid of that old phone, right? NOTHING could be less true! And that could be enough to bring your business, your marriage or your financial life down for good.

Let me explain.

So many people are willing to donate – or sell – their old phones when the newest version arrives on their doorstep.

The cellphone expert here at International Investigators knows that all he has to do is run a little sim card forensics and he can collect all sorts of data from that donated phone. And it’s not just a jumble of code, no, it’s phone numbers, names, messages and personal information.

There was a blog post we stumbled across online where a man [...]

Cell Phone Forensics and the Little Thumbprint

Here at International Investigators we conduct a lot of mobile device forensics. We have included cellular location evidence in our findings and used cellular tower triangulation, too. Of course, cell phone spying is a continuing issue and we do a lot of cell phone hack detection and removal of the mobile spy.

Wireless forensics include cell phone records analysis and cell phone tracking. We take pride in the fact that we are on the cutting edge and have so much experience that we have “seen it all.”

That’s why when we read an article about a group of armed robbers on the rampage in the Cleveland area and saw how cell phone forensics were used to catch them we were not surprised.

One of the robbers was [...]

GPS and Your Cell Phone Could Prove Your Innocence

Just like that popular TV show says, “You are being watched.” Surveillance equipment is evident on buildings, in stores, on streets and just about everywhere you go and most of it is in no way covert surveillance.

Surveillance cameras are a double-edged sword. While some people are unnerved by the constant video of their actions and behaviors, other people, those who are falsely accused of a crime, are thankful for that video because it becomes evidence that they are not guilty of the crime. Computer surveillance and listening devices are now more likely to be spy equipment than the ever-present surveillance camera.

People are more likely to be victims of covert cell phone tracking than video tracking. Yes, once again the wonders of the cell phone [...]

  • Permalink Gallery

    Cell Phone Forensics Narrow Search Areas – But You Can’t Delay

Cell Phone Forensics Narrow Search Areas – But You Can’t Delay

There is one element of cell phone forensics that the public, including some attorneys, doesn’t often think about and it is one that can make a huge difference – if CONDUCTED IN A TIMELY MANNER.

When most people think of cell phone forensics, they think of mobile phone analysis or cell phone spyware detection. In most of those instances, the actual mobile device is needed and forensic cellular evidence is extracted using data mining software.

However, a cell phone investigation can be the first step in uncovering critical evidence for situations other than forensics data recovery and mobile phone hack detection.

A good example is how, in September, 2014, cell phone forensics helped to narrow the search area for a missing airplane in Alabama.

There were two men [...]

Not Even the Experts You Hire Can Catch Everything

In today's world, there is a lot of room for expertise. At International Investigators, our expertise involves tracking down the truth and gathering facts to prove it. We do this confidentially and use highly sophisticated technology-based databases.

Your expertise might also be in a specialized area. But the point is that we can't all be experts in all areas. For example, many business owners don't know everything there is to know about computers. That skill isn't a prerequisite to business ownership and is a big relief for many. Lots of company owners simply hire IT people to take care of everything related to computers. They don't worry about what they don't know since they are paying someone else to know.

Much of the time, that strategy [...]

  • Permalink Gallery

    A Date is Such a Little Detail Until an Investigation Hinges on It

A Date is Such a Little Detail Until an Investigation Hinges on It

The world seems to get smaller every day – and more confusing. With global business and transportation becoming a norm, Americans must become more aware and accepting of different ways of doing things. The liter is more prevalent around the world than the gallon. Measurements are based on the metric system in most countries other than the United States.

While these might seem like little things, one very simple, yet critical, difference is that of the format of dates. International Investigators are very cognizant of the differences because in our line of work, it can really matter. In fact, a date may be a life or death bit of information.

Because we conduct so many computer forensic investigations on business devices that conduct transactions in the [...]

Cell Phone Forensics: We’ve Come a Long Way Baby!

When you’re talking cell phone forensics, a cell phone is a cell phone, right? Whoa! Nothing could be further from the truth.

The brand or manufacturer is one variable, but so is each model produced. So to say you have an iPhone is only touching the tip of the information that a cellphone expert needs to successfully complete a mobile phone forensic analysis. With the growing number of manufacturers and models, cell phone forensic tools must adapt and evolve as well. Sim card forensics from a year ago are not sim forensics needed in mobile forensic tools today to keep up with the new technology.

Of course, professionals on the cutting edge of cell phone investigation maintain not only a library of data mining software and [...]