cell phone hack

A Date is Such a Little Detail Until an Investigation Hinges on It

The world seems to get smaller every day – and more confusing. With global business and transportation becoming a norm, Americans must become more aware and accepting of different ways of doing things. The liter is more prevalent around the world than the gallon. Measurements are based on the metric system in most countries other than the United States. While these might seem like little things, one very simple, yet critical, difference is that of the format of dates. are very cognizant of the differences because in our line of work, it can really matter. In fact, a date may be a life or death bit of information. Because we conduct so many computer forensic investigations on business devices that conduct transactions in the global [...]

Cell Phone Forensics: We’ve Come a Long Way Baby!

When you’re talking cell phone forensics, a cell phone is a cell phone, right? Whoa! Nothing could be further from the truth. The brand or manufacturer is one variable, but so is each model produced. So to say you have an iPhone is only touching the tip of the information that a cellphone expert needs to successfully complete a mobile phone forensic analysis. With the growing number of manufacturers and models, cell phone forensic tools must adapt and evolve as well. Sim card forensics from a year ago are not sim forensics needed in mobile forensic tools today to keep up with the new technology. Of course, professionals on the cutting edge of cell phone investigation maintain not only a library of data mining software [...]

Cell Phone Forensics Creates Timeline to Prove Innocence

The smart cell phone is becoming one of the most influential producers of evidence for authorities. has been on the forefront of cell phone forensics since the beginning. As cellular forensics evolves, we stay in step with developments. Locating cellular locations and turning cellular tower triangulation into forensic cellular evidence has become more commonplace and almost a routine in many investigations. Mobile phone analysis to extract data including emails, instant messages and text messages provides evidence, too. The evolution of the technology has continued and now, much of the information in a phone is also stored “on the cloud.” Forensic data analysis by a computer forensic specialist using data extraction software and protocol can produce evidence that is court-worthy. It’s also true that many phones [...]

Veteran Private Investigator Rides the Cutting Edge of Cyber Sleuthing

In a recent article in the Indianapolis Business Journal, CEO, Brenda McGinley explains what it means to be on the cutting edge of investigative work in the new millennium. Cyber sleuthing, something that didn’t even exist two decades ago is one of the fasting growing areas of investigation. Spying has gone digital through cell phones and computers. And, the spy doesn’t have to be anywhere near the subject. The news reveals that governments and big business have even been accused of spying on each other through the covert installation of spyware on computers and cell phones. But digital spying is not limited to the wealthy or the deep pockets of government and business. No, individuals are getting in the game, too, by purchasing illegal spyware [...]

Fugitive Recovery Agent Aided by Investigators

By the time Joe contacted , he was beyond angry and frustrated. After all, Joe is a well known and well respected bail bondsman. He still believes that good people suddenly find themselves in some not-so-good situations, through no fault of their own. Unfortunately, that is exactly why Joe ended up in a bad situation, which brought him to our office. A male acquaintance of Joe’s called him in the middle of the night, begging to be bailed out of jail. Joe knew the guy from the gym where they both worked out every morning. And so, when the guy tearfully explained that he had wrongly been arrested for dealing cocaine, Joe jumped out of bed and headed to the jail. The guy insisted that [...]

Are You Being Watched? GPS vs. Cell Phone Spyware vs. Listening Devices

Debi called to ask that her vehicle be checked for an unauthorized GPS unit. She admits that she has been sneaking around behind Tom’s back (her boyfriend) but it was because she was planning a special birthday event for him. Tom’s best friend, Ryan, let it slip that Tom told him she was at a certain location and there was no way he could have known that. Now she suspects Tom has put a GPS unit on her car and is tracking her movements. When someone asks about bug detection, which includes GPS units, we have to ask a lot of questions. A bug sweep is technically called Technical Surveillance Countermeasures or TSCM. And, frankly, we are discovering that more often than a hidden GPS, [...]

Trends in Private Investigation for 2014

Clearly the investigative world continues to evolve. At we have taken on the latest trends. There is no one investigative technique that is best utilized and blended investigative strategies are more the norm. Two areas where stays on the cutting edge are cellular forensics and social media engineering. For example, the use of digital forensics has become a critical tool in the resource box. We could be doing a cell phone analysis for data recovery or cellular forensics for cellular location evidence. Communication modes from test to email or call logs are all records to substantiate or refute claims of guilt or innocence. Cell phone forensic tools provide facts, not claims. In 2013, industry experts predicted a significant rise in the utilization of mobile device [...]

Insider Tips about Cell Phone Spyware

In any given day at the offices of , the phones ring with inquiries about cell phone spying. The conversation starts out that the caller suspects someone is listening to her conversations and she wonders she needs cell phone spyware detection services. We ask about the common signs that spyware has been installed on a mobile device: Is the battery warm when not in use? Is the battery life noticeably diminished each day? Are there small pauses in audible communication when talking? Are there noises; light beeps, tones or clicks, throughout conversations? Is there any sign of flickering or flashing on display or change of brightness on the phone? Is the Internet access slower than usual? And the big question: have you opened any emails [...]

The Objective Truth, is the Investigator’s Target

During her 30-year career as a private investigator, Caryn Gloyd has provided hundreds of court testimonies. She has logged thousands of hours of surveillance or digital forensics. She has spent countless hours tracking down and interviewing potential witnesses or suspects. In other words, Gloyd has seen it all and heard it all. But when she heard Georgetown Police Chief William Topping speak negatively about private investigators, Gloyd’s pride in her profession was challenged. “Private investigators are there to prove their clients’ cases,” Topping said during a 2009 interview. “There’s no impartiality or neutrality. They get their orders from their employers.” Gloyd went from feeling stunned to more than a little bit irritated by Topping’s statement. She felt that Topping was making a blanket statement that [...]

Digital Forensics is Now Available to Public

You have probably heard the story about how ex-Illinois governor, Rod Blagojevich spends his time these days. Right? He’s behind bars, serving a 14-year sentence for public corruption. A computer forensics expert found enough evidence for more than 18 charges to be filed against Blagojevich. He was caught trying to sell or trade a vacant U.S. Senate seat after President Obama left the Senate for the White House. Because the world continues to demand more and more expertise with technology, digital forensics is in high demand. Defined as the application of science and engineering for the purpose of retrieving digital evidence in a legally acceptable manner, computer forensic analysis is not only used by police detectives. are also well-versed in this area, with the ability [...]

Go to Top