cell phone hack

  • Permalink Gallery

    When an Investigation Takes a Turn, International Investigators, All In Investigations, Inc. Has the Experts

When an Investigation Takes a Turn, International Investigators, All In Investigations, Inc. Has the Experts

There is so much to say about employee theft and employee embezzlement investigations that it is difficult to sort it out into just one topic. And that’s what we find the clients of International Investigators count on us for when they call. We are a one-stop service provider, we can provide whatever services are needed – here, in-house. Our clients don’t have to go to one service provider for handwriting analysis, another for covert surveillance and yet one other for computer forensic analysis or cell tower triangulation. International Investigators, All In Investigations, Inc. does it all and this is why that is so very important:

The attorney for a medium-sized small business contacted our office. His client was the company owner.  The owner had caught [...]

Cell Phone Analysis Proves Truth of Alibi

Cell phone forensics is a helpful tool to corroborate an alibi. With just about everyone carrying or using cell phones, there is great potential to uncover the truth.

For instance, in a case where a woman was murdered and her boyfriend was suspected, he claimed to have been miles away at the home of another woman. She backed up his alibi. After his defense attorneys were able to meet cell phone legal compliance to obtain the phones of the boyfriend and his woman friend; and go through the legal process for cell records of the dead woman, they were able to piece together the facts.

The ‘good-bye’ signal from the dead woman’s mobile came from a location several miles north of the boyfriend’s house. Using mobile [...]

Delete Doesn’t Mean Gone to a Cell Phone Analyzer

Delete. Delete. Delete. And you think it’s done and gone. Well, you’re probably wrong.

Once information is searched out, read, written or stored on a digital device, it is most likely there forever – if only in bits and pieces. But for digital forensics teams, that is often enough to piece together a bigger picture.

Not too long about there was quite a bruhaha in the media about a secret subpoena of two months’ worth of phone records from the Associated Press. Authorities went through the legal process for cell records and subpoenaed the cellphone records in order to piece together what they could about an alleged leak of sensitive national security information.

They weren’t so concerned about cell tower triangulation or mobile phone tracking, they were [...]

  • Permalink Gallery

    Appropriate Legal Wording for Cell Records Requests Critical Time Saver

Appropriate Legal Wording for Cell Records Requests Critical Time Saver

Can you image the amount of data collected by the phone companies? Not data on customers, but the data that is created by customers. They can store service records – but for only short periods – and once it’s gone, it’s gone.

Because the service provider data is time sensitive, if an attorney or the authorities need the information for a case, a preservation letter has to be created and sent immediately to all the service providers involved. The preservation letter asks them to save data for a specific account and is urgent before the data is eliminated. The legal wording for cell records and preservation is specific to each service provider and if not complete and accurate, the request could be denied.

The service providers [...]

  • Permalink Gallery

    Forensic Cell Tower Evidence is Accurate Only with Complete and Complex Analysis

Forensic Cell Tower Evidence is Accurate Only with Complete and Complex Analysis

International Investigators received a call from a defense attorney on the east coast regarding a cellular forensics report he had received from the prosecution that concluded that the forensic cellular evidence proved his client was in the area of the scene of a crime at the time the crime was committed. The prosecutor had no physical evidence placing his client at the scene, and his client had an alibi corroborated by the client’s mother.

He requested our cellphone expert review the report. Cell phone tracking using cellular tower triangulation is not as simple as it initially looks. And because it looks like a simple identification process, the conclusions can be inaccurate and erroneous.

In order to accurately go about locating cellular locations, not only does the [...]

Cellular Forensics Even Applies to Drop Phones

Data Extraction. That’s what provides the evidence so many of our clients want when they request a mobile phone forensic analysis. Cell phone forensic tools allow a cellular forensics specialist to create an exact image of the cell phone hard drive and from that, complete a mobile phone analysis. The analysis will uncover any evidence on the phone and the data can be extracted as proof.

International Investigators has been doing cell phone forensics for a long while – before the proliferation of smart phones in the hands of just about everyone. For many, mobile phone forensics is new and they don’t understand the extent of the work we can do.

We had a case where a woman’s husband had started carrying a drop phone in [...]

Bug Detection Out of the Office

During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. International Investigators was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how. The common denominator was that the financial planner had entertained every one of the lost clients on his boat. Of course they had talked some business and the financial planner believed there must have been a listening device or some sort of spy equipment on the craft.

When a TSCM sweep is requested, it is most often for an office or meeting facility. But in reality, a bug [...]

Cell Phone Forensics Exposes Source of Harassing Messages

International Investigators was recently called into an interesting case that could have easily escalated into violence or a life changed forever.

We got a call from an attorney who was representing a couple and their college-age daughter. The daughter was receiving harassing texts, calls and messages on her cell phone. They believed the former girlfriend of a new boyfriend was behind them.

Their attorney knew it was possible to peel back the layers to get to an IP address to determine the source, but he didn’t know exactly how. So he called us.

Part of the cell phone forensic process means obtaining records from the service provider. You have to use their language and have legal authority to request the records. Communicating and having the most precise [...]

Cell Phone Records Critical to Defense Attorney’s Arsenal

Cell phone forensics is becoming as important a tool for attorneys as DNA evidence. All you have to do is stand in line at any store or sit in any restaurant to see that most customers are either talking on one or using it to find the best deal or discount coupon. That proliferation of devices creates a window for cell mapping, cell tower triangulation and other cell phone forensics tools that can provide evidence to support guilt or innocence in connection with crimes – and defense of clients.

One of the tools mobile phone forensic analysis includes is the use of cellphone records.

Records could include a variety of information, including:

Records for blocked callers
Records for restricted callers
Call history
Text and email history
[...]

  • Permalink Gallery

    Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Let’s talk cell phone spyware detection. Remember this number: 95%. McAfee estimates that’s the percentage of malware ever devised that has been created in the past year. And, the amount of malware detected by them increased 44% last year, too.

Those are dismal numbers that illustrate the growing threat to online security. Many of the major threats targeting large banks, online moguls like Facebook and Twitter recently have come from Europe and Asia but that doesn’t mean that the everyday user is exempt. The targets are cell phones and tablets. But the techniques for phishing are still the old school kind – because they work.

The large corporations are hit because malware is accessed through links to compromised or malicious sites. Once that site is accessed, [...]