We recently conducted a case that was a bit out of the ordinary. We were not requested to conduct surveillances, research assets or verify someone’s background. We were hired to assist an attorney in proving if his Client, James, who had previously conducted his case Pro Se, was guilty of aggravated assault and rape. His Client, Our Client’s son, thought he could defend himself in the court of law to prove his innocence. When he did not appear for a court date, he was arrested for contempt of court and from that point on remained in jail until the trial. Of course, our Client, his father, immediately retained the services of an attorney, but the court date was approaching, so the Client also retained [...]
Working with attorneys to help them build cases for their clients is an everyday experience for International Investigators. We deal in the truth and there are two reasons attorneys look to us:
They are trying to gather facts that prove their client’s innocence or create doubt as to guilt
They are trying to gather information to understand the client’s situation better and be ready to defend with facts
One case that illustrates why attorneys use investigators so often included a cell phone investigation. The attorney’s client, Ralph*, was accused of robbing a convenience store. This wasn’t a case of cell phone hack detection or cell phone spying, it was the facts that the cell phone device could supply that was needed.
Most people are aware that cell phone [...]
Recently the Department of Justice issued a US search warrant to Microsoft in regard to emails sent from an Ireland-based subscriber. According to an article in the Guardian, “The United States government has the right to demand the emails of anyone in the world from any email provider headquartered within US borders, Department of Justice (DoJ) lawyers told a federal appeals court…)
While they argue the case in court with Microsoft contending that the DoJ has exceeded its authority, computer forensics firms here in the US are legally bound to obtain permission from device owners and to follow a legal process for cell records in digital forensics investigations.
Some may believe that computer forensics investigations are done in the shadows. That may appear to be the [...]
The owner of an aerospace company that manufactured parts for the government called with some concerns. Recently two of his key sales people had left the company under a cloud of suspicion. The company owner had no tangible proof of wrong-doing, but he had a feeling something wasn’t right.
Both of the employees had been with the company for more than seven years and had always been straight up with him. But over the last year he felt his relationship with them changed. There was a distance that had developed and when they both suddenly resigned, it just didn’t feel good.
They had left their computers and cell phones that were company issued. He’d had IT look at the computer, but both cell phones were locked [...]