cell phone tapping

Dating through Social Media

In life it isn’t easy meeting the right person, the woman/man of your dreams in a chance meeting.

The one individual in the whole world that you feel completes you, gets you, loves you, and puts you above everything else.  The last face you see before you go to bed at night and the last voice you hear before you fall asleep.

The internet and social media brings these wants closer to you than you would have even been able to do on your own.  Once click and you see that perfect person posted on your screen with all the features you ever wanted, the smile that lights up your face, the eyes, the hair and finally the body; all are perfection, or are they?

We have [...]

Can I Help You?

It was a hectic day here at International Investigators when the door opened and a small framed middle aged man walked in. He was a rather nerdy fellow with small eyes and bushy eyebrows. In his hand was a small box; 5 inches by 8 inches and he carried it like it was filled with precious gems. He walked right into my office, sat down and said, “I’m here to help you!” which I found strange, because I believed I was here to help him. When I asked what he could do for me, he laid the box down on my desk, opened it up and lifted a smart phone out of it. We both looked at each other with surprise, me because it [...]

  • Permalink Gallery

    Is the Purchase of a Smartwatch Setting You up for Digital Forensics Services?

Is the Purchase of a Smartwatch Setting You up for Digital Forensics Services?

Who do you know with one of the smart, sleek, new smartwatches? Ohhh. So Cool! And so vulnerable to hacking. More so than a smartphone or a tablet.

Why?

A recent article in the Christian Post explains. According to a recent study by Dr. Frank Breitinger, associate director of the University of New Haven Cyber Forensics Research and Education Group in Connecticut, there is a “lack of encryption and an unsecure authentication system” in all the smartwatches they tested.

In the study they tried to infiltrate the devices to get a variety of information such as emails, calendars, messages, health, fitness and financial data. In all cases, if the information was on the device, they were able to get it!

Computer forensics experts like those at International Investigators [...]

Cell Phone Forensics and the Little Thumbprint

Here at International Investigators we conduct a lot of mobile device forensics. We have included cellular location evidence in our findings and used cellular tower triangulation, too. Of course, cell phone spying is a continuing issue and we do a lot of cell phone hack detection and removal of the mobile spy.

Wireless forensics include cell phone records analysis and cell phone tracking. We take pride in the fact that we are on the cutting edge and have so much experience that we have “seen it all.”

That’s why when we read an article about a group of armed robbers on the rampage in the Cleveland area and saw how cell phone forensics were used to catch them we were not surprised.

One of the robbers was [...]

Not All Office Spying is About Corporate Espionage

Many times, our clients are flabbergasted after we conduct a very confidential TSCM sweep of their offices. When TSCM services are combined with digital forensics, the findings catch them by surprise.

It’s not uncommon for IT departments to be asked to monitor employee’s habits in surfing the Internet. Today with so much of the business world transacting business through the Internet, monitoring has been reduced to applying restrictions and developing Internet use policies.

What Sort of Investigation?

One C-level executive had a problem and contacted International Investigators directly. He was a little uncertain about what he wanted.

There was a female admin who was giving him some weird vibes. So much so that he went to personnel to find out where she had worked previously because he was [...]

TSCM Services Still a Productive Measure for Investigation

In today’s highly advanced technical age, very often the common person can conduct some research, click on some links, learn a lot in a limited amount of time and trace down all kinds of information.

But of course, even in this age of finding a lot about a lot in a limited amount of time, International Investigators still has professional access to data bases that are unavailable to the average person.

Then, we also make it our business to remain on the cutting edge of technology, especially regarding digital forensics, forensic computer analysis and forensic data recovery. Even with technology expanding in those directions, some people forget about the need for Technical Surveillance Countermeasures, or TSCM. Some believe that the collection of cell phones, tablets and [...]

Disruptive Computer Hacking on the Rise

Everyone knows that businesses face risks from cyber threats. However, what isn’t realized is that the risk isn’t just a problem for BIG business, it’s a problem for EVERY business.

As leaders in computer forensic investigation and experience as spyware detectors and spyware removers, the computer forensics experts at International Investigators can tell you that the Allianz Risk Barometer 2015 is accurate in reporting that disruptive scenarios are increasing in number.

The point they want to make is that risk management must reflect this new reality and we agree.

Attacks made on servers and systems to infiltrate and steal information and data are still a prime concern, but that is not the only scenario that computer forensics companies are being called in to address.

No, there are attempts [...]

  • Permalink Gallery

    Mobile Phones Recording the Best – and Worst – in People

Mobile Phones Recording the Best – and Worst – in People

While bullying and harassing classmates has been a long-time problem, today’s technology is not only bringing situations into the light of day, but providing evidence that is admissible in court. It’s not a “rite of passage” anymore. It is a criminal offense and can mean jail time.

Last year an autistic boy in Washington, D.C. was tormented by his “friends” at knifepoint. They even made a video of the incident. Just prior to that incident, on a cold Valentine’s Day, he was lured out onto an icy lake and fell through. The “friends” didn’t go to his aid. Instead, they used their phones to make a video of it. Luckily the boy was able to save himself. With the evidence on the phones, these “friends” [...]

GPS and Your Cell Phone Could Prove Your Innocence

Just like that popular TV show says, “You are being watched.” Surveillance equipment is evident on buildings, in stores, on streets and just about everywhere you go and most of it is in no way covert surveillance.

Surveillance cameras are a double-edged sword. While some people are unnerved by the constant video of their actions and behaviors, other people, those who are falsely accused of a crime, are thankful for that video because it becomes evidence that they are not guilty of the crime. Computer surveillance and listening devices are now more likely to be spy equipment than the ever-present surveillance camera.

People are more likely to be victims of covert cell phone tracking than video tracking. Yes, once again the wonders of the cell phone [...]

Investigative Industry More Than 150 Years Old and Growing

Like every other career in America, private investigation has been positively affected by technology. In fact, technology has helped International Investigators go global, literally. Our reputation and relationships with law enforcement and other investigative professionals now spans several countries. We are extremely proud of that fact. The more worldly we become, the more possible it is to meet the needs of clients with international cases.

Because International Investigators is a very well-known and well-respected firm, attorneys and judges trust out ethics when we provide evidence for the courts. And because of that very polished reputation, attorneys come to us with an immediate comfort level, knowing their clients will be well-served. They trust that we are highly confidential. We get things done.

Specialists in computer forensic investigation [...]