Warning!!! Cell Phones Can Be Used As Bugging/Tracking Devices.

Cell Phone Forensics and the Little Thumbprint

Here at we conduct a lot of mobile device forensics. We have included cellular location evidence in our findings and used cellular tower triangulation, too. Of course, cell phone spying is a continuing issue and we do a lot of cell phone hack detection and removal of the mobile spy. Wireless forensics include cell phone records analysis and cell phone tracking. We take pride in the fact that we are on the cutting edge and have so much experience that we have “seen it all.” That’s why when we read an article about a group of armed robbers on the rampage in the Cleveland area and saw how cell phone forensics were used to catch them we were not surprised. One of the robbers was [...]

Stalker Outed with Digital Forensics and Surveillance

After dealing with the very bizarre behavior of a scorned lover in another state, our female client called . Although she had relocated, she was scared because she knew he had found her. In her previous home, the man had stalked her; repeatedly calling her house and following her around. She had tried several times to seek assistance from law enforcement officers but was told that they could do nothing to help her. Not until a crime was committed. And by then, of course, it would be too late to protect herself. In an attempt to protect herself, the woman moved out of state. She changed her cell phone number. Only family members and a handful of close friends knew her whereabouts. But now weird [...]

Are You Putting Your Computer at Risk?

Recent allegations that an Arkansas police department shared “malicious software” with a defense attorney in an attempt to infiltrate his computer and disrupt his work, brings something to mind that is important for business people and companies to know. The attorney demands that a computer forensic investigation be undertaken by a computer forensic expert. It’s a shocking allegation, and the only way to determine if it’s true is to do a forensic computer analysis. It’s not just shocking, as computer forensic investigators here at , we have to spread the word that it is so easy to be victimized in this way. Any time you accept something into your computer system, you are taking a chance. And I mean anything: Emails Video files Photos Software [...]

Mobile Phones Recording the Best – and Worst – in People

While bullying and harassing classmates has been a long-time problem, today’s technology is not only bringing situations into the light of day, but providing evidence that is admissible in court. It’s not a “rite of passage” anymore. It is a criminal offense and can mean jail time. Last year an autistic boy in Washington, D.C. was tormented by his “friends” at knifepoint. They even made a video of the incident. Just prior to that incident, on a cold Valentine’s Day, he was lured out onto an icy lake and fell through. The “friends” didn’t go to his aid. Instead, they used their phones to make a video of it. Luckily the boy was able to save himself. With the evidence on the phones, these “friends” [...]

Investigator’s Special Tools: The Cell Phone and Cell Phone Forensics

We never like these stories, but they happen. As professionals, all of us here at know that the cell phone has become one of the most productive tools in the investigator’s toolbox. This is why forensic mobile services has exploded: Earlier in the year a nursing student went missing from school in Oklahoma. She had told family that she was coming home for a visit but she never arrived. Foul play is always on the table in these situations and parents, friends and siblings play out all the awful scenarios in their minds. After days the young woman was still missing. No sightings and no leads. But authorities had a cellphone witness – her cell phone. More precisely, they had a ping witness. Through specialized [...]

How Does Your Attorney Get the Answers?

Early days of investigative work usually included some dumpster diving and some physical surveillance (with the identified subject usually being a cheating spouse). But those early days in a private investigator’s life have dramatically expanded. Thanks to technology, investigators have developed an impressive variety of skills and abilities. In the office, our research specialists, computer forensics specialists, online social media specialists and so many other professionals are absolutely some of the top professionals. With that said, has a close professional relationship with the courts and law enforcement officials. Our confidentiality code, coupled with trust and respect allows our investigators to very confidently take on all kinds of cases. Here are just a few ways our investigators can assist an attorney: Locate and interview witnesses for [...]

Accusations Proved False with Investigator’s Facts and Evidence

In every professional capacity, staff gathers the truth. But quite often, the general public assumes that the majority of our time is spent finding hidden divorce assets and proving workers compensation fraud. Because of our stellar reputation with lawyers, a defense attorney and his client appeared in our office, desperate for our assistance. The client, Jon (name changed), was a well-known professional athlete who had been arrested and charged with rape. To make the matter even worse, the victim was a minor female, age 17. As you can probably guess, the media was in a frenzy. Jon and his defense attorney requested assistance from our office, to prove Jon’s innocence. Jon admitted that yes, he briefly attended a party where he met and spoke with [...]

Private Investigators Play Big Role in Detecting Workers Compensation Fraud

As professional investigators, we provide each of our clients with only the best combination of skill sets. Very proudly, we can boast that our investigators are long-time leaders in the areas of digital forensics including both forensic computer analysis and mobile phone forensics. In fact, our lab is one of only a few private, full-service forensics labs in the nation. But along with our dedication to mastering all of the newest technology, we also pay close attention to social issues and criminal activities which, unfortunately, continue to thrive. One of the fastest growing schemes is fraudulent claims filed for workers compensation benefits. In fact, in the most recent studies of this form of fraud, more than 45,000 active cases were active, involving employees pretending that [...]

Private Investigators Pull it All Out to Find Evidence to Refute False Accusations

We never know what the next phone call will bring us here at . Some of the most demanding cases have been those when someone is blamed for something that they did not do. It could be as serious as a felony where they face a long prison term, an accusation of employee embezzlement or a person whose spouse accuses them of marital infidelity. You can hear the frustration – and fear – in their voices when they describe a situation and ask: Have you ever been blamed for something you absolutely did not do? Have you ever been in the company of a rat, but no one else around you seems to also realize that the rat is a rat? Instead, he presents himself [...]

Use of Cell Phone Spyware by Stalkers Growing

Although often marketed under the guise of keeping track of employees’ whereabouts, cell phone tracking software is much more than a GPS. And the software is often misused and takes advantage of the most vulnerable. In fact, stalkers have taken their actions to a whole new, frightening level turning a device that is seen as a life line into a cell phone spy. Cell phone monitoring using malware software can be installed in a matter of a few minutes and the victim can be completely unaware anything is different with their cell phone. Domestic abuse advocates and shelters place cell phones on the top of the list when working with victims. One of the first suggestions they make is turning the phone off, removing the [...]

Go to Top