computer forensics

The Road to the Altar was Fast – And so was the Path to Divorce Court

More than anything, Ken did not want his sister to be right about the warnings she whispered before he tied the knot with Margo. His sister insisted that Margo's motivation for marriage had a lot to do with Ken's bank account and very little to do with love. Less than a year ago, Ken had lost his beloved first wife to cancer. He believed that he was destined to be a bachelor. So when he met Margo, Ken threw all caution to the wind. Ken ignored his attorney's advice to draw up a pre-nuptial contract. Now that a few months had gone by and several thousand dollars had flown out of his checking and savings accounts, that fog of bliss was beginning to clear. Ken [...]

Gut Intuition Raises Bells, Professional Investigation Delivers Evidence

If your gut screams that something isn't right, don't ignore it! Call on to help you identify what that “something” is. We respect your intuition. And we will help identify that “something” that doesn't feel right. That's exactly what happened in a case involving business partners, Brett and Leo. Three years earlier, these computer wizards launched a technology business. In the second year, the business boomed to the tune of several million dollars. Also in their second year of business, the men were rather intrigued when a new business opened in the same city. Oddly enough, the new business offered many similar products and services. This was odd, since Brett and Leo created many of their own software products. A few months into their third [...]

Social Media Posts Lead to Proof of Insurance Fraud

When was contacted by an insurance company, we were asked to find a missing Maserati. Their customer had filed a claim, stating that this very expensive vehicle had been stolen right out of his garage. But the insurance company saw several red flags in the claim. The claims adjuster discovered the claimant was experiencing serious financial problems and suspected the claim was filed in an effort to get some quick cash. Experience by the teams has shown that people like to brag and show off material belongings and sometimes, illegal antics. And our investigators know what techniques to employ in pursuit of insurance fraud. Immediately we began a background investigation accessing data bases restricted to only the highest levels of investigative teams. We also conducted [...]

Effective Investigators Keep Wide Array of Resources at Their Fingertips

Once viewed as rather mysterious types who hide behind binoculars and frequently conduct dumpster dives for clues, private investigators have finally made their professional presence in the world. The truth is that private investigators have always been persistent, highly professional and intuitive in their quest for the truth. But now, we add technological advancements, such as digital forensics. Well-informed professionals, such as business owners, attorneys and government officials are educated about the impressive skill set offered by . Our list of clients and referral sources has changed right along with the old stereotypes. As necessary, we provide skills from “yesterday's investigations,” such as surveillance and the face-to-face interviews necessary to gather information. We add new skills, such as digital forensics, social media engineering and research [...]

Traditional and Cutting Edge Investigative Techniques Required in Today’s Investigations

When you think about the various ways that some people lie, cheat and steal, certain activities make you immediately decide that a private investigator should be involved. Two examples … When one spouse sees signs of infidelity and suspects an extramarital affair, most of us think about a private investigator. We also think about hiring a private investigator when a business owner suspects his employee of faking a job-related injury and committing workers compensation fraud. But the client base at continues to broaden. We are not limited to certain scenarios where private investigators would be suggested. And so, when a well known company for designer sunglasses suspected a black market traitor in their midst, they contacted the police. But they also hired private investigators. Knowing [...]

Investigators have to Follow the Path Where the Leads Take Them

Long before the attorney called to officially secure services with , his client had decided to part ways with his business partner. From the ground floor, their business had been built with good intentions. But as the business flourished and became more lucrative, his client began to see that his partner no longer offered 50% of the elbow grease. Though he could not prove it, the client also began to suspect that his partner might be stealing from the business, both in cash and assets. So when the attorney’s client announced his intention to part ways immediately, he only voiced his wish to buy out his partner's share. Unfortunately, the partner's attitude was anything but understanding. As the months wore on, the client began to [...]

Private Investigators Step Up For Investigation

As the use of the Internet evolves, more great ways to educate, entertain and inform the world are constantly being developed and implemented. Unfortunately, there is a downside to all the great ways that computers connect the globe, and that means that more and more criminals seek ways to participate in illegal, untraceable crime through computers. One great example of a greedy opportunist would be Chase Lindsey, a Texas chiropractor convicted last year of $3 million auto insurance fraud. For two years, Lindsey participated in a fairly elaborate rip-off scheme, involving fake auto dealerships and fake patients. He allowed fraudulent chiropractic bills to be created under his name, for treatment that was never provided, on patients that never existed. In addition, Lindsey sent fraudulent settlement [...]

Think Computer Forensic Services if you are Concerned about Employee Theft

Employee theft can take many forms, not just stealing cash from the register or lifting product out the backdoor to an associate. In fact, in a recent article on American Express Open Forum, Barry Moltz lists several you might not have even considered, although he says they are common. Set up fake vendor accounts. Steal checks Falsify expense accounts. Buddy punching (timecards) Steal data Most of these can be precluded through strict protocol and a system of checks and balances. If you suspect employee theft, can step in and bring the truth to light. First, computer forensic examination reveals not just documentation to confirm wrongdoing, but also can identify groups of employees conspiring through email and other communications. Even if the employee deletes emails, a [...]

When an Investigation Takes a Turn, Has the Experts

There is so much to say about employee theft and employee embezzlement investigations that it is difficult to sort it out into just one topic. And that’s what we find the clients of count on us for when they call. We are a one-stop service provider, we can provide whatever services are needed – here, in-house. Our clients don’t have to go to one service provider for handwriting analysis, another for covert surveillance and yet one other for computer forensic analysis or cell tower triangulation. does it all and this is why that is so very important: The attorney for a medium-sized small business contacted our office. His client was the company owner.  The owner had caught what he thought was evidence of a long-time [...]

Computer Forensic Investigations Are on the Rise

The use of computer forensics analysis is exploding. A recent video at Investigation.discovery.com provides a brief overview of what is possible, but it also shows that computer forensic investigation is not a do-it-yourself project – it takes a computer forensics specialist to root out the hidden bits of data that computer forensics experts know will be evidence. Police and other authorities are applying digital forensics to their investigations but so are others in the private sector. is one computer forensics firm that works with many attorneys and other organizations to gather data and evidence. We often find two scenarios: Scenario #1 – Is there a case? There is a suspicion of covert or illegal activity and an attorney is brought in to consult on whether [...]

Go to Top