digital forensics

  • Permalink Gallery

    Is It Embezzlement if it’s a Spouse Who Steals From Your Company

Is It Embezzlement if it’s a Spouse Who Steals From Your Company

Money, Money, Money, does it make us a better person?  Does it get us through tough times?  Does it help us to help others?  Money can be a blessing and it can be a curse.  And when someone has money and someone doesn’t, then the scale of justice seems a little tilted, doesn’t it?

Mark was a prominent CEO of a rather large company.  He was kind and generous to all his employees.  He remembered his manager’s birthdays, anniversaries, their children’s names and even attended various celebrations among his staff.  He was a leader in his community, donated to various charities and well liked among his peers.  He was a stellar guy to everyone except his soon-to-be ex-wife.

The gifts and life style he afforded her [...]

I’d Like to Phone a Friend

Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We put our Client’s first, we work on their behalf, we do what is right and we stay within the law to make sure anything we find can be used in the court of law. We don’t tell our Clients we are their friends, but we act upon the same basis.

by Friends.com. If you look in the dictionary it will tell you that the definition of friendship is a state of being [...]

  • Permalink Gallery

    He didn’t send the emails, but they came from his computer

He didn’t send the emails, but they came from his computer

Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common.  The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation.

I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]

Is Communication Really Safe

In today’s world, there are so many avenues of communication.  We think face to face is the safest, as there are no footprints of the words we speak.  We fax because there isn’t a written line of communication, we talk on our cell phones without ever thinking someone else is listening.  We email without fear because it’s all done electronically.  We text our family, our work, our friends, even businesses private information we think is safe and only that person is receiving it.  Once we hang up, hit send or end button we walk away thinking our communication is safe and secure.

That safe and secure world is behind us, we are in the 21st century and technology improves every day.  The same technology that [...]

Computer forensics with International Investigators Inc.

Ever accidently delete a file on your computer only to try in vain to recover it.   Usually, a simple search in the recycle bin will allow you to recover the file.  However, if you permanently deleted the file (such as using the command Ctrl+Shift+Delete) then you won’t have much luck using the recycle bin.  There are available software that the home user can install that will provide a chance to recover the file but what if you don’t feel comfortable using such software or worse, the software did not yield the results you were hoping for?  This is where the professionals come in.

International Investigators has been in the game for years and employs its own forensics lab for both cellular and computer forensics investigations.  [...]

Correct approach to Computer Forensics

More than a few clients have walked through the doors of International Investigators requesting their cell phone or laptop be analyzed by our digital forensics lab. Quite commonly the client is dealing with marital infidelity and highly suspects their spouse of a secret affair.

The first questions we tend to ask in these cases pertain to the ownership of the device in question and inform the client that computer forensic firms in the US are legally obligated to obtain permission from the owner of the device and to follow a legal process for cell records in digital forensics. The same holds true for mobile phone forensics and during a cell phone investigation. A reputable forensic investigator should always gain written permission of the device owner [...]

Can Spyware Be Installed On My Cell Phone Wirelessly?

Here at International Investigators, we routinely get asked about cellular malware and how it is installed. One of the most common questions is if cell phone spyware can be installed on a cellular device Can Spyware Be Installed On My Cell Phone Wirelessly?

Wirelessly. The answer: YES. So, how does one go about installing malware on a phone if they don’t have physical access? Well, there are several ways this can be done and one of which is an IMSI catcher. The police and some of the big three letter spooky agencies use commercially manufactured IMSI catchers such as the Stingray which is built by the Harris Corporation. We won’t get into the actual capabilities of the Stingray as there are legal ramifications in doing [...]

  • Permalink Gallery

    You think it’s just a bump in the road, when in fact, it’s a full fledge road block

You think it’s just a bump in the road, when in fact, it’s a full fledge road block

Mary would drive home every night from work with a heavy heart and so many thoughts running through her mind. Every night she wondered what time her husband would arrive home, would he be waiting for her or her waiting for him. It was a dreadful game she played with herself.

For the last year and a half of her fifteen year marriage, Mary kept the thought of that little bump in the road to herself hoping it wouldn’t get any bigger, but that wouldn’t be the case for her. Mary felt she was dealing with an unfaithful husband and didn’t want to believe he could be a cheating spouse. An attorney friend recommended Mary to meet with International Investigators to determine if in fact [...]

  • Permalink Gallery

    It’s the Little Details That Come from Computer Forensics Experience That Breaks Cases Wide Open

It’s the Little Details That Come from Computer Forensics Experience That Breaks Cases Wide Open

As a full-service investigative firm, International Investigators is the source for a certified computer examiner in the Indianapolis area.

Our experience is part of the reason attorneys turn to us. In fact, it is our knowledge and experience that can really make the difference in some cases.

For instance, we were tasked with completing a computer forensic examination on a work computer used by a person accused of providing confidential information to a competitor. The accused knew his computer would be submitted to us during a general information meeting.

Our impression, because, as investigators, we are highly observant during an investigation, was that the subject was confident, almost smug, that nothing would be found on the device. It was a red flag to us.

The computer forensic specialist [...]

  • Permalink Gallery

    Do You Think Computer Forensics Conjures Up the Past Like Magic?

Do You Think Computer Forensics Conjures Up the Past Like Magic?

Computer forensics is not magic, in fact it is very technical in nature and can be very exacting. People always wonder how the computer forensics experts at International Investigators can “conjure” up “stuff” from computers that the owners thought was gone. How does forensics data recovery work?

When it comes to files, forensic computer investigations and computer forensic analysis works from a three-pronged approach.

The first is to recover files as we users know them. For example, a Word document or an Excel worksheet or workbook. These are files that openly exist on the computer. These are not files the user thinks has been deleted or removed. Although some of those could exist in their original form in the recycle or trash folders.
The second is the [...]