digital forensics

Top Ten Reasons to Call A Private Investigator

Cheating Spouse
Cell Phone Forensics
Digital Forensic Analysis
Find Missing Persons
Surveillances
Lie Detector Test
Process Services
Background Checks
Asset Investigation and Financial Investigation
Just to ask questions

Since we offer free consultations and provide recommendations for services that will give our clients the best information for the least amount of money spent, we get a lot of calls to “Just ask Questions”.  We assist in solving issues and problems for business owners, law firms, corporations, insurance companies, and private individuals.  We may talk for a few minutes or hours on the phone or in-person so that we can create a plan of action, a direction to take, and discuss what we can and cannot obtain from our highly skilled sources and databases.

First, we [...]

  • The Top Questions On What Information You Can Expect From A Private Investigator
    Permalink The Top Questions On What Information You Can Expect From A Private InvestigatorGallery

    The Top Questions On What Information You Can Expect From A Private Investigator

The Top Questions On What Information You Can Expect From A Private Investigator

We get a lot of questions with regards to specific requests for various types of investigations.

Mostly:  Is it possible to get…

A Driving History ~ Yes, to obtain a Driving History on an individual, we must have a valid reason to access the Bureau of Motor Vehicles.  EX:  Civil Litigation or Criminal Defense, Pre-Employment Background check (with authorization to release form signed by the Subject)
Registration Records ~ Yes, We will pull the registration records while we are conducting surveillance to verify if in fact an individual is residing at a specific residence.  We will pull a registration record in the process of serving legal documents when the defendant or witness is dodging service.  We also pull registration records for a Civil Litigation Case [...]

Why Have Your Cell Phone Data Forensically Extracted?

There are many reasons an individual, attorney or a company would request an extraction from a device.

An accusation of cheating on your spouse or even worse you suspect your spouse of being unfaithful can likely be addressed by analyzing cellular user data. More than likely there is sufficient evidence on of your cellular devices to either give credibility for or against the accusation. Now, what if the smoking gun was a GPS location saved in a temporary folder destined to soon be deleted? Or what if the text messages between a cheating spouse and their fling have been deleted? Our digital forensics software easily carves out deleted data and GPS location data from phones, but not all phones keep deleted user data the same [...]

  • Permalink Gallery

    Is It Embezzlement if it’s a Spouse Who Steals From Your Company

Is It Embezzlement if it’s a Spouse Who Steals From Your Company

Money, Money, Money, does it make us a better person?  Does it get us through tough times?  Does it help us to help others?  Money can be a blessing and it can be a curse.  And when someone has money and someone doesn’t, then the scale of justice seems a little tilted, doesn’t it?

Mark was a prominent CEO of a rather large company.  He was kind and generous to all his employees.  He remembered his manager’s birthdays, anniversaries, their children’s names and even attended various celebrations among his staff.  He was a leader in his community, donated to various charities and well liked among his peers.  He was a stellar guy to everyone except his soon-to-be ex-wife.

The gifts and life style he afforded her [...]

I’d Like to Phone a Friend

Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We put our Client’s first, we work on their behalf, we do what is right and we stay within the law to make sure anything we find can be used in the court of law. We don’t tell our Clients we are their friends, but we act upon the same basis.

by Friends.com. If you look in the dictionary it will tell you that the definition of friendship is a state of being [...]

  • Permalink Gallery

    He didn’t send the emails, but they came from his computer

He didn’t send the emails, but they came from his computer

Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common.  The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation.

I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]

Is Communication Really Safe

In today’s world, there are so many avenues of communication.  We think face to face is the safest, as there are no footprints of the words we speak.  We fax because there isn’t a written line of communication, we talk on our cell phones without ever thinking someone else is listening.  We email without fear because it’s all done electronically.  We text our family, our work, our friends, even businesses private information we think is safe and only that person is receiving it.  Once we hang up, hit send or end button we walk away thinking our communication is safe and secure.

That safe and secure world is behind us, we are in the 21st century and technology improves every day.  The same technology that [...]

Computer forensics with Inc.

Ever accidently delete a file on your computer only to try in vain to recover it.   Usually, a simple search in the recycle bin will allow you to recover the file.  However, if you permanently deleted the file (such as using the command Ctrl+Shift+Delete) then you won’t have much luck using the recycle bin.  There are available software that the home user can install that will provide a chance to recover the file but what if you don’t feel comfortable using such software or worse, the software did not yield the results you were hoping for?  This is where the professionals come in.

has been in the game for years and employs its own forensics lab for both cellular and computer forensics investigations.  The [...]

Correct approach to Computer Forensics

More than a few clients have walked through the doors of requesting their cell phone or laptop be analyzed by our digital forensics lab. Quite commonly the client is dealing with marital infidelity and highly suspects their spouse of a secret affair.

The first questions we tend to ask in these cases pertain to the ownership of the device in question and inform the client that computer forensic firms in the US are legally obligated to obtain permission from the owner of the device and to follow a legal process for cell records in digital forensics. The same holds true for mobile phone forensics and during a cell phone investigation. A reputable forensic investigator should always gain written permission of the device owner prior [...]

Can Spyware Be Installed On My Cell Phone Wirelessly?

Here at , we routinely get asked about cellular malware and how it is installed. One of the most common questions is if cell phone spyware can be installed on a cellular device Can Spyware Be Installed On My Cell Phone Wirelessly?

Wirelessly. The answer: YES. So, how does one go about installing malware on a phone if they don’t have physical access? Well, there are several ways this can be done and one of which is an IMSI catcher. The police and some of the big three letter spooky agencies use commercially manufactured IMSI catchers such as the Stingray which is built by the Harris Corporation. We won’t get into the actual capabilities of the Stingray as there are legal ramifications in doing so, [...]