When Craig fell under suspicion of revealing sensitive company proprietary information to an arch competitor of his employer, he was confronted by the corporate security investigator, who had already contacted us at International Investigators. In an interrogation setting, his first rebuttal was to state that he had nothing to do with it and he would submit to a polygraph examination to prove his innocence. Craig had been previously requested to be polygraphed by a police examiner, who would examine him for pre-employment necessary to obtain a civilian position with the police department. Prior to the examination, he had googled “how to beat a polygraph test” and followed the directions on how to beat questions pertaining to questions prior drug use, drug dealing, cheating on college tests, the [...]
A Private Investigative Company like International Investigators, Inc. works with an Attorney to obtain the best results for their Clients. With over 1.2 million attorneys in the US and 80,000 taking the bar exam every year, the need for assistance in providing the court with accurate information is extremely high. We have many attorneys requesting our services on behalf of their Clients. An attorney must have the facts and many times, hiring an Investigative Company is the most effective approach to obtain pertinent information to present to the court.
Consider the following common scenario: an attorney schedules a consultation with a prospective Client, but the Client’s story just doesn’t add up. Sometimes Clients forget some of the facts, but sometimes they are trying to be [...]
It Just Seemed Too Good: How An Employee Gained Unauthorized Access to HIPPA Records and Lost Her Job
Do the best you can, be kind and courtesy, have good work product and treat clients, patients and co-workers with respect, work well with others and be on top of your game. All these applied to our Client, Amanda’s Office Manager Sharon, she was a team player from the outside and yet, things just seemed too good. That saying: If it’s not broken, don’t fix it! So Amanda disregarded signs of change. She didn’t notice Sharon was beginning to be a few minutes late getting to work, the phone rang a couple more times than necessary, the once chipper and eager girl she hired was more lax and a bit distant, but her work was good, so “don’t fix it” applied until one day [...]
Before writing this blog, I did some research on what computer users perceive when they delete a file from their computer.
Instructions on how to delete.
When you delete a file, it's usually moved to the Recycle Bin so that you can restore the file later if necessary. For information about recovering a file, see Recover files from the Recycle Bin.
To permanently remove files from your computer and reclaim any hard disk space they were using, you need to delete the files from the Recycle Bin. You can delete individual files from the Recycle Bin or empty the entire Recycle Bin at once.
Open the Recycle Bin by double-clicking the Recycle Binon the desktop.
Do one of the following:
To permanently delete one file, click it, press Delete, and then click Yes.
1 a (1) : the state of being united to a person of the opposite sex as husband or wife in a consensual and contractual relationship recognized by law (2) : the state of being united to a person of the same sex in a relationship like that of a traditional marriage.
Above is the definition of marriage, and into today’s society marriage can be between a man and a woman, a woman and a woman and a man and a man. The definition doesn’t define each person who enters into a contractual relationship; it just explains the participants and nothing else. Marriage is more than a contract, it is a relationship between two people who come together believing they know each other, that the words [...]
As a full-service investigative firm, International Investigators is the source for a certified computer examiner in the Indianapolis area.
Our experience is part of the reason attorneys turn to us. In fact, it is our knowledge and experience that can really make the difference in some cases.
For instance, we were tasked with completing a computer forensic examination on a work computer used by a person accused of providing confidential information to a competitor. The accused knew his computer would be submitted to us during a general information meeting.
Our impression, because, as investigators, we are highly observant during an investigation, was that the subject was confident, almost smug, that nothing would be found on the device. It was a red flag to us.
The computer forensic specialist [...]