private investigations

  • The Top Questions On What Information You Can Expect From A Private Investigator
    Permalink The Top Questions On What Information You Can Expect From A Private InvestigatorGallery

    The Top Questions On What Information You Can Expect From A Private Investigator

The Top Questions On What Information You Can Expect From A Private Investigator

We get a lot of questions with regards to specific requests for various types of investigations.

Mostly:  Is it possible to get…

A Driving History ~ Yes, to obtain a Driving History on an individual, we must have a valid reason to access the Bureau of Motor Vehicles.  EX:  Civil Litigation or Criminal Defense, Pre-Employment Background check (with authorization to release form signed by the Subject)
Registration Records ~ Yes, We will pull the registration records while we are conducting surveillance to verify if in fact an individual is residing at a specific residence.  We will pull a registration record in the process of serving legal documents when the defendant or witness is dodging service.  We also pull registration records for a Civil Litigation Case [...]

What About Bob?

We live in a crazy world and these are wild times. Listen to the news. I may view things a bit differently than you, but at least twice a newscast, I think “they should have checked out their employees a bit more carefully.” Sure, nowadays, every company has their employees sign an authorization form for a background check, but is the information you are buying legitimate?  Is it verified?  Is it TRUE?  Information is everywhere, and we all have access to it.  I’m baffled by the amount of MISINFORMATION that is sold by the megabyte.

Let’s make an example out of Bob. Bob’s looking for a job.  His resume is to your liking, the education, the work history, the overseas humanitarian efforts, even his charitable [...]

It Felt Right until it Didn’t

When our Client engaged our services, he gave us some background on his son. Both he and his wife were very proud of their son’s choice of friends and extracurricular activities. Some might say he had a good head on his shoulders.

After graduating from college, he enrolled in a trade school. Just a few months after classes started, he brought home a date for a family dinner. His date appeared to be friendly, but something about her didn’t sit well with either of his parents.

Later in the month during a father/son outing, his son made an odd remark about his new girlfriend, she had a car, but didn’t drive, she talked about her friends, but he had yet to meet the man she always [...]

When You Are Wrongly Accused?

My Client, George, who has had a life partner (Mary) for over 20 years, was falsely accused of the mistreatment of her. And the accuser, a relative of Mary’s, appeared to be somewhat believable. Was it out of jealousy, monetary reasons or just their belief that their mother was being cared for by my Client, a man whose commitment to Mary did not include a “License”. The accuser had actually made several statements she held a license in healthcare and knew what was best for her mother. My Client was adamant he provided the best care possible, but the accusations made against him were compounding, allegations of improper feeding, over medicating and unsanitary conditions and he had come to the conclusion he could not [...]

November 12th, 2018|Background Checks, Due Diligence|

Dating through Social Media

In life it isn’t easy meeting the right person, the woman/man of your dreams in a chance meeting.

The one individual in the whole world that you feel completes you, gets you, loves you, and puts you above everything else.  The last face you see before you go to bed at night and the last voice you hear before you fall asleep.

The internet and social media brings these wants closer to you than you would have even been able to do on your own.  Once click and you see that perfect person posted on your screen with all the features you ever wanted, the smile that lights up your face, the eyes, the hair and finally the body; all are perfection, or are they?

We have [...]

Teenagers and Cell Phones

Here at , we pay attention.  We listen and learn and share our expertise and case example outcomes with our Clients.  It usually starts out like “I bet you haven’t heard this before” and in most cases we have.  What we haven’t heard are the thought patterns and real life situations with a teenager.  Therefore, we asked an 18 year old female granddaughter of one of our employees the importance of her phone, what she does with it, how she sets up her passwords and who she shares with.  This is what she told us:

The life of an 18 year old is so drama filled and complexly effortless now that everyone has a cell phone. Just one touch of a button and you’ve blocked [...]

Would You Immediately Accept that You are a Lost Heir?

Have you ever head of a “successional” or “probate” genealogist? Apparently, they do exist, at least in Europe, but the opposite side of the coin is that some who claim the title are con artists. Yes, that means there is yet one more trick coming to light.

While investigators like are pros who know how to find a missing person or find missing heirs, the process undertaken by a successional genealogist is a little different.

What is usually involved is a contract stating that they get 30 -35% of the inheritance if they can trace you back to an estate that is pending. Now, one story I read talked about a man whose grandfather had a great-nephew who died, unmarried and leaving no will. The [...]

  • Permalink Gallery

    Is the Purchase of a Smartwatch Setting You up for Digital Forensics Services?

Is the Purchase of a Smartwatch Setting You up for Digital Forensics Services?

Who do you know with one of the smart, sleek, new smartwatches? Ohhh. So Cool! And so vulnerable to hacking. More so than a smartphone or a tablet.

Why?

A recent article in the Christian Post explains. According to a recent study by Dr. Frank Breitinger, associate director of the University of New Haven Cyber Forensics Research and Education Group in Connecticut, there is a “lack of encryption and an unsecure authentication system” in all the smartwatches they tested.

In the study they tried to infiltrate the devices to get a variety of information such as emails, calendars, messages, health, fitness and financial data. In all cases, if the information was on the device, they were able to get it!

Computer forensics experts like those at warn [...]

  • Permalink Gallery

    Do You Think Computer Forensics Conjures Up the Past Like Magic?

Do You Think Computer Forensics Conjures Up the Past Like Magic?

Computer forensics is not magic, in fact it is very technical in nature and can be very exacting. People always wonder how the computer forensics experts at can “conjure” up “stuff” from computers that the owners thought was gone. How does forensics data recovery work?

When it comes to files, forensic computer investigations and computer forensic analysis works from a three-pronged approach.

The first is to recover files as we users know them. For example, a Word document or an Excel worksheet or workbook. These are files that openly exist on the computer. These are not files the user thinks has been deleted or removed. Although some of those could exist in their original form in the recycle or trash folders.
The second is the metadata. [...]

Computer Forensics Done Right – or not at all

Recently the Department of Justice issued a US search warrant to Microsoft in regard to emails sent from an Ireland-based subscriber. According to an article in the Guardian, “The United States government has the right to demand the emails of anyone in the world from any email provider headquartered within US borders, Department of Justice (DoJ) lawyers told a federal appeals court…)

While they argue the case in court with Microsoft contending that the DoJ has exceeded its authority, computer forensics firms here in the US are legally bound to obtain permission from device owners and to follow a legal process for cell records in digital forensics investigations.

Some may believe that computer forensics investigations are done in the shadows. That may appear to be the [...]