private investigations

Are You Aware of What You’re Leaving on That Sim Card?

The good old factory reset has done enough for you to get rid of that old phone, right? NOTHING could be less true! And that could be enough to bring your business, your marriage or your financial life down for good. Let me explain. So many people are willing to donate – or sell – their old phones when the newest version arrives on their doorstep. The cellphone expert here at knows that all he has to do is run a little sim card forensics and he can collect all sorts of data from that donated phone. And it’s not just a jumble of code, no, it’s phone numbers, names, messages and personal information. There was a blog post we stumbled across online where a [...]

Not All Office Spying is About Corporate Espionage

Many times, our clients are flabbergasted after we conduct a very confidential TSCM sweep of their offices. When TSCM services are combined with digital forensics, the findings catch them by surprise. It’s not uncommon for IT departments to be asked to monitor employee’s habits in surfing the Internet. Today with so much of the business world transacting business through the Internet, monitoring has been reduced to applying restrictions and developing Internet use policies. What Sort of Investigation? One C-level executive had a problem and contacted directly. He was a little uncertain about what he wanted. There was a female admin who was giving him some weird vibes. So much so that he went to personnel to find out where she had worked previously because he [...]

TSCM Services Still a Productive Measure for Investigation

In today’s highly advanced technical age, very often the common person can conduct some research, click on some links, learn a lot in a limited amount of time and trace down all kinds of information. But of course, even in this age of finding a lot about a lot in a limited amount of time, still has professional access to data bases that are unavailable to the average person. Then, we also make it our business to remain on the cutting edge of technology, especially regarding digital forensics, forensic computer analysis and forensic data recovery. Even with technology expanding in those directions, some people forget about the need for Technical Surveillance Countermeasures, or TSCM. Some believe that the collection of cell phones, tablets and other [...]

Do You Suspect Assets are Hidden or Missing as You Face Divorce?

Sadly, statistics reveal that more and more couples in their 50s and 60s are ending their marriages. This is such a prevalent occurrence that it has now been dubbed “gray divorce.” In many instances, the wife has spent the marriage as a stay-at-home mother, also providing emotional support for her professionally busy spouse. Very often, in gray divorce, the wife is the identified victim, suffering long-term post-divorce financial struggles. Many of the women in these divorce situations have limited work skills and limited education. Their ability to grab good-paying jobs after divorce is fairly non-existent. Lack of education and job experience work against them, as well as their age. A level of naivety is also seen among women in their 50s and older. For most, [...]

Surveillance Underscores the Intentions of Long Lost Uncle

Here at we are witness to the best in people as well as the dark underside of human interactions. We have front row seats to stories and actions that some people might not ever see or be able to understand. While they are human stories filled with a wide array of emotions, we are involved in gathering facts and finding out the truth. Often our work involves attorneys who are working with an estate. We are tasked with finding a missing heir or unknown heirs for the estate. However, sometimes estate work requires a different kind of investigation. Take this story for instance: Soon after their mother was admitted into hospice, Janet and Kim’s long-lost uncle Scott suddenly began to visit the dying sister he [...]

Stalker Outed with Digital Forensics and Surveillance

After dealing with the very bizarre behavior of a scorned lover in another state, our female client called . Although she had relocated, she was scared because she knew he had found her. In her previous home, the man had stalked her; repeatedly calling her house and following her around. She had tried several times to seek assistance from law enforcement officers but was told that they could do nothing to help her. Not until a crime was committed. And by then, of course, it would be too late to protect herself. In an attempt to protect herself, the woman moved out of state. She changed her cell phone number. Only family members and a handful of close friends knew her whereabouts. But now weird [...]

Insurance Fraud Exposed in Surveillance Recordings

Every year, billions of dollars are lost due to people filing false insurance claims. Because that kind of loss tends to trickle downward, the rest of us pay much higher premiums. Unfortunately, there are a lot of dishonest people in the world. They are the ones who torch their own vehicles and then insist that their cars were stolen. They set fire or hire someone to set fire to their homes and businesses. And, you guessed it, they lie about it in an effort to rake in the big bucks. Those who commit workers compensation fraud or disability insurance fraud to collect benefits also very negatively affect the rest of us and the workforce in general. Most of the time, a person files a false [...]

Are You Putting Your Computer at Risk?

Recent allegations that an Arkansas police department shared “malicious software” with a defense attorney in an attempt to infiltrate his computer and disrupt his work, brings something to mind that is important for business people and companies to know. The attorney demands that a computer forensic investigation be undertaken by a computer forensic expert. It’s a shocking allegation, and the only way to determine if it’s true is to do a forensic computer analysis. It’s not just shocking, as computer forensic investigators here at , we have to spread the word that it is so easy to be victimized in this way. Any time you accept something into your computer system, you are taking a chance. And I mean anything: Emails Video files Photos Software [...]

Why Computer Forensics Must be Handled by Experts

Getting and maintaining public trust is a critical component of business. So when a situation arises that can impact that trust, the phone at rings. Sometimes it’s an attorney, sometimes it is a CEO or CFO, and sometimes no one except the business owner can make the call. Recently in Indianapolis a CFO of a large business was arrested for theft. Big theft. Not only was he accuse of diverted company funds to his own personal use, it was believed that he had used funds from a client at a former place of employment to cover the funds taken from his current employer. It is a tangled web that is certain, in this case and in many others. Which is the reason why certified computer [...]

Infidelity is Not Just in Marriage

When the topic of infidelity comes up, almost without pause, people think marital infidelity. Cheating wives. Cheating husbands. But, in reality, the potential for a cheating boyfriend or cheating girlfriend is just as, or more, likely. Perhaps it is because there is less of a commitment, less of a financial investment that secret affairs are really less discreet affairs. Relationships between a boyfriend and a girlfriend can be as long-lasting and as intense as a marriage – and as difficult to break as a marriage. We know from experience here at that these breakups can be as contentious as the most hostile divorce. It’s not uncommon for our digital forensics and the cell phone hack detection or spyware detector services on computers to center on [...]

Go to Top