spy listening device

Not All Office Spying is About Corporate Espionage

Many times, our clients are flabbergasted after we conduct a very confidential TSCM sweep of their offices. When TSCM services are combined with digital forensics, the findings catch them by surprise.

It’s not uncommon for IT departments to be asked to monitor employee’s habits in surfing the Internet. Today with so much of the business world transacting business through the Internet, monitoring has been reduced to applying restrictions and developing Internet use policies.

What Sort of Investigation?

One C-level executive had a problem and contacted International Investigators directly. He was a little uncertain about what he wanted.

There was a female admin who was giving him some weird vibes. So much so that he went to personnel to find out where she had worked previously because he was [...]

Surveillance Underscores the Intentions of Long Lost Uncle

Here at International Investigators we are witness to the best in people as well as the dark underside of human interactions. We have front row seats to stories and actions that some people might not ever see or be able to understand. While they are human stories filled with a wide array of emotions, we are involved in gathering facts and finding out the truth.

Often our work involves attorneys who are working with an estate. We are tasked with finding a missing heir or unknown heirs for the estate. However, sometimes estate work requires a different kind of investigation. Take this story for instance:

Soon after their mother was admitted into hospice, Janet and Kim’s long-lost uncle Scott suddenly began to visit the dying sister [...]

September 24th, 2015|Private Investigations, TSCM|
  • Permalink Gallery

    Private Investigators Pull it All Out to Find Evidence to Refute False Accusations

Private Investigators Pull it All Out to Find Evidence to Refute False Accusations

We never know what the next phone call will bring us here at International Investigators. Some of the most demanding cases have been those when someone is blamed for something that they did not do. It could be as serious as a felony where they face a long prison term, an accusation of employee embezzlement or a person whose spouse accuses them of marital infidelity.

You can hear the frustration – and fear – in their voices when they describe a situation and ask:

Have you ever been blamed for something you absolutely did not do?
Have you ever been in the company of a rat, but no one else around you seems to also realize that the rat is a rat? Instead, he presents himself as [...]

TSCM Foils Entrepreneurial Voyeur and His Spy Equipment

You’ve all seen the movies, but truth be told, actual real-life situations beat out most all of the movies.

Take for instance the situation a recent call brought to International Investigators. The caller was a professional woman in her 40s who we’ll call Mary – and she was beside herself. Mary had received a call from a friend on the other side of the country telling Mary that she’d been featured in an online porn movie.

Mary was VERY certain she had never participated in the production of a porn film and she couldn’t hardly believe there was any truth to it. So her friend sent her the link via email. To her horror, there she was – in her bedroom!

That’s when she called International Investigators. [...]

Suspicions Lead to Fruitful Bug Detection

We had a client who had taken on a special, highly confidential project at work. The reason he called was because he was concerned about inadvertently leaking information. He kept asking “Is my phone tapped?” He wasn’t paranoid, but suspicious.

What made him suspicious?

Electronic devices were acting “weird” and although he said he had an electric personality, these odd sounds and happenings had never happened before. He described some of them:
His AM/FM car radio had developed interference on several stations that had been previously clear. This could be the case of an eavesdropper since antennas can be exploited by eavesdroppers.
Sounds were coming from his office phone line when it was not in use.
Sometimes his office phone would ring and no one would be there or [...]

December 24th, 2013|Bug Sweeps, TSCM|

TSCM Sweep Rounds Up the Bad Guys

Truth is the basis for fictional story lines, that’s for sure. International Investigators was called in on a case by an attorney that had a female client who was being blackmailed. The blackmailer said he had video of her inside her apartment in a 28-floor building. He described the apartment and conversations held there in detail so she knew he had access.

Immediately it was evident that technical surveillance countermeasures (TSCM) were called for. A TSCM sweep of the apartment was scheduled. Since both conversations and visual details were given, it was evident that covert surveillance and spy listening devices were present in some form or fashion. The target was eavesdropping devices and surveillance equipment.

Using sophisticated counter surveillance equipment used for electronic bug detection, hidden [...]

Bug Detection Out of the Office

During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. International Investigators was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how. The common denominator was that the financial planner had entertained every one of the lost clients on his boat. Of course they had talked some business and the financial planner believed there must have been a listening device or some sort of spy equipment on the craft.

When a TSCM sweep is requested, it is most often for an office or meeting facility. But in reality, a bug [...]

Cell Phone Records Critical to Defense Attorney’s Arsenal

Cell phone forensics is becoming as important a tool for attorneys as DNA evidence. All you have to do is stand in line at any store or sit in any restaurant to see that most customers are either talking on one or using it to find the best deal or discount coupon. That proliferation of devices creates a window for cell mapping, cell tower triangulation and other cell phone forensics tools that can provide evidence to support guilt or innocence in connection with crimes – and defense of clients.

One of the tools mobile phone forensic analysis includes is the use of cellphone records.

Records could include a variety of information, including:

Records for blocked callers
Records for restricted callers
Call history
Text and email history
[...]

  • Permalink Gallery

    Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Let’s talk cell phone spyware detection. Remember this number: 95%. McAfee estimates that’s the percentage of malware ever devised that has been created in the past year. And, the amount of malware detected by them increased 44% last year, too.

Those are dismal numbers that illustrate the growing threat to online security. Many of the major threats targeting large banks, online moguls like Facebook and Twitter recently have come from Europe and Asia but that doesn’t mean that the everyday user is exempt. The targets are cell phones and tablets. But the techniques for phishing are still the old school kind – because they work.

The large corporations are hit because malware is accessed through links to compromised or malicious sites. Once that site is accessed, [...]

Security Starts with TSCM

International Investigators got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the employees. He wanted to be certain that the conference room was completely secure.

He asked that we complete Technical Surveillance Countermeasures (TSCM), or as it is often called, a bug sweep. He felt relatively confident that there were no eavesdropping devices or other surveillance equipment in the room, but he had to be absolutely certain.

Usually listening devices are not evident to the casual observer. That’s why counter surveillance [...]