spy listening devices

Hidden out of Sight, Viewed from Afar

It was just another abnormal day for Victoria.  She sat at home in her lounge chair and noticed that her smoke detector looked a bit strange.  She just ignored it at first, it was just a smoke detector and she had more than a strange smoke detector to ponder.  She had just broken up with her live in boyfriend of 5 years.  He had become a bit overbearing, demanding to know her every move, who she was with, who she talked to, even at times showing up at her place of employment.  It was just too much to deal with, and even though she cared deeply, she cared more for her emotional state of mind.

Again, she went back to that smoke detector and decided [...]

Not Only Do I Hear What You Are Saying, So Is Someone Else

We had a gentleman who was on the verge of selling his multi-million dollar company.  He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island.  In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable.  The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings.  He had this feeling that something wasn’t right and he came to International Investigators to hash over his suspicions to determine if that nagging warning was [...]

Surveillance Underscores the Intentions of Long Lost Uncle

Here at International Investigators we are witness to the best in people as well as the dark underside of human interactions. We have front row seats to stories and actions that some people might not ever see or be able to understand. While they are human stories filled with a wide array of emotions, we are involved in gathering facts and finding out the truth.

Often our work involves attorneys who are working with an estate. We are tasked with finding a missing heir or unknown heirs for the estate. However, sometimes estate work requires a different kind of investigation. Take this story for instance:

Soon after their mother was admitted into hospice, Janet and Kim’s long-lost uncle Scott suddenly began to visit the dying sister [...]

September 24th, 2015|Private Investigations, TSCM|

TSCM Foils Entrepreneurial Voyeur and His Spy Equipment

You’ve all seen the movies, but truth be told, actual real-life situations beat out most all of the movies.

Take for instance the situation a recent call brought to International Investigators. The caller was a professional woman in her 40s who we’ll call Mary – and she was beside herself. Mary had received a call from a friend on the other side of the country telling Mary that she’d been featured in an online porn movie.

Mary was VERY certain she had never participated in the production of a porn film and she couldn’t hardly believe there was any truth to it. So her friend sent her the link via email. To her horror, there she was – in her bedroom!

That’s when she called International Investigators. [...]

Suspicions Lead to Fruitful Bug Detection

We had a client who had taken on a special, highly confidential project at work. The reason he called was because he was concerned about inadvertently leaking information. He kept asking “Is my phone tapped?” He wasn’t paranoid, but suspicious.

What made him suspicious?

Electronic devices were acting “weird” and although he said he had an electric personality, these odd sounds and happenings had never happened before. He described some of them:
His AM/FM car radio had developed interference on several stations that had been previously clear. This could be the case of an eavesdropper since antennas can be exploited by eavesdroppers.
Sounds were coming from his office phone line when it was not in use.
Sometimes his office phone would ring and no one would be there or [...]

December 24th, 2013|Bug Sweeps, TSCM|

TSCM Sweep Rounds Up the Bad Guys

Truth is the basis for fictional story lines, that’s for sure. International Investigators was called in on a case by an attorney that had a female client who was being blackmailed. The blackmailer said he had video of her inside her apartment in a 28-floor building. He described the apartment and conversations held there in detail so she knew he had access.

Immediately it was evident that technical surveillance countermeasures (TSCM) were called for. A TSCM sweep of the apartment was scheduled. Since both conversations and visual details were given, it was evident that covert surveillance and spy listening devices were present in some form or fashion. The target was eavesdropping devices and surveillance equipment.

Using sophisticated counter surveillance equipment used for electronic bug detection, hidden [...]

Bug Detection Out of the Office

During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. International Investigators was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how. The common denominator was that the financial planner had entertained every one of the lost clients on his boat. Of course they had talked some business and the financial planner believed there must have been a listening device or some sort of spy equipment on the craft.

When a TSCM sweep is requested, it is most often for an office or meeting facility. But in reality, a bug [...]

Cell Phone Forensics Exposes Source of Harassing Messages

International Investigators was recently called into an interesting case that could have easily escalated into violence or a life changed forever.

We got a call from an attorney who was representing a couple and their college-age daughter. The daughter was receiving harassing texts, calls and messages on her cell phone. They believed the former girlfriend of a new boyfriend was behind them.

Their attorney knew it was possible to peel back the layers to get to an IP address to determine the source, but he didn’t know exactly how. So he called us.

Part of the cell phone forensic process means obtaining records from the service provider. You have to use their language and have legal authority to request the records. Communicating and having the most precise [...]

  • Permalink Gallery

    Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Decrease Threats by Reducing Vulnerability to Cell Phone Spy

Let’s talk cell phone spyware detection. Remember this number: 95%. McAfee estimates that’s the percentage of malware ever devised that has been created in the past year. And, the amount of malware detected by them increased 44% last year, too.

Those are dismal numbers that illustrate the growing threat to online security. Many of the major threats targeting large banks, online moguls like Facebook and Twitter recently have come from Europe and Asia but that doesn’t mean that the everyday user is exempt. The targets are cell phones and tablets. But the techniques for phishing are still the old school kind – because they work.

The large corporations are hit because malware is accessed through links to compromised or malicious sites. Once that site is accessed, [...]

Security Starts with TSCM

International Investigators got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the employees. He wanted to be certain that the conference room was completely secure.

He asked that we complete Technical Surveillance Countermeasures (TSCM), or as it is often called, a bug sweep. He felt relatively confident that there were no eavesdropping devices or other surveillance equipment in the room, but he had to be absolutely certain.

Usually listening devices are not evident to the casual observer. That’s why counter surveillance [...]