Warning!!! Cell Phones Can Be Used As Bugging/Tracking Devices.
Click Here To Learn More...
All in Investigations
Home
Investigation Services
Legal Services
Attorneys, corporations and individuals rely on for definitive results in every type of legal matter High Tech Investigative Surveillance Techniques Wondering what tools and technologies help us do our work? Check out the latest and greatest here. Background Research Investigations For obvious reasons, background research is a standard component of all types of investigations, and is considered essential as a preliminary tool used in determining subsequent goals and/or approaches. Child Custody As an emotionally uninvolved third-party, we are in the position to maintain focus on the client`s objectives without loosing sight of what is important to the case. Due Diligence is relied upon by individuals and companies throughout the world for our understanding of the importance and nature of proper due diligence. Embezzlement It is unfortunate, but true, that in matters of embezzlement, the burden of proof falls upon the victim, who must undertake initial research in order to determine if such a crime has occurred. Financial Asset Research The most critical component to the majority of corporate and other private investigations is to find assets in order to determine the financial status of an entity…
Professional Legal Services
Missing Person and Skip Tracing
is a team of experienced private detectives which has been performing skip trace services since before many of our competitors were born. Having entered the world of missing person or skip trace investigations long before computer databases were available, we developed the methods, resources and contacts necessary to locate even the most difficult to find fugitives. Therefore, we are not limited to searching database records to skip trace like many other modern private detectives; we can fall back on our traditional `gumshoe` methods. Using the same computer tools – maybe even a few more – we have the advantage of instinct and the understanding of how to `work` a lead. Ordinary skip trace service providers are not private detectives; they neither desire to leave their offices, nor do they have the network of contacts or resources to locate someone who has kidnapped a child, or expertly embezzled a large fortune. Private detectives such as are specialists who are prepared for the greatest challenges, while still being capable of performing a simple skip trace within the confines of our office. When the basic skip trace evolves into…
Background Research Investigations
Where did they come from? Why are they here? What is their history? These are common questions, and for obvious reasons. Background research is a standard component of all types of investigations, and is considered essential as a preliminary tool used in determining subsequent goals and/or approaches. Unlike other firms which offer background research investigations, avoids marketing basic `one-size-fits-all` services because they can ultimately limit the quality and quantity of information available. That type of marketing can also end up costing clients far more for the simple preliminary information when it is broken down into incremental units. Because we generally offer background research as part of a complete package, we know we can conduct investigations that will not be limited in accuracy, recentness or relevance. It goes without saying that the purpose of our efforts is for our clients to be able to make informed decisions based upon the current information available. Employment Background Checks Unlike executive applicant background checks, employment background checks generally focus on a limited location and only certain aspects of a subject`s history. Employers are typically interested in learning certain key facts about an individual in order to determine…
Child Custody
Prior to commencing investigations in child custody matters, it is essential that a solid strategy be initially developed. Based upon lengthy experience in child custody cases, recommends that all relevant laws and circumstances be fully examined in order to devise the most effective course of action without jeopardizing the client`s legal suit. It is always strongly urged that our efforts be coordinated with the oversight of the attorney who will be presenting the case in court or mediation. Because families are actually being divided in child custody cases, the emotional factors can often cloud the significant legal aspects involved in such investigations. On the occasions when attorney involvement is not an option during child custody investigations, initial consultation with the client includes the development of the most useful strategy, which will thereafter be kept in constant consideration by all investigators involved in the case. As an emotionally uninvolved third-party, we are in the position to maintain focus on the client`s objectives without loosing sight of what is important to the case. Once we have an understanding of a case`s background, our lengthy experience will allow us to help you define your objectives and…
Due Diligence
Prevent exposure to lawsuits with proper due diligence Liability is a frightening concern to individuals and companies due to the present-day trend in which Americans are prosecuting and suing one another at escalating rates. It is seemingly impossible to protect one`s self or company from the threat of unexpected lawsuits, however, it is possible to minimize the risk by performing the proper due diligence in order to avoid the commonly expected pitfalls. “Due diligence” is a relatively new term which describes the research efforts undertaken in order to ensure that an endeavor, enterprise or new hire has been fully researched before it is instituted. is relied upon by individuals and companies throughout the world for our understanding of the importance and nature of proper due diligence. Due Diligence Investigations for Business and Competitive Intelligence Purposes Prior to expanding operations or entering new markets, companies frequently refer to to conduct due diligence investigations of a different nature. Business and corporate intelligence techniques are integrated into due dilligence investigations in order to determine whether or not such large investments are safe or worthwhile. Individuals and companies seeking to…
Embezzlement
The Victim`s Obligation to Research Embezzlement It is unfortunate, but true, that in matters of embezzlement, the burden of proof falls upon the victim, who must undertake initial research in order to determine if such a crime has occurred.In the majority of cases, law enforcement will not make an arrest and prosecutors will not make indictments for embezzlement until they have been given sufficient grounds or probable cause. Therefore, it is entirely up to victims to ensure that all circumstances, evidence and investigative procedures have been fully documented. Essentially, they must conduct their own full embezzlement investigation. As a result, it is extremely important that all investigative measures are executed properly so that any future court proceedings will not be jeopardized. Investigation of embezzlement must, therefore, be conducted methodically, utilizing forensic accounting specialists who will be able to testify as expert witnesses, if necessary. The Importance of Protecting Against Later Complications Properly performed embezzlement investigations are significant also when the employee or associate in question is dismissed on such grounds. Prior to terminating the business or employment relationship, it is in the victim`s best interest to fully investigate and document the questionable activities of the embezzler in order to minimize…
Financial Asset Research
Legal, Business and Personal: Financial Asset Searches Are we legally compliant? We abide by all federal laws including the GLB Act, the FCRA, and the FDCPA. We do not pretext on any bank search. The GLB Act did not make bank account locates illegal. What it did do was to make pre-texting the bank of the bank customer illegal. – Gramm-Leach-Bliley Act * Fair Credit Reporting Act *Fair Debt Collection Practices Act If your objective is to determine the financial picture of an Individual or a Corporation, it behooves you and your Client to obtain as much financial information as possible. The following is a path to discover assets, hidden and known with current balances, account history, and updated balances on any given day. Our experience, quality and reliability and turnaround times are the best in the business. Our financial researches have degrees in financial services and/or training in forensic fraud. We work from the information provided by the Client; we must have the exact name, date of birth and social security number to conduct any type of financial background. In essence, the search criteria must match what is reported to the financial institutions. Business searches are also conducted by…
Process Service
As our name suggests, is able to perform the basic and related services for all process server matters in Indiana and on an international level. Acting simply as process servers, we take creative steps to verify a subject`s address and availability just prior to our service attempt. Thereafter, we follow up the verification with an appropriate approach as we affect service. We generally obtain a digital photo of the individual served as additional proof of service.With the exception of out-of-state or international cases, process service attempts are generally made on a flat-fee basis; however, it is frequently requested that our servers perform initial efforts to locate a particular subject before attempting to serve papers. In these situations, a flat-fee rate may not be advisable. Quotes for standard service attempts within the metropolitan Indianapolis area are based on the subject`s zip code information. Upon contacting regarding process server matters in Indiana or elsewhere, it is recommended that the following information be provided in order to receive an accurate quote for services: Subject`s full name and date of birth, Subject`s last known address and date it was known to be valid, Subject’s telephone…
Legal Investigations
Investigations for Corporate Legal Departments and Individual Attorneys The majority of all investigations conducted by are undertaken with the understanding that the results may be used in court. However, some situations require our detectives to work in full initial co-operation and co-ordination with a client`s attorney. Many times, our agency receives assignments directly from law firms, with little or no contact from their client. In addition, our investigations are commonly performed under the direction of legal departments for large corporations in cases that span the globe. For all these situations, is in the perfect position to meet the needs of its various clients. Our operatives based throughout the world and nationwide fully understand the legal climate of each region and work accordingly. Our vast array of resources enables us to conduct our investigations so that they meet the requirements of each litigation or criminal arena.All too often, criminal matters are neglected or ignored by law enforcement and prosecutors. In such circumstances, we have been effective in investigating and preparing cases for prosecution when they would otherwise have not been pursued. These cases are always immensely rewarding,…
Litigation Research
The most commonly performed litigation research services are those conducted on behalf of plaintiffs or civil defendants wherein simple fact-finding and evidence gathering investigations are undertaken. It is well-known that private investigators assist attorneys in matters such as divorce, child custody, accident and injury. goes beyond the ordinary by expanding its litigation research services to include jury panel reviews, expert witness testimony, forensic accounting specialists and financial asset research. With the numerous worldwide resources at our disposal, we have the ability to assist in a wide range of litigation matters by performing any one of the following research services: Fraud investigation Background research on witnesses, prospective jurors, litigants Locate witnesses Financial asset researchand location of hidden assets Accident scene photos, statements, measurements, diagrams Witness identification Computer forensics, recovery of deleted data Record searches Other general evidence gathering investigations Audio and video tape enhancement/authentication Eavesdropping protection (TSCM) in high profile cases Additional litigation matters for which the evidence gathering and research services of are consistently requested include: Contract disputes Contested wills Theft of proprietary information and trade secrets Non-compete clause violations Embezzlement investigations Product liability Patent and…
Sexual Harassment Investigations
Investigations into matters of sexual harassment are delicate and are generally performed under the direction of either human resources departments, or personal or corporate attorneys. Such allegations create emotional and complex situations for all parties involved, and result in long-lasting consequences for corporations and individuals. It is, therefore, necessary for such investigations to be conducted with sensitivity to the heightened workplace tensions caused by sexual harassment allegations. As outsiders, is frequently called upon by companies to initially approach witnesses and individuals involved for statements in order to determine whether or not a case has merit. Baseless claims of sexual harassment can be extremely damaging to workplace relationships and corporate morale. Often times, a tactful investigation performed by a third-party can bring about a more gentle resolution when there is a situation of false allegations. Conversely, when allegations are not fully investigated, it might appear that the claims are baseless; however, this may not be true. Thus, it is important that every step is taken to reach an informed conclusion. If the claims are not taken seriously with a proper investigation, victims of sexual harassment may feel they have no other alternative but to…
Technical Surveillance Countermeasures
Workers Compensation
The various forms of Workers Compensation Investigations The nature of workers compensation assignments varies, and understands that our clients` needs are different, depending upon whether they are investigating for fraud, subrogation, or AOE/COE purposes. During the last four and a half decades, our interview and sub rosa services have been utilized in a variety of applications for our legal, corporate and insurance clients. Our rich experience with workers compensation investigations has enabled us to develop a sense of a case`s character from the time of its predication. We can be relied upon to provide sound conclusions and recommendations as a case evolves in order to assist you in getting it settled in a timely manner. All assignments are approached with the expectation that the investigative results may be presented before a state workers compensation board or in a court of law. Therefore, we understand the importance of ensuring that our clients are shown to have conducted a thorough investigation in a professional manner. The reputation of depends upon making our clients appear informed and their cases methodical in such circumstances. AOE/COE With our combined experience in…
Insurance Services
Insurance companies from both the Life and Health, and Property and Casualty arenas consistently refer their adjustors to for the investigation of suspected fraudulent claims. Having worked with insurance companies for over 45 years, we are familiar with the nature and purpose of all varieties of claims investigations. While determination of claims fraud is typically the primary purpose of initiating a private investigation, understands that this is not always the insurance adjustors` intent. We are the preferred service provider of investigations among insurance companies because of our understanding of the full claims process. Especially in the case of new claims, we realize that adjustors often simply require well-conducted initial inquiries at a reasonable cost in order to determine a claim`s validity. Based upon the insurance company`s requirements, the result of such preliminary inquiries may determine whether or not a full fraud investigation is necessary for a new claim. In cases of either newly submitted claims or questionable claims, we are able to provide services tailored to the needs of each particular insurance company and claim situation. Our understanding of the claims process benefits insurance adjustors and…
Missing Person and Skip Tracing
is a team of experienced private detectives which has been performing skip trace services since before many of our competitors were born. Having entered the world of missing person or skip trace investigations long before computer databases were available, we developed the methods, resources and contacts necessary to locate even the most difficult to find fugitives. Therefore, we are not limited to searching database records to skip trace like many other modern private detectives; we can fall back on our traditional `gumshoe` methods. Using the same computer tools – maybe even a few more – we have the advantage of instinct and the understanding of how to `work` a lead. Ordinary skip trace service providers are not private detectives; they neither desire to leave their offices, nor do they have the network of contacts or resources to locate someone who has kidnapped a child, or expertly embezzled a large fortune. Private detectives such as are specialists who are prepared for the greatest challenges, while still being capable of performing a simple skip trace within the confines of our office. When the basic skip trace evolves into…
Contestable and Suspicious Death Claims
While it is primarily insurance companies who utilize the death investigation services of , we are also commonly consulted by private individuals regarding suspicious death claims. Former Deputy Marion County (Indianapolis) Coroner and longtime Indianapolis Police Department homicide detective, Jon Layton, has been instrumental in catapulting our reputation for outstanding success in the investigation of both contestable death claims and suspicious death claims. His reliance on proven scientific approaches, as well as his well-developed instinct as a former police homicide detective benefits all parties interested in conducting any sort of death investigation. Insurance Death Claim Investigation For over forty-five years, has been acclaimed for specializing in overseas death claims which may or may not have occurred during the contestable period. This may not seem significant to all insurance professionals, however, experienced claims examiners recognize how important it is to obtain exactly the right evidence for the denial of death claims arising out of suspicious or fraudulent circumstances. When dealing with foreign cultures, customs, currencies and governments, it is often difficult for claims professionals to procure sound, verifiable documentation. That is why we are renowned; our foreign resident…
Disability Claims
Not all disability claims are workers` compensation-related, and understands how this fact can make a difference in terms of our approach, and our client`s budget. Most significantly, we realize that fraud is not always the focus of disability claim investigations. When initiating disability investigations, it is important that we know if the claim is new, or if fraud is suspected so that we can devise the appropriate approach. When investigating new claims, our clients generally expect us to collect the pertinent facts by performing a variety of the following services: Claimant and/or witness interviews btain medical release Obtain medical records Arrange an Independent Medical Exam Court and public records searches These efforts are intended to either document or eliminate suspicious factors which might be evident when a claim is initially filed so that the claim adjustor can make an informed decision. Based upon the preliminary results and whether a case is a long-, or short term disability claim, we may recommend subsequent investigation in order to determine if fraud is a concern. Many times, our clients revisit old claims on a periodic basis, or they receive some information or indications that a particular…
Workers Compensation
The various forms of Workers Compensation Investigations The nature of workers compensation assignments varies, and understands that our clients` needs are different, depending upon whether they are investigating for fraud, subrogation, or AOE/COE purposes. During the last four and a half decades, our interview and sub rosa services have been utilized in a variety of applications for our legal, corporate and insurance clients. Our rich experience with workers compensation investigations has enabled us to develop a sense of a case`s character from the time of its predication. We can be relied upon to provide sound conclusions and recommendations as a case evolves in order to assist you in getting it settled in a timely manner. All assignments are approached with the expectation that the investigative results may be presented before a state workers compensation board or in a court of law. Therefore, we understand the importance of ensuring that our clients are shown to have conducted a thorough investigation in a professional manner. The reputation of depends upon making our clients appear informed and their cases methodical in such circumstances. AOE/COE With our combined experience in…
Corporate Services
Addressing every type of need for corporations around the globe, commonly undertakes these missions for organizations like yours: High Tech Investigative Surveillance Techniques Wondering what tools and technologies help us do our work? Check out the latest and greatest here. Background Research Investigations A necessary component of most corporate investigations. Business Intelligence/Acquisition and Counter Acquisition In the game of Business Intelligence Research, the role of private investigators is not commonly known, nor should it be. Crisis and Contingency Strategy Planning Banks do it, and now schools do it. Cities and towns are doing it, too. The majority of everybody else doesn`t bother with crisis and contingency planning unless they have experienced a good reason to do so. It’s called ‘motivation by crisis’. Due Diligence Before proceeding with critical undertakings, be fully informed of risks and exposures. Financial Asset Research The most critical component to the majority of corporate and other private investigations is to find assets in order to determine the financial status of an entity or individual, or to track laundered or secreted money. Intellectual Property Protection Our experience in working on both sides of this arena has given us the advantage…
Background Research Investigations
Where did they come from? Why are they here? What is their history? These are common questions, and for obvious reasons. Background research is a standard component of all types of investigations, and is considered essential as a preliminary tool used in determining subsequent goals and/or approaches. Unlike other firms which offer background research investigations, avoids marketing basic `one-size-fits-all` services because they can ultimately limit the quality and quantity of information available. That type of marketing can also end up costing clients far more for the simple preliminary information when it is broken down into incremental units. Because we generally offer background research as part of a complete package, we know we can conduct investigations that will not be limited in accuracy, recentness or relevance. It goes without saying that the purpose of our efforts is for our clients to be able to make informed decisions based upon the current information available. Employment Background Checks Unlike executive applicant background checks, employment background checks generally focus on a limited location and only certain aspects of a subject`s history. Employers are typically interested in learning certain key facts about an individual in order to determine…
Due Diligence
Prevent exposure to lawsuits with proper due diligence Liability is a frightening concern to individuals and companies due to the present-day trend in which Americans are prosecuting and suing one another at escalating rates. It is seemingly impossible to protect one`s self or company from the threat of unexpected lawsuits, however, it is possible to minimize the risk by performing the proper due diligence in order to avoid the commonly expected pitfalls. “Due diligence” is a relatively new term which describes the research efforts undertaken in order to ensure that an endeavor, enterprise or new hire has been fully researched before it is instituted. is relied upon by individuals and companies throughout the world for our understanding of the importance and nature of proper due diligence. Due Diligence Investigations for Business and Competitive Intelligence Purposes Prior to expanding operations or entering new markets, companies frequently refer to to conduct due diligence investigations of a different nature. Business and corporate intelligence techniques are integrated into due dilligence investigations in order to determine whether or not such large investments are safe or worthwhile. Individuals and companies seeking to…
Embezzlement
The Victim`s Obligation to Research Embezzlement It is unfortunate, but true, that in matters of embezzlement, the burden of proof falls upon the victim, who must undertake initial research in order to determine if such a crime has occurred.In the majority of cases, law enforcement will not make an arrest and prosecutors will not make indictments for embezzlement until they have been given sufficient grounds or probable cause. Therefore, it is entirely up to victims to ensure that all circumstances, evidence and investigative procedures have been fully documented. Essentially, they must conduct their own full embezzlement investigation. As a result, it is extremely important that all investigative measures are executed properly so that any future court proceedings will not be jeopardized. Investigation of embezzlement must, therefore, be conducted methodically, utilizing forensic accounting specialists who will be able to testify as expert witnesses, if necessary. The Importance of Protecting Against Later Complications Properly performed embezzlement investigations are significant also when the employee or associate in question is dismissed on such grounds. Prior to terminating the business or employment relationship, it is in the victim`s best interest to fully investigate and document the questionable activities of the embezzler in order to minimize…
Financial Asset Research
Legal, Business and Personal: Financial Asset Searches Are we legally compliant? We abide by all federal laws including the GLB Act, the FCRA, and the FDCPA. We do not pretext on any bank search. The GLB Act did not make bank account locates illegal. What it did do was to make pre-texting the bank of the bank customer illegal. – Gramm-Leach-Bliley Act * Fair Credit Reporting Act *Fair Debt Collection Practices Act If your objective is to determine the financial picture of an Individual or a Corporation, it behooves you and your Client to obtain as much financial information as possible. The following is a path to discover assets, hidden and known with current balances, account history, and updated balances on any given day. Our experience, quality and reliability and turnaround times are the best in the business. Our financial researches have degrees in financial services and/or training in forensic fraud. We work from the information provided by the Client; we must have the exact name, date of birth and social security number to conduct any type of financial background. In essence, the search criteria must match what is reported to the financial institutions. Business searches are also conducted by…
Intellectual Property Protection
RECOGNIZE THE NEED FOR INTELLECTUAL PROPERTY PROTECTION As effective business intelligence investigators, has become proficient in all methods of exploiting the vulnerabilities of every type of business. This has, consequently, allowed us to recognize the vulnerabilities of our clients and help them with the protection of their intellectual property. Commonly exploited internal vulnerabilities include: Lack of, or violations of corporate contracts, such as non-compete and non-disclosure agreements Sabotage Information leaking or selling of customer lists and personal client information Unprotected premises Eavesdropping Unshredded documents Common results of unprotected internal and external vulnerabilities include: Vendor or competitor production of counterfeit products or merchandise Patent, copyright or trademark infringement Unlicensed distribution Network intrusion Eavesdropping Becoming an easy target for competitive or corporate intelligence SECURE MAXIMUM PROTECTION FOR YOUR INTELLECTUAL PROPERTY Our experience in working on both sides of the intellectual property arena has given us the advantage of being able to not only assist companies in the investigation of theft, but also in the protection of such valuable assets. However, no amount of security measures can ensure the protection of intellectual property unless a company is willing to prosecute contract violations or conduct investigations into…
Missing Person and Skip Tracing
is a team of experienced private detectives which has been performing skip trace services since before many of our competitors were born. Having entered the world of missing person or skip trace investigations long before computer databases were available, we developed the methods, resources and contacts necessary to locate even the most difficult to find fugitives. Therefore, we are not limited to searching database records to skip trace like many other modern private detectives; we can fall back on our traditional `gumshoe` methods. Using the same computer tools – maybe even a few more – we have the advantage of instinct and the understanding of how to `work` a lead. Ordinary skip trace service providers are not private detectives; they neither desire to leave their offices, nor do they have the network of contacts or resources to locate someone who has kidnapped a child, or expertly embezzled a large fortune. Private detectives such as are specialists who are prepared for the greatest challenges, while still being capable of performing a simple skip trace within the confines of our office. When the basic skip trace evolves into…
Sexual Harassment Investigations
Investigations into matters of sexual harassment are delicate and are generally performed under the direction of either human resources departments, or personal or corporate attorneys. Such allegations create emotional and complex situations for all parties involved, and result in long-lasting consequences for corporations and individuals. It is, therefore, necessary for such investigations to be conducted with sensitivity to the heightened workplace tensions caused by sexual harassment allegations. As outsiders, is frequently called upon by companies to initially approach witnesses and individuals involved for statements in order to determine whether or not a case has merit. Baseless claims of sexual harassment can be extremely damaging to workplace relationships and corporate morale. Often times, a tactful investigation performed by a third-party can bring about a more gentle resolution when there is a situation of false allegations. Conversely, when allegations are not fully investigated, it might appear that the claims are baseless; however, this may not be true. Thus, it is important that every step is taken to reach an informed conclusion. If the claims are not taken seriously with a proper investigation, victims of sexual harassment may feel they have no other alternative but to…
Technical Surveillance Countermeasures
Undercover Operations
An Undercover Investigation – The Most Effective Method at Stopping Loss Serious stock loss requires serious intervention. Undercover operations can serve a number of purposes; however, most companies only consider them when they experience a significant loss of stock. This is how has been initially approached by many of our long-standing clients. Undercover operations are the most effective measure in preventing loss because the licensed investigator is inserted into the operation at the level where it is believed the greatest opportunity for theft lies. By adopting the social, ethnic and economic manner of his/her co-workers, the investigator is able to foster the confidence and trust required to develop leads and evidence of how the loss is occurring. During the course of an undercover investigation, a long and mutually rewarding relationship develops between our staff and our clients, who come to learn they can rely on us for information, solutions and advice on all matters. Companies understand that we have seen their circumstances from both the inside and the outside, and realize that these combined perspectives are invaluable. The Versatility of an Undercover Investigation While stock loss is the most common reason for clients…
Video Surveillance Security Systems u0026#8211; Hidden Video Cameras
[yt]iFYmDQQvNnI[/yt] By themselves or in conjunction with other investigative or security-related methods, video surveillance security systems are useful for maintaining a close eye on suspicious circumstances or vulnerabilities. They are usually recommended during a security risk assessment or undercover investigation, for which design summaries can be included. can design, build and install a wide spectrum of video surveillance security systems using the latest technologies, including “computer vision”, which allows remote monitoring. Video surveillance security systems do not necessarily have to be the stereotypical large camera arrays with a high-visibility monitoring station. In fact, clients who approach for our video surveillance security systems expertise generally prefer a ‘back room’ monitoring center covering a combination of covert and conspicuously-placed video cameras. The settings for our customized design and installation projects range from massive industrial complexes to private residences. COVERT VIDEO CAMERA APPLICATIONS The need for video surveillance security systems can arise anywhere for any reason. Therefore, provides customized high-visibility or covert video camera solutions for all legal purposes, drawing upon our experience of over 50 years for creative designs and applications.…
Workers Compensation
The various forms of Workers Compensation Investigations The nature of workers compensation assignments varies, and understands that our clients` needs are different, depending upon whether they are investigating for fraud, subrogation, or AOE/COE purposes. During the last four and a half decades, our interview and sub rosa services have been utilized in a variety of applications for our legal, corporate and insurance clients. Our rich experience with workers compensation investigations has enabled us to develop a sense of a case`s character from the time of its predication. We can be relied upon to provide sound conclusions and recommendations as a case evolves in order to assist you in getting it settled in a timely manner. All assignments are approached with the expectation that the investigative results may be presented before a state workers compensation board or in a court of law. Therefore, we understand the importance of ensuring that our clients are shown to have conducted a thorough investigation in a professional manner. The reputation of depends upon making our clients appear informed and their cases methodical in such circumstances. AOE/COE With our combined experience in…
Private Services
Discreet methods for your sensitive personal matters: High Tech Investigative Surveillance Techniques Wondering what tools and technologies help us do our work? Check out the latest and greatest here. Adoption and Military Search Investigations The records are sealed. Initial information is vague, or limited at best. Bureaucrats are rude and unhelpful. These factors are what make an adoption search very similar to a search for military people. Background Research Investigations An essential component of most private investigations. Child Custody The process of gathering evidence in support of the client`s legal position can involve many methods of investigation. Financial Asset Research An essential unit of most private investigations. Infidelity/Extramarital Affairs If you have questions about possible infidelity, there is probably a good reason for you to be suspicious, and for you to be considering an investigation. Lie Detection Polygraph and voice stress analysis services are routinely performed by in a variety of personal matters. Missing Child Investigation It is unfortunately true that local authorities are often unwilling or unable to assist families of missing kids. Missing Person and Skip Tracing Having entered the world of missing person or skip trace investigations long before computer…
Adoption and Military Search Investigations
The records are sealed. Initial information is vague, or limited at best. Bureaucrats are rude and unhelpful. These factors are what make an adoption search very similar to a search for military people. They are also the reason that people become frustrated and turn to for help after trying it on their own. These cases can be challenging, and they hinge upon the information available at the forefront of the investigation. Yet, there might be leads to be developed based upon what is known, so it is worth making at least an effort to search for the parent or child in an adoption case, or search for the people from your military past. Search for People with whom you served in the Military It may have been one of the Gulf Wars, or maybe it was WWII. She may have been a nurse, or perhaps he fought in the same battle. Whatever the connection, it was easy to lose contact before you were even discharged. Now years later, it seems impossible to reunite. However, it is often amazing how much useful information you may actually have when you try to search for people…
Background Research Investigations
Where did they come from? Why are they here? What is their history? These are common questions, and for obvious reasons. Background research is a standard component of all types of investigations, and is considered essential as a preliminary tool used in determining subsequent goals and/or approaches. Unlike other firms which offer background research investigations, avoids marketing basic `one-size-fits-all` services because they can ultimately limit the quality and quantity of information available. That type of marketing can also end up costing clients far more for the simple preliminary information when it is broken down into incremental units. Because we generally offer background research as part of a complete package, we know we can conduct investigations that will not be limited in accuracy, recentness or relevance. It goes without saying that the purpose of our efforts is for our clients to be able to make informed decisions based upon the current information available. Employment Background Checks Unlike executive applicant background checks, employment background checks generally focus on a limited location and only certain aspects of a subject`s history. Employers are typically interested in learning certain key facts about an individual in order to determine…
Child Custody
Prior to commencing investigations in child custody matters, it is essential that a solid strategy be initially developed. Based upon lengthy experience in child custody cases, recommends that all relevant laws and circumstances be fully examined in order to devise the most effective course of action without jeopardizing the client`s legal suit. It is always strongly urged that our efforts be coordinated with the oversight of the attorney who will be presenting the case in court or mediation. Because families are actually being divided in child custody cases, the emotional factors can often cloud the significant legal aspects involved in such investigations. On the occasions when attorney involvement is not an option during child custody investigations, initial consultation with the client includes the development of the most useful strategy, which will thereafter be kept in constant consideration by all investigators involved in the case. As an emotionally uninvolved third-party, we are in the position to maintain focus on the client`s objectives without loosing sight of what is important to the case. Once we have an understanding of a case`s background, our lengthy experience will allow us to help you define your objectives and…
Financial Asset Research
Legal, Business and Personal: Financial Asset Searches Are we legally compliant? We abide by all federal laws including the GLB Act, the FCRA, and the FDCPA. We do not pretext on any bank search. The GLB Act did not make bank account locates illegal. What it did do was to make pre-texting the bank of the bank customer illegal. – Gramm-Leach-Bliley Act * Fair Credit Reporting Act *Fair Debt Collection Practices Act If your objective is to determine the financial picture of an Individual or a Corporation, it behooves you and your Client to obtain as much financial information as possible. The following is a path to discover assets, hidden and known with current balances, account history, and updated balances on any given day. Our experience, quality and reliability and turnaround times are the best in the business. Our financial researches have degrees in financial services and/or training in forensic fraud. We work from the information provided by the Client; we must have the exact name, date of birth and social security number to conduct any type of financial background. In essence, the search criteria must match what is reported to the financial institutions. Business searches are also conducted by…
Infidelity/Extramarital Affairs
If you have questions about possible infidelity, there is probably a good reason for you to be suspicious, and for you to be considering an investigation. Instinct, or intuition, is usually right. This does not necessarily mean that infidelity has occurred, or will occur, but you want to set your mind at ease which is why you might be reading this page and contemplating an investigation. Few private detectives have the lengthy experience or array of equipment available to conduct an infidelity investigation like For over 40 years, we have been able to perfect our methods and test all the emerging technologies. Over the past decade and a half, we have found that the GPS tracking system is an affordable, effective addition to our surveillance equipment arsenal. Used as part of a traditional surveillance, a GPS tracking system helps to ensure that the potentially unfaithful partner will not elude the investigators. `Global positioning satellite`, or GPS tracking systems can accurately pinpoint their subjects to within 15 meters of their exact location, and they are available for either rental or purchase. For infidelity investigations in which video of the anticipated rendezvous between adulterers is…
Lie Detection
Restrictions on using polygraph services As many have now come to realize, federal law strictly regulates the practice of lie detector testing. No longer is it possible for employers to ensure employee honesty utilizing polygraph services. Nor can the results of lie detector testing be used in a court of law under any circumstances. It is only within extremely regulated situations involving law enforcement or government employees that polygraph services can be provided in employment matters. This is generally done under the direction of legal counsel. Lie detector testing unrelated to employment matters Polygraph and voice stress analysis services are routinely performed by in a variety of personal matters. While the results may not be admissible in court, lie detector testing is a valuable tool which can be instrumental in shaping the direction of an investigation. Specifically, we commonly apply lie detector testing along with other methods when investigating marital infidelity or child custody. Parties from both sides of suspected infidelity or custody disputes often find our polygraph services beneficial for either helping to clear one`s name, or to determine whether or not a full investigation will be necessary. Often, our clients get…
Missing Child Investigation
becomes involved for a variety of reasons in a variety of cases relating to missing children. It is unfortunately true that local authorities are often unwilling or unable to assist families of missing kids. This is why such a large number of non-profit organizations and other service providers have begun forming the last two decades. Throughout these circumstances, and for over forty-five years, we have been filling the void that others leave. With a staff of current and former law enforcement personnel, as well as a network of interstate and international contacts, we can work independent of, or in cooperation with other authorities to find and recover missing children. Absolutely nothing else in this profession is more rewarding than reuniting parents with their runaway or abducted child, especially after working closely with the emotionally crippled families. It has been our experience that there are five types of missing children cases, all of which are nightmares for families: Child abduction by a parent Kidnapping and ransom Runaway children Predator abduction Unexplained disappearance Kidnapping and Ransom While no longer very common in the US these days, this type of child abduction occurs on an ever-increasing…
Missing Person and Skip Tracing
is a team of experienced private detectives which has been performing skip trace services since before many of our competitors were born. Having entered the world of missing person or skip trace investigations long before computer databases were available, we developed the methods, resources and contacts necessary to locate even the most difficult to find fugitives. Therefore, we are not limited to searching database records to skip trace like many other modern private detectives; we can fall back on our traditional `gumshoe` methods. Using the same computer tools – maybe even a few more – we have the advantage of instinct and the understanding of how to `work` a lead. Ordinary skip trace service providers are not private detectives; they neither desire to leave their offices, nor do they have the network of contacts or resources to locate someone who has kidnapped a child, or expertly embezzled a large fortune. Private detectives such as are specialists who are prepared for the greatest challenges, while still being capable of performing a simple skip trace within the confines of our office. When the basic skip trace evolves into…
Contestable and Suspicious Death Claims
While it is primarily insurance companies who utilize the death investigation services of , we are also commonly consulted by private individuals regarding suspicious death claims. Former Deputy Marion County (Indianapolis) Coroner and longtime Indianapolis Police Department homicide detective, Jon Layton, has been instrumental in catapulting our reputation for outstanding success in the investigation of both contestable death claims and suspicious death claims. His reliance on proven scientific approaches, as well as his well-developed instinct as a former police homicide detective benefits all parties interested in conducting any sort of death investigation. Insurance Death Claim Investigation For over forty-five years, has been acclaimed for specializing in overseas death claims which may or may not have occurred during the contestable period. This may not seem significant to all insurance professionals, however, experienced claims examiners recognize how important it is to obtain exactly the right evidence for the denial of death claims arising out of suspicious or fraudulent circumstances. When dealing with foreign cultures, customs, currencies and governments, it is often difficult for claims professionals to procure sound, verifiable documentation. That is why we are renowned; our foreign resident…
Track Your Subject With GPS
Already have an account? Login here.. Satellite Surveillance is now a Reality It’s no longer science fiction, nor it is strictly reserved for the government. Satellite surveillance technology is now available to the public, and can be utilized by anyone … a degree in rocket science is no longer a requirement. Moreover, it’s actually an affordable option which has already begun to revolutionize our industry by allowing private individuals to conduct their own private investigations. What is GPS? Global Positioning Satellite – GPS – tracking systems are an easy and remote method for keeping track of a vehicle and/or item as it travels anywhere throughout North America. From the comfort of your own home or office, you can actually conduct your own surveillance and pinpoint the exact location of your subject to within 50 feet using our web-based satellite interface. Especially in situations where your safety might be at risk, GPS tracking is indispensable because it can be programmed to notify your cellular telephone when the subject is within a certain proximity to a predetermined location. GPS Vehicle Tracking is easier than you’d expect Don’t let the complexity of this new technology intimidate you. We understand that the concept of…
Technical Surveillance Countermeasures
Forensic Services
Cell Phone Spyware Facts
The manner in which spyware is installed on the phone is dependent upon the capabilities of the phone itself. Smart phones can have spyware downloaded from websites, Blue-tooth connection, mms messages, and of course a pc connection. There is no single spyware program that can be installed on all phones since there are many different OS’s and each one must have code written for the specific OS. Symbian OS is the most common OS but has hundreds, if not thousands, of different versions depending on the software development intended on the device. Many spyware programs cannot work for more than a few versions, if even more than one version. Spyware programs that can be installed via Bluetooth connection claim to be able to install software remotely, but as with all Bluetooth devices it must have been paired with the target phone first. It is possible for the remote installation of spyware onto a target phone, but this involves “tricking” the user into downloading and installing the malware. Sending bogus mms messages with the intent to install malware is the easiest way to trick a target user. By sending messages with fake links could get the user to unknowingly download spyware…
Cell Phone Forensics/Spyware Detection
OUR PROCEDURE The first step involves always keeping powered phones in a Faraday case to prevent signals from leaving and entering the phone. One problem that is becoming more prevalent is that more malware/spy-ware programs are being found with remote software removal functions that allow the perpetrator to remove the malware from the phone remotely. Although it can sometimes leave traces of its prior existence, more information could have been detected and obtained had the phone been protected from these removal functions, therefore by keeping the phones in Faraday cases we remove this problem completely. Examiner then physically examines the phone while in a Faraday case to determine if there are any signs of malware while testing the functionality of the phone. This can provide valuable first clues as to the type of malware that has already been installed into the device. In order to obtain any information from the phone we must first connect to the device using the our vast cable catalog. We always use USB connections since it is the most secure connection and easiest to work with when the phone is in the Faraday case. Once the phone is connected to our software, we then perform a memory…
Cell Phone Tower Triangulation
See our work on Cell Tower Triangulation evidence that could have proven Charlie White’s innocence. Cell Tower Triangulation Cell tower triangulation is similar to GPS tracking in many ways. Multiple towers are used to track the phone’s location by measuring the time delay that a signal takes to return back to the towers from the phone. This delay is then calculated into distance and gives a fairly accurate location of the phone. Detecting which antenna of the tower the signal bounced off of can further refine the location. This gives a more specific location when used congruently with multiple towers calculated by multiple dishes on each tower. Cell phone companies do this for a variety of reasons including enhancing the ability of the E911 system. This system was put in place for 911 operators to get a location of where a call from a cell phone is made from so that if communication is lost, the operator would know where to dispatch help. Cell tower triangulation is also used to provide the phone with the best service by noting which tower it is closest to and using them to provide service. Cell tower triangulation provides the ability to track the…
Extracting Cell Phone Data Forensically
Whether your objective is to look for spyware, find deleted text messages and call logs or even find browsed websites or GPS coordinates on a phone, tablet, or a stand alone GPS device, the first step is to forensically extract the data. The manner in which data is extracted from a phone can determine if the data is forensic or not. The extracted data must be an exact copy of the data on the device. The extracting software and hardware must not alter the data that is on the cell phone or other device. The extracting software must have the capability of reaching deep into the file system of the device so that all necessary data is retrievable. The data that is extracted must be protected during transit from the device to the storage location. The hardware and/or software must keep data flowing from the device to the storage location. It must not have the capability to allow data from any location outside of the device to enter the device. This would, of course, allow changes to be made to data on the device thus keeping the data from being forensically accurate. WHY IS EXTRACTING DATA IN A FORENSIC MANOR…
Forensic Computer Investigation
Computer Forensics Consulting Computer crimes are increasing exponentially each year, and we have found that our forensic investigation services now must include “computer forensics consulting” for preventative purposes, as well as for prosecution or litigation. When digitally encoded or stored information or evidence is collected, identified, examined and recorded in order to document an activity, we are conducting a computer forensic investigation. “Computer forensics consulting” is based on the same methodology of searching for, analyzing and documenting data, but with the additional goals of system improvement and protection. Our computer forensics consulting services are recommended for the following applications: security risk assessments intellectual property protection technical pretrial consulting and evidence evaluation examination of potentially compromised systems damage assessment and data recovery recover deleted or lost files Computer Forensic Investigation If there is a ‘bug’ in your system, or you cannot explain an apparent information leak, a computer forensic investigation may reveal sabotage or the source of the leak. Some business intelligence professionals understand the wealth of valuable information stored in computer systems, and make it a practice to take what they can get … however they can get it. Spyware is a perfect example of a common business intelligence technique…
Questioned Document Examination
A significant portion of all investigations handled by have included some form of forensic document examination. This service is one of the most instrumental tools in ascertaining how a crime has occurred. By conducting simple handwriting comparisons, or full-scale forensic document examinations, major conclusions can be produced in cases involving: Fraud Suspected forgery – wills, contracts, deads, checks, etc. Embezzlement Identity theft Suspicious death claims Intellectual property protection Conclusions commonly drawn from forensic document examinations and handwriting comparisons can indicate that the following crimes have been committed: Forgery Document falsification Counterfeiting Evidence tampering As with all other forensic services conducted by , the document examinations and handwriting comparisons, are skillfully performed by one of our renown forensic experts, who is experienced in the court-directed protocols for evidence handling and testimony as an expert witness. The results of all handwriting comparisons are listed in a forensic investigative report, and indicate only if the document presented for examination was, or was not written by a specific individual in question. When listing the results of a full forensic examination of a questioned document, the investigative report will specify whether or…
Uncoventional Covert Espionage Devices
The following devices can be found and ordered (purchased) over the internet from foreign spy device suppliers, shipped to the US and rarely intercepted by US Customs. A device that can be cleverly concealed in a FAX machine, which will copy all faxed documents along with the phone numbers and at a later time, upon a command from the bad guy, download all of the copies. This device can also be commanded, by the bad guy, to turn on an amplified microphone to monitor the conversations around the fax machine. There are many configurations that are available. A similar device to the FAX bug can be installed in a printer or copy machine. Most of the newer copy machines utilize a hard drive that maintains a copy of every document copied (scanned). These are easily accessed by service techs or “others” that have physical access to the office area. Most offices utilize shredders; some have a large collection box which is periodically picked up by a trusted shredding company. Others utilize the small standalone units. There is an overseas company that provides a bugged shredder that has a hidden digital scanner built into the injected molded plastic document insertion top. There…
Audio-video Tape Enhancement/Evidence Authentication
As private detectives whose product is often audio or video documentation, it is obvious that we would be equipped with the resources for technical evidence enhancement. Likewise, our resources and skills must be utilized to ensure our own credibility. Therefore, we observe court-dictate protocols regarding evidence enhancement and authentication, and provide the services necessary for our clients to do the same … especially when it involves video or audio tape, or digital media. Audio and video evidence enhancement The purpose of using audio recording or security camera systems is to document evidence of any matter of significance. But when uncontrollable circumstances interfere with the listener or viewer`s ability to recognize action or dialogue, or identify persons and things, the evidence could be rendered useless without enhancement. Recent technological advancements have assisted in resolving a majority of the complications affecting clarity and intelligibility. utilizes the latest advancements for audio and video evidence enhancement so that the evidence can still be used. The importance of video and audio tape authentication Whenever video or audio tape evidence is introduced into legal proceedings, it is a given fact that it will be questioned and will require some…
Technical Surveillance Countermeasures
TSCM Services
[yt]_AS6xhEBMSs[/yt] TSCM – Technical Surveillance Countermeasures, Cell Phone Tapping, Bug Sweeps We expect that the majority of people reading this page feel they have a possible reason to be concerned about a phone tap, listening device or hidden video camera. By reading this page before calling anyone, you are taking the right approach. This is an opportunity to become educated about what to do next without vocalizing your suspicions in a way which might be overheard. This page is intended to answer many of your questions before you make the effort of contacting an Technical Surveillance Countermeasures specialist from a secure location. As expert design and installation professionals, we are familiar with every type of hidden surveillance camera or phone tap and bugging system available, and we know what to look for when retained to conduct technical surveillance countermeasures (TSCM), or video and audio ‘bug sweeps’. We are, therefore, in a position to advise you that your concerns are potentially valid if you have noticed any of the following indications. Technical Indications During telephone conversations, there are audible popping, scratching, or unusual noises present which indicate the presence of a wire, or phone tap. Static or volume changes likewise can…
Crime Vision
Video Surveillance Software 1. Is Video Surveillance Analysis and Enhancement Software for Windows 2. Works on any Windows XP computer 3. Works with standard A VI files 4. Is Microsoft Direct-X based application so any Direct Show hardware can be used 5. Is Easy to use Video Tools included in CrimeVisionTM: 1. Import Video via linked Video Encoding application 2. Trim Video using the Split tool 3. Grab Frame using the Picture button 4. De-Quad video 5. DeMultiplex video up to 16 camera views 6. De-interlace video to remove motion blur/noise/etc. 7. Link to Video Editing software, such as Adobe Premiere Image Tools in CrimeVisionTM: 1. Line Shifting to remove blur 2. Frame Averaging to remove blur 3. Link to Image editing software, such as Adobe PhotoShop 4. Sizing tool to do comparative measurements Example of Video Surveillance Software:
About Us
About All In Investigations
Employee Biographies
Brenda McGinley CEO In the 1960s, Brenda McGinley provided security consultation for when it was still operated by the original founders. His preliminary collaboration with the former FBI, CIA and military intelligence agents of the initial allowed him to develop a deeper understanding of the business, and eventually led to his purchase of the company in 1970. With a solid background in marketing and management, he was able to build the company into one of the most successful privately-owned investigative firms based the Midwest. A skilled and well-known Indiana investigator, Mr. Wilcox specializes in security consultation, internal theft investigations, protection of proprietary information and communications, computer and cellular forensics and litigation support. Click here to view Tim’s full biography. Brenda McGinley Operations Manager When she joined the team of in 1999, Brenda McGinley`s management experience in the fields of health care, and commercial and residential real estate permitted her to quickly learn how to handle all aspects of case management. Her rise through the company was facilitated by her ability to integrate her management skills with her natural inclinations…
Memberships
Known as the leading Indiana detectives, our firm offers everything from Indiana and international process server services to security and loss prevention investigations. By networking and strategically linking with other professionals in our industry, can provide the most up-to-date international and Indiana detective services available. Therefore, each of our Indiana detectives maintains one or more memberships in professional associations within the various fields of our business. This method of developing and maintaining effective contacts both locally and worldwide has helped us to stay abreast of issues relevant to clients’ interests. Listed below are some of the more significant professional organizations in which we participate. American Society for Industrial Security – ASIS As an active lifetime member in this preeminent international organization for security and investigations professionals, Brenda McGinley, CEO, All in Investigations of , has been able to remain at the forefront of all the newest issues and technology concerning this industry. By networking and strategically linking with other professionals responsible for security and loss prevention investigations, he has been better able to monitor and influence the constant changes in relevant issues, practices and solutions. Click here to visit ASIS World Association of Detectives –…
Testimonials
Dear Inc, To have dealt with your professional, courteous and friendly staff has truly been a pleasure. I appreciate all of the effort you have set forth in obtaining the information that has played a vital role throughout my entire custody proceeding. Your meticulously prepared final report has been crucial in presenting the DRCB evaluators and Judges with non disputable factual evidence. Your report has also saved me additional legal fees and has avoided me future court appearances. On behalf of myself, my son and my entire family, I would like to thank you for the professional services that you have rendered us. Your contributions have helped bring my son home. My son’s well being is no longer an issue and now has a bright promising future. Your expertise is truly second to none and I would recommend you to anyone without any hesitation or reserve. Sincerely, A Grateful Father, Mr. Mamakas Dear Ms. McGinley, My youngest daughter, Courtney Holmes, was married in October of 2008. In early 2009, it became clear that her full Wedding Day portfolio of Pictures – from getting dressed in the morning through the last dance late that night as the crowd…
Contact Us
Request Information
Address/Phone
Blog
Facebook
Instagram
bud
Comments
Leave a Reply
You must be
logged in
to post a comment.
Leave a Reply
You must be logged in to post a comment.