Forensic Investigation Services

 

 
 

 
 
All too often, law enforcement and attorneys have more cases than they can handle, and in such circumstances and in such circumstances, International Investigators has been effective in investigating and preparing cases for defense attorneys when they would otherwise have not been pursued. These cases are always extremely rewarding, as they result in criminals not walking free when the "system fails". By working with law firms and legal departments in these matters, we are able to conduct forensic investigations which figuratively "gift wrap" cases for law firms, so that they are fully prepared to take action.
 
If necessary, our expert witnesses are later available to testify in court regarding the results of their forensic investigations. Call (317) 925-1496 today.

Due to recent sensationalistic television programming, many people have the understanding that forensic investigations or crime scene investigations deal primarily with violent or property crimes. International Investigators is a well-known resource for prosecution and courtroom preparation.
 
 
 

Audio-video Tape Enhancement & Evidence Authentication

We observe court-dictate protocols regarding evidence enhancement and authentication, and provide the services necessary for our clients to do the same - especially when it involves video or audio tape.
 
 
 

Cell Phone Forensics & Spyware Detection

Know the steps it takes to detect cell phone spyware, the facts of examining your own cell phone and how to safely send your phone to our office for examination.
 
 
 

Cell Phone Spyware Facts

The facts which will assist you in recognizing and avoiding the possibility of spyware being installed on your Cell Phone or other hand held device.
 
 
 

Cell Phone Tower Triangulation

Many times local, state and federal authorities use cell phone tower coordinates to give an accurate location timeline of a cellular device. Sometimes, however, the data given is only speculative at best depending on the density of towers in the area and the distance the target phone is from those towers. Let us help you determine the validity and accuracy of the cell tower triangulation data being used in your case.

 
 
 
Man with the hood using mobile phone - Private Investigator in Indianapolis, IN
 
 
 

Crime Scene Investigations

Independent crime scene investigations are extremely beneficial for a variety of other purposes.
 
 
 

Extracting Cell Phone Data Forensically

Whether your objective is to look for spyware, find deleted text messages and call logs or even find browsed websites or GPS coordinates on a phone, tablet, or a standalone GPS device, the first step is to forensically extract the data.
 
 
 

Forensic Computer Investigation

During a computer forensic investigation, each computer is treated as forensic evidence by using industry standard forensic protocols to ensure accurate representation as well as legal authenticity of the extraction process
 
 
 
 
 
 
 

Digital Forensics Techniques

Wondering what tools and technologies help us do our work? International Investigators uses highly sophisticated software combined with state of the art hardware to allow our Forensic Examination Team to thoroughly extract and process critical data from virtually any digital data storage device.
 
 
 

Questioned Document Examination

Make sure documents are authentic and original with our forensic examination of signatures as well as examination processes used to verify document originality.

 
 
 

Unconventional Covert Espionage Devices

It is ever more common to find everyday electronics with hidden audio/video recording equipment hidden inside. A quick search on common online marketplaces show some low tech options available with just the click of a mouse. However, low tech does not mean it can't get high definition recorded video from the privacy of your home or office. How sure are you that fax/copier machine isn't saving those scanned copies of all documents processed for retrieval later by the perp stealing your your data.
 
 
 
 

What Are Some Indicators That My Cell Phone Might Have Malware/Spyware?

Top 10 Suspicious Indicators That Your Cell Phone Might Have Illegally Installed Spyware

1. Battery is warm when not in use.
2. Battery life is noticeably diminished each day.
3. Some Blackberry’s; communication icon on right screen flashing.
4. Small pauses of audible communication while talking.
5. Light audible tones, beeps or clicks throughout conversation.
6. Flashing or flickering on display or change of brightness.
7. Some spy-ware programs require the spy to manually mute their phone, therefore you might hear them in the background at the beginning of conversation or when they tap in.
8. Slower internet access.
9. Suspicious 3rd parties have detailed knowledge of your private conversations and locations (GPS).
10. You have opened a suspicious email or one from a potential spy. (allowing Trojan horse to install spy-ware remotely).

 
 
 
 

The Smarter the Cell Phones the Easier It Is to Hide Spy-Ware

If the eavesdropping perpetrator has effectively installed spy-ware on your phone, then that perpetrator has total control, i.e. obtain all text messages, emails, internet sites visited GPS location, photos and videos obtained, etc.
 
 
 
 

Facts You Should Know About Cell Phone Spyware

  • The manner in which spyware is installed on the phone is dependent upon the capabilities of the phone itself
  • Smart phones can have spyware downloaded from websites, Blue-tooth connection, mms messages, and of course a pc connection.
  • There is no single spyware program that can be installed on all phones since there are many different OS’s and each one must have code written for the specific OS.
  • Symbian OS is the most common OS but has hundreds, if not thousands, of different versions depending on the software development intended on the device. Many spyware programs cannot work for more than a few versions, if even more than one version.
  • Cell Phone Spyware programs that can be installed via Bluetooth connection claim to be able to install software remotely, but as with all Bluetooth devices it must have been paired with the target phone first.
  • It is possible for the remote installation of spyware onto a target phone, but this involves “tricking” the user into downloading and installing the malware on their cell phone.
  • Sending bogus mms messages with the intent to install cell phone maleware is the easiest way to trick a target user. By sending messages with fake links could get the user to unknowingly download spyware programs. Most of these attacks involve making the user think the messages came from the carrier and posing as upgrades to the firmware on the phone especially through email. Some techniques use photos embedded with third party stenography hiding the spyware.
  • Some cellular spyware claims that it can extract data and voice from a target phone without installing any spyware on the target phone. We are still researching a specific software with this claim but at this time we can neither confirm nor deny this possibility.
  • Cell phone spyware programs can collect the following information and possibly more: contact data, mms, sms, phone call history, email history, web page history, pictures, video, GPS location, cell tower trangulation history (less accurate), file system information.
  • Spyware programs can remotely become a covert third party to conversations as well as use the phone as a bug so that room audio is available whenever the bad guy chooses. The spyware can alert the bad guy when a call is made as well as texts and emails so they can call the phone and listen in. No call history for the bad guy’s phone is saved on the phone although it will show up in the service provider’s records.
  • As far as prevention of cellular spy-ware installation is concerned, blackberry’s have the best protection by far. The security code can only be guessed a certain number of times before it completely erases all information from the phone and has no obvious “backdoor” to circumvent this issue. Other phones can be protected more or less by passwords but the password must not be too easy to guess and some phones can allow a reset of the password, which is not that hard to accomplish in the wrong hands.
  • There is no known blanket spyware protection that will protect all cell phones
 
 
 
 

Can I Examine My Own Phone

It is nearly impossible on most phones to detect cellular malware without the use of sophisticated software. Not only is forensic spy-ware detection software expensive, it is also highly complex and difficult to master. Furthermore, the software is only as good as the examiner who utilizes it. The examiner must not only know how to operate the software to its full potential but also be able to manually search through the data (lines of code) to find the spy-ware. An examiner must have completed multiple certification courses prior to becoming an expert examiner. This is particularly useful if any evidence obtained is to be introduced into a court of law. Credibility is very important in technical evidence. Learn more about our cell phone spyware detection procedure.
Still have questions regarding your phone? Call us, toll-free 1-800-403-8111

 
 
 
 

How Do I Get My Phone To You?

We recommend placing the phone in a well protected container with the battery separated from the phone and supplied along with the charger. If you are unable to remove the battery from the phone then we highly recommend that you turn it off and wrap the phone 8 or 10 times with metal foil which will essentially become a Faraday cage. This will prevent any signals from leaving or entering the phone prior to our examination. Once we receive your phone an examination begins within one business day and usually takes approximately seven days to complete prior to sending the phone back to you. Sometime we are able to accomplish the examination in less time.

Step 1: Call us toll-free 1-800-403-8111 or fill out this contact form
to obtain an estimate to examine your phone.
Step 2: Follow the procedure above for securing your phone for shipment to us.
Step 3: Ship your phone to:


International Investigators
c/o Cell Phone Forensics

3216 North Pennsylvania Street
Indianapolis, IN 46205

 
 
 
 

See our work on Cell Tower Triangulation evidence that could have proven Charlie White's innocence

 
 
Cell tower triangulation is similar to GPS tracking in many ways. Multiple towers are used to track the phone’s location by measuring the time delay that a signal takes to return back to the towers from the phone. This delay is then calculated into distance and gives a fairly accurate location of the phone. Detecting which antenna of the tower the signal bounced off of can further refine the location. This gives a more specific location when used congruently with multiple towers calculated by multiple dishes on each tower. Cell phone companies do this for a variety of reasons including enhancing the ability of the E911 system. This system was put in place for 911 operators to get a location of where a call from a cell phone is made from so that if communication is lost, the operator would know where to dispatch help. Cell tower triangulation is also used to provide the phone with the best service by noting which tower it is closest to and using them to provide service. Cell tower triangulation provides the ability to track the historic location of the cell phone’s presence. It will then identify where the cell phone was when receiving/making calls, texting, emailing, etc.

The cell tower triangulation data can be used forensically in many ways to achieve many objectives, i.e. intelligence, criminal location verifications, alibi confirmation, etc. As technology is ever evolving, so are the phone carriers and the various cellphone markets throughout the country. Only in exigent circumstance, or with the assistance of state/federal law enforcement can cellphones be GPS, or “pinged” with accuracy. This is considered a “live intercept”, which can be as accurate as 2-6 meters on a device. If any cell phone communication is intercepted in real time, a “live intercept”, this ability is which is outlined and defined as a Title III intercept under state/federal law, which again takes a court order from a state/federal judge. Historical information, is just that, in the “past”, but it can still yield valuable information with regards to location of a cellphone, the actual cell phone tower and even the what side of the tower. Historical call details, are not just incoming/outgoing phone calls, they consist of the originating cell site and the terminating cell site, which in essence is where the call began and where it as ended. These cell sites are the actual cellular tower location, which typically consist of three antennas. Depending on the azimuth of each antenna, it will depend on the layout in degrees of each antenna, as various companies have different layouts and even various layouts depending on the topographic area of the location of the cell tower. These details, along with the certain details of the cell tower triangulation investigation, can be of the utmost importance in explaining the events in question. For example, these details can show a route of travel to and from a location. The frequency of when the “target phone” is in a certain area, the time of day, where the last call made on a certain day and the first call the immediate morning could be a logical conclusion of where a person slept that night. Lastly, in the events of homicides, or missing persons and any suspect(s) in these investigations, the phone may be powered down for a certain time period. These “voids” of irregular activity, should cast doubt in why the phone suddenly was powered off.
 
 

Legal Process

 
III have investigators who are qualified experts in this area, who have utilized hundreds of various court orders, preservation letters and the applied expert knowledge of being able to get the time sensitive facts needed for the investigation. Cell phone companies and various social media online groups can provide historical information, but this information is not held for an indefinite amount of time. It is imperative to retrieve the information before it is lost. Typically, the rule of thumb for law enforcement is a “90 day window”. After this time has elapsed, then the ability to retrieve the details diminishes quite rapidly.

We have the legal language and the necessary forms to assist law firms with obtaining the information and most importantly, interpreting the cell tower triangulation analysis and information.

 
 
Free Consultation:
Need to talk now? Fill out the quick form below and we will contact you shortly.
How should we contact you