All in Investigations

Month: July 2012

  • Cell Phone Records Plus Cellular Forensics Equals Power

    Cell Phone Records Plus Cellular Forensics Equals Power

    Often we get inquiries about cellular forensics and the person calling doesn’t know what they are really looking to get. Some callers think all cellular forensics entails is getting records from the cell phone service providers. Let’s clear up some of this confusion. There is a big difference between cell phone service carrier records and…

  • Missing Person Investigation Solved Under a Bridge

    Missing Person Investigation Solved Under a Bridge

    When you think of private detectives like , you probably don’t think of missing heirs, do you? No you’ve got your head wrapped up in crimes and great mysteries and cheating spouses. In actuality, because we have such great access to restricted databases, we are often called upon to locate a missing person. Often, the…

  • Cell Phone Spyware Gives Away Information Without Your Knowing

    Cell Phone Spyware Gives Away Information Without Your Knowing

    There was a recent article in the Indianapolis Star newspaper about a “computer virus” that can hear what is said. The article was actually an Associated Press piece written by Raphael Satter and Amy Teibel out of London. And the “virus” was more than likely spyware. It has been dubbed the “Flame Virus” and it…

  • Computer Forensics Discovery Reveals the Truth

    Computer Forensics Discovery Reveals the Truth

    When Brad called , he was pretty distraught. The conversation with him was peppered with one phrase. He kept saying he just wanted the truth. The truth he was seeking was about Lynn, his wife. Lynn was a freelance graphic artist. She worked from home and spent hours in front of the computer. She had…

  • Cell Phone Forensics – No Judgment, Just Facts

    Cell Phone Forensics – No Judgment, Just Facts

    We worked with a woman who called from Seattle. We know she contacted us because we are one of only a few investigative labs who can potentially identify the bad guy when we uncover a cell phone spy. What we didn’t know, was that she was concerned about being embarrassed because some of the details…

  • In Computer Forensic Analysis, the Broader the Scope the Better

    In Computer Forensic Analysis, the Broader the Scope the Better

    Have you ever heard about the form of marketing called drip marketing? It’s where a little bit of information is “dripped out” a little bit at a time over an extended period. It reminds me of the form of torture where it is set up that a drip of water is dropped on the victim…

  • Bug Detection has Evolved, Just Like Planting Bugs Has Changed

    Bug Detection has Evolved, Just Like Planting Bugs Has Changed

    Technology has changed just about everything about life, hasn’t it? Well, that pertains to the investigative world, too. In the early 1970s, when did Technical Surveillance and Countermeasures (TSCM) sweeps, we were basically looking for radio room bugs and telephone line taps. Bad guys would generally need to have access to the location to plant…

  • Hidden Asset Research Reveals One Lead That Unravels the Entire Scheme

    Hidden Asset Research Reveals One Lead That Unravels the Entire Scheme

    An attorney representing a bank recently contacted to conduct some hidden asset research. He was representing a lending firm. The organization was holding paper on a property that had gone into foreclosure. The lender believed the customer had assets to offset the debt on the property but had hidden them. What was really interesting was…

  • Professional Investigators are Attorneys’ Information Resource

    Professional Investigators are Attorneys’ Information Resource

    Byron (not his real name) was sitting in his attorney’s waiting room waiting to deliver some documentation relevant to a suit he was bringing against a former employee that required some computer forensics. As he waited he overheard a couple talk about the reason they were there regarding a problem about real estate assets and…