All in Investigations

Month: May 2013

  • 2 Secrets to Criminal Defense Using Cell Phone Forensics

    2 Secrets to Criminal Defense Using Cell Phone Forensics

    Teachers are always encouraging school children to look for patterns – that’s because patterns are so revealing. And it’s not only true in math and science; it’s true in investigations, too. No. 1 Secret – Patterns Tell a Story in Mobile Phone Analysis With years of experience in the field, the investigators at know how…

  • Cell Phone Forensics Might be the Best Defense

    Cell Phone Forensics Might be the Best Defense

    Cell phone forensics at is more than mobile phone forensic analysis. It can include mobile phone spyware detection or cell phone hack detection and sim card forensics, but it includes many other aspects when it comes to defense in a criminal case. For instance, to provide admissible evidence to support a defendant, we employ a…

  • Suspect Embezzlement? Hire a Personal Asset Search Investigator

    Suspect Embezzlement? Hire a Personal Asset Search Investigator

    We have talked a lot here in the ’ blog about being asked to find hidden assets in divorce situations, but we don’t want you to think that is the only time money is hidden away from the sight of others. Today I want to talk about another instance when we are called in to…

  • Geography has a Role in Due Diligence Investigations and Background Checks

    Geography has a Role in Due Diligence Investigations and Background Checks

    We live in a time when it is not uncommon for a person to live in several states throughout their life. When is called in on a due diligence investigation or background check, we see that trend. If a subject has lived in a number of counties and states, that could be a major stumbling…

  • Cell Tower Triangulation Provides Evidence of Innocence

    Cell Tower Triangulation Provides Evidence of Innocence

    Another interesting case recently investigated was centered in a child custody battle. A police officer and his wife in Iowa were divorcing and both wanted custody of their two children. The wife accused the officer of harassing her by sending threatening text messages. He was on the verge of losing any custodial rights as well…

  • Who is Safe from a Mobile Spy?

    Who is Safe from a Mobile Spy?

    In a recent discussion with one of the cellphone experts at , I learned that the Blackberry is probably the least “hackable” phone out there. A cell phone forensic analysis can include what is called a password bypass. In fact, we have been asked to uncover passwords that had been lost or forgotten. That is…

  • Talk to a Computer Forensics Consultant to Secure Your Retired Hardware

    Talk to a Computer Forensics Consultant to Secure Your Retired Hardware

    So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware. You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have…

  • Unfair Competitive Edge Can be Averted through TSCM Sweep

    Unfair Competitive Edge Can be Averted through TSCM Sweep

    There are so many reasons for electronic surveillance. Just about any situation that includes a competitive element provides the impetus for covert surveillance. Corporate and industrial espionage may be what first comes to mind, but spy listening devices can be used in every industry and field. According to an ESPN article from April, 2012, there…

  • Know When to Catch Your Cheating Spouse

    Know When to Catch Your Cheating Spouse

    With half of all marriages in America ending in divorce, it won’t surprise you, I’m sure, to learn that in 65% of marriages, there is a cheating spouse – either currently involved in an extramarital affair or been involved in marriage infidelity in the past. In many instances, even when you feel you have evidence…