All in Investigations

Month: November 2015

  • Using Handwriting Analysis to Prove a Forged Will

    Using Handwriting Analysis to Prove a Forged Will

    While a forged or fraudulent will may seem like a plot twist in a novel or movie, it’s a crime that happens more often than people think. For example, a home care aide who takes care of an elderly shut-in decides she deserves more money once the family patriarch has died since she’s cared for…

  • The Complexity of Cellular Tower Triangulation Affects Accuracy of Evidence

    The Complexity of Cellular Tower Triangulation Affects Accuracy of Evidence

    There is a lot of consternation about the accuracy of forensic cell tower evidence. Over the last several years courts have ruled that evidence submitted by authorities has not been precise or correct and people were wrongfully convicted. Here at , our cellular forensics experts would agree that the accuracy of cellular tower triangulation to…

  • Bail Bond Recovery Agents Use Private Investigators, Too

    Bail Bond Recovery Agents Use Private Investigators, Too

    Fugitive recovery is not something we here at do. We leave the actual fugitive recovery to the bail recovery agent or the local authorities. However, we do work for fugitive recovery agents when they have someone who has skipped out or gone missing. Our involvement is in locating the whereabouts of those “missing” people –…

  • Do You Think Computer Forensics Conjures Up the Past Like Magic?

    Do You Think Computer Forensics Conjures Up the Past Like Magic?

    Computer forensics is not magic, in fact it is very technical in nature and can be very exacting. People always wonder how the computer forensics experts at can “conjure” up “stuff” from computers that the owners thought was gone. How does forensics data recovery work? When it comes to files, forensic computer investigations and computer…

  • Are Employees Putting Holes in Your Business’s Digital Security?

    Are Employees Putting Holes in Your Business’s Digital Security?

    As if business owners didn’t have enough to worry about, computer hackers are opening a new can of worms that can affect businesses on the sly. And not only is it a problem, but an embarrassing situation as well. Let me give you an example: There was a site based in Canada called Ashley Madison…

  • Computer Forensics Done Right – or not at all

    Computer Forensics Done Right – or not at all

    Recently the Department of Justice issued a US search warrant to Microsoft in regard to emails sent from an Ireland-based subscriber. According to an article in the Guardian, “The United States government has the right to demand the emails of anyone in the world from any email provider headquartered within US borders, Department of Justice…

  • Investigation Teaches a Business Lesson to an Unsuspecting Teen

    Investigation Teaches a Business Lesson to an Unsuspecting Teen

    Parenting is a tough job, especially when you want to protect your child and she is a very headstrong teen who thinks she understands everything about the way the world works. At least that was the comment from a worried parent who called . Katy* got her first job at the local ice cream shop…

  • Is it Employee Embezzlement?

    Is it Employee Embezzlement?

    A very depressed-looking business owner came in for an appointment at . We are accustomed to clients or prospective clients arriving emotionally charged, either very angry or hurt, but they don’t usually act like this gentleman. Once talking, he explained that he was “darn near just ready to chuck it all in.” He said he…