All in Investigations

Category: Cell Phone Extraction

  • The Top Questions On What Information You Can Expect From A Private Investigator

    The Top Questions On What Information You Can Expect From A Private Investigator

    We get a lot of questions with regards to specific requests for various types of investigations. Mostly:  Is it possible to get… A Driving History ~ Yes, to obtain a Driving History on an individual, we must have a valid reason to access the Bureau of Motor Vehicles.  EX:  Civil Litigation or Criminal Defense, Pre-Employment…

  • What Can Be Learned?

    What Can Be Learned?

    Do You Want the Truth About an Uncomfortable Situation in Your Life? Here’s What to Expect When Hiring A Private Investigator When a Client calls for an Investigation, our staff is prepared to answer their questions and understand their concerns. They may ask for surveillance, a lie detector test, a technical or forensic investigation or…

  • Why would you need your phone forensically extracted and analyzed? 

    Why would you need your phone forensically extracted and analyzed? 

    Why would you need your phone forensically extracted and analyzed?  Here are a few reasons to do so. Example 1: Deletion of Personal Information: A Client requested a “dump” of her cellphone.  Dump meaning data extraction. Even though she had backed up the phone to the cloud some photos were not there, and she could…

  • Why would you need your phone forensically extracted and analyzed?

    Why would you need your phone forensically extracted and analyzed?

    Why would you need your phone forensically extracted and analyzed?  Here are a few reasons to do so. Example 1: Deletion of Personal Information – A Client requested a “dump” of her cellphone. Dump meaning data extraction.  Even though she had backed up the phone to the cloud some photos were not there, and she…

  • Investigations: Fact or Fiction

    Investigations: Fact or Fiction

    Our results are the truth: Is what we think we see or what we have heard or the way we feel fact or fiction? Investigations are conducted to uncover the truth. A Background Check to learn about an individual, Surveillance to observe activity, Polygraph or VSA for deception, Forensic Analysis for malware and extraction of…

  • Why Have Your Cell Phone Data Forensically Extracted?

    Why Have Your Cell Phone Data Forensically Extracted?

    There are many reasons an individual, attorney or a company would request an extraction from a device. An accusation of cheating on your spouse or even worse you suspect your spouse of being unfaithful can likely be addressed by analyzing cellular user data. More than likely there is sufficient evidence on of your cellular devices…

  • Ostriches Don’t Get a Fair Deal in a Divorce

    Ostriches Don’t Get a Fair Deal in a Divorce

    For those of us who have been divorced, we understand the process and procedures.  We know that we either represent ourselves (which could create problems during and after the divorce) or we retain the services of a reputable law firm (which prevents the pro-se issues).  We enter into a marriage full of hope and dreams…

  • Was It Really an “Air Tight” Criminal Case?

    Was It Really an “Air Tight” Criminal Case?

    DeVon’s criminal defense attorney called us and explained that the police had an “airtight” case against his client for multiple felony charges. DeVon’s aunt was footing the legal bill and told him she didn’t care about the cost as she believed her young nephew was innocent of the charges. The attorney was fresh out of…

  • Cellular Forensic Data Extraction Solved the Puzzle

    Cellular Forensic Data Extraction Solved the Puzzle

    When Arthur contacted us at , he was perplexed about his wife of 27 years whose personality had changed, her marital demeanor had changed, her sexual needs seemed to require more of an aggressive manner and her choice of provocative clothing was different than her previously conservative nature.  She was currently the breadwinner; he was…

  • Verbal or Written Communications are Not Always Private

    Verbal or Written Communications are Not Always Private

    Technical Surveillance Countermeasures, sometimes called TSCM Sweeps, debugging, wiretap detection or just plain old “sweeps”.  With the advent of cellphones, VOIP phones, computer Skype, FaceTime, go-to-meeting and the many other ways of communication, illegal eavesdropping has become easily available to those who are curious.  Google the internet for mobile phone bugging and you will find…