All in Investigations

Tag: private investigations

  • Fugitive Recovery Requires Finding a Missing Person

    Fugitive Recovery Requires Finding a Missing Person

    Family members are not the only people who come to asking for our help in finding a missing person. Recently we were called by a group of fugitive recovery agents. In this case, the fugitive recovery agent was employed by a bail bondsman who had provided the funds for a person whose bond was set…

  • Computer Forensic Analysis is a Tool for Divorce Attorneys and Clients

    Computer Forensic Analysis is a Tool for Divorce Attorneys and Clients

    Computer forensic investigators are bloodhounds for evidence of the truth. The truth could be evidence of a corporate crime or something as personal as relationships between spouses. Divorce attorneys contact often with different requests. One case recently involved a forensic computer analysis. The wife felt trapped in a marriage to a wealthy professional. Everyone thought…

  • Computer Investigation Shows Employee Embezzlement is Digital Now, Too

    Computer Investigation Shows Employee Embezzlement is Digital Now, Too

    Theft by employees is a problem for more than retail or restaurant businesses. It is a problem in the office, too. I am talking about more than office supplies and materials here. I am talking about the theft of ideas, processes, client lists and confidential corporate operations. This could include employee embezzlement through accounting or…

  • Cellular Forensics Even Applies to Drop Phones

    Cellular Forensics Even Applies to Drop Phones

    Data Extraction. That’s what provides the evidence so many of our clients want when they request a mobile phone forensic analysis. Cell phone forensic tools allow a cellular forensics specialist to create an exact image of the cell phone hard drive and from that, complete a mobile phone analysis. The analysis will uncover any evidence…

  • Bug Detection Out of the Office

    Bug Detection Out of the Office

    During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney.  His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how.…

  • Cell Phone Forensics Exposes Source of Harassing Messages

    Cell Phone Forensics Exposes Source of Harassing Messages

    was recently called into an interesting case that could have easily escalated into violence or a life changed forever. We got a call from an attorney who was representing a couple and their college-age daughter. The daughter was receiving harassing texts, calls and messages on her cell phone. They believed the former girlfriend of a…

  • Decrease Threats by Reducing Vulnerability to Cell Phone Spy

    Decrease Threats by Reducing Vulnerability to Cell Phone Spy

    Let’s talk cell phone spyware detection. Remember this number: 95%. McAfee estimates that’s the percentage of malware ever devised that has been created in the past year. And, the amount of malware detected by them increased 44% last year, too. Those are dismal numbers that illustrate the growing threat to online security. Many of the…

  • Computer Forensics Consultant First Line of Defense Against Spear Phishing

    Computer Forensics Consultant First Line of Defense Against Spear Phishing

    Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game…

  • Sometimes It’s Not Spyware Found During a Computer Forensic Examination

    Sometimes It’s Not Spyware Found During a Computer Forensic Examination

    A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an…

  • 2 Secrets to Criminal Defense Using Cell Phone Forensics

    2 Secrets to Criminal Defense Using Cell Phone Forensics

    Teachers are always encouraging school children to look for patterns – that’s because patterns are so revealing. And it’s not only true in math and science; it’s true in investigations, too. No. 1 Secret – Patterns Tell a Story in Mobile Phone Analysis With years of experience in the field, the investigators at know how…