
We were recently asked here at how to prevent a cell phone from becoming a mobile spy. No one wants to be a victim of a bad guy eavesdropping on their conversations or their life through a cell phone listening device and we can detect it using cellphone forensics. At this time, there isn’t any […]

Do you know what a ping is? Do you ever remember those movies where one ship or submarine sends out a sonar signal to determine the location of another ship or submarine? They make that ping sort of noise? Well that is similar to a cell phone ping only, in the case of smart phones, […]

Sometimes the bad guys who have installed cell phone spyware on a mobile device fumble and their fumbles could mean you discover their covert actions. For instance, here at , we had a client come in with his Blackberry in his hand and say that something just wasn’t right. His request was for a forensic […]

It’s election time and you know what that means: politics. It is often for the best of intentions that someone decides to run for public office, but even those candidates are subjected to the arrows from the opposition. For that reason, when anyone decides to put their name out there as a candidate, it should […]

These days people are having conversations all over the place – even private conversations in open public places. However, there may come a time when you suspect someone has information from a mobile phone conversation that wasn’t made in a public place. There is no cell phone listening device to make that possible, but there […]

When computer forensics investigators extract data, it is handled completely objectively. Many times, we don’t know the implications of what is – or is not – found in the data. We compile the information and turn it over to the client. That’s just the way it is with computer forensics analysis. For example, was involved […]

Even though the protocol and process a computer forensics investigator uses to extract and analyze data from a computer are the same no matter who owns the computer, ownership does make a difference in the outcome once the facts are uncovered. For one thing, the owner of the machine has to provide appropriate permission for […]

Infidelity in marriages breaks down the trust between spouses, which is why it often ends in divorce. You might think after the marital infidelity investigation and subsequent divorce proceedings; everything between two ex-spouses is done. Often, that just isn’t the case – especially when there are children involved. When infidelity in marriages results in ex-spouses, […]

A search to locate hidden assets is not always linked to divorce proceedings. is often asked to complete an asset investigation to find hidden assets in business situations. Because of our professional standing and expertise, has access to data bases and changes which makes locating hidden assets efficient in both the time and cost involved. […]

You may think that tapping phone lines at your home means someone has to gain access inside the house. While it is possible to install phone tapping devices inside the rooms of your home or office, but you have to know that a bad guy doesn’t even have to get in your house to tap […]