top of page

Services

FREE Consultation

 

The internet is a global maze of intertwined websites, social media, and online accounts, comprising people with similar, but often competing ideas and ideals.  While some people utilize the internet for its positively impacting benefits such as higher education, employment, and learning; others utilize it to harass, demean, scam, and otherwise take advantage of unsuspecting internet users.  Stealing personal data, hacking accounts, and cyberbullying are but a few of the many ways people fall prey to internet predators. 

 

Virtually anything done on the internet requires an account, which in-turn requires internet users to provide certain pieces of personal information like cell phone numbers, email addresses, dates of birth, and sometimes home addresses.  When exploited, these indicators can be utilized to compromise a person's social media and email accounts; harass or bully them; steal their identity; plant malicious software on a remote computer; or locate a person's residence.  There are endless methods and means to harm others via computers and the internet and it can happen at any time.  Rest assured, it CAN happen to you.  For this, you need a cyber investigator with in-depth cyber knowledge; practical experience; and a relentless tenacity to search for, discover, and reveal subjects of criminal activity.

​

[ General Inquiries / Internet scams / Hacked Accounts / Cyberbullying, Stalking, Online Harassment / Nonconsensual - Revenge Pornography / More ]

Cyber Consultation
Data & Evidence Review

 

Data can be collected from many sources, including social media subpoenas by law enforcement or network logs from a company or residence.  Some agencies rely on auto-generated reports for interpretation of the data and those reporting mechanisms have their utility.   In other instances, data may require a physical review by a real person to glean an intelligible interpretation of it.  These situations routinely require the assistance of an intelligence or data analyst to sift through, filter, interpret and report the data, which enables decision makers to make well-informed decisions regarding its relevance.  Analysis of large data sets provides a view of data that others may not have considered and/or possibly overlooked.

​

[ Subpoenaed Data / Large Data Sets / Attorneys / Evidence Reviews / Expert Witness ]

Data & Evidence Review
Personal Data Scan & Online Data Removal

 

Data brokering websites contain sensitive personal information published for anybody to see and exploit.  Personal information consists of a person’s full name, age, phone number, email address, residential address, relatives and associates names, and a map with directions to their home.  There are numerous stories of strangers randomly showing up at a person’s home or calling their cell phone.  In each case, the resident never knows how the stranger obtained their contact information.  Most people are unaware of the amount of personal data that is publicly available on the internet because they didn’t publish or post it themselves.  Unfortunately, the information is populated on websites and is available to stalkers, harassers, and anybody else who takes an obsessive interest in another person.  Fortunately, data removal options exist so others can't see your personal infromation.

​

[ Privacy / Celebrity / People of Notoriety / Public Figures / Politicians / News Anchors ]

Personal Data Scan
Online / Cyber Investigations

​

​We've essentially migrated to an online environment and our digital lives often overlap with our real lives.  With that, people don't realize how much information they published about themselves online.  Today's norm often consists of social media, cyberbullying, stalking, harassment, unknown emails and phone calls, online dating, child exploitation, making internet purchases, and generally surfing the internet.  Eventually people get into trouble online but don't normally know who to turn to for help.


Open Source Intelligence (OSINT) investigations and Open-Source Research (OSR) provide viable options most people don't know they have at their disposal.  This is accomplished by employing specialized techniques to legally and ethically leverage freely and publicly available information to discover items of evidentiary value and answer questions.  Generally, people who search for information online only conduct simple and random searches or do surface reviews of a person’s social media accounts.  These basic techniques have utility and may provide a person with the results they desire in the short run.  However, OSINT comprises techniques that are much more in-depth than basic online searches and provide a more comprehensive view of a particular person or situation.  OSINT masterfully employs search techniques, which enable a skilled investigator to dig deeper and go beyond the surface of the internet.  A skilled open source investigator knows where to locate such information and importantly how to retrieve it.

​

[ Cyberbullying, Stalking, Harassment / Nonconsensual - Revenge Pornography / Fugitives / Sextortion / Online Scams / Hackers / Online Defamation / More ]

Online Investigations
bottom of page