by Michael Roberts | Nov 14, 2022 | ISP Subpoena Instructions
Simply copy and paste the text below and adjust as necessary. It is important to think outside the box, remember, ISPs will only give you what you ask for, and if you do not know what to ask for, then very important information will be ommitted. Production Request...
by Anna Brown | Nov 1, 2022 | Uncategorized
Instagram Stalkers Exposed 1 billion monthly active users share content on Instagram. But for most, their Instagram is a personal space so you don’t want unwelcome guests lurking in the dark. But technology makes it easy for people to stalk your Instagram account. And...
by Anna Brown | Sep 19, 2022 | Blog
Can Anonymous Text Apps be Traced Can Text Free numbers be traced? Anonymous texting apps such as TextFree, and TextNow, give users a certain degree of anonymity. But can anonymous text apps be traced back to an individual when used for harassment, or other malicious...
by Anna Brown | Sep 12, 2022 | Blog
How to trace a phone number that is fake? Harassment is often taking place through fake phone numbers from anonymous texting apps and burner phones. These phone numbers are often used once or briefly, and then abandoned, making it difficult to trace a phone number. We...
by Anna Brown | Sep 6, 2022 | Blog
How to trace a burner phone number Burner phones are often used with the purpose to harass someone anonymously. Many people often contact us because they receive harassing text messages from numerous burner phone numbers, and ask us how to trace a burner phone number....
by Anna Brown | Sep 2, 2022 | Case Studies
2022 Case Study – How we Exposed the Identity of a ProtonMail sender The Brief For months, our client received extorting messages from fake Proton email addresses and spoofed phone numbers. The antagonist also contacted her husband and family members with...
by Anna Brown | Sep 2, 2022 | Case Studies, Cyber Investigation Services
2021 Unmasking romance scammers, collaboration with FBI The Brief Our client was scammed of USD $500,000.00 of his life savings by way of a romance scam. This was a big scam network with people involved in both the USA and Ghana. The criminals used several fake...
by Michael Roberts | Jun 15, 2022 | Operation Burn-It-All-Down
Rexxfield identified seven Chinese scammers through Facebook today. We disrupted their grooming of more than 7,000 potential, and actual victims, by working with Facebook security to delete the profiles: facebook.com/profile.php?id=100079098527553...
by Anna Brown | Apr 21, 2022 | Uncategorized
There is a significant spike in money recovery phishing scams targeting past victims. These types of scams are effective because the original scammers keep track of people who proved to be naive and trusting, and fell victim to other scam campaigns. Even though...
by Guy Ξ Smiley | Feb 9, 2022 | Cryptocurrency investigation
I’m going to use hacked and scammed in the same breath here because in both instances the hacker is using a power imbalance – an imbalance in knowledge, skill and experience to extract funds that are not theirs. Think of granny who has heard she should boost her...