Colorado's Most Trusted Private Investigator -- Call Today for a Free Consultation!

Brightstar Investigations is a BBB Accredited Investigator in Colorado Springs, CO
z-library

Why You Need Internet Intelligence Today

Posted on: July 11th, 2014 by BrightStar Investigations

During the past 10 years, we have witnessed a worldwide explosion of how information is shared, how much of it is shared, and who it is shared with. Let’s be honest–20 years ago, would you have taken a picture of your food and shared it with 1 million strangers? Why Internet Intelligence is Vital If […]

Attorneys Can Now Scan The Social Media of Jurors

Posted on: June 23rd, 2014 by BrightStar Investigations

                        I have great news for attorneys today. The American Bar Association (ABA) just announced that attorneys can scan the social media accounts of jurors. This includes potential jurors, sitting jurors, and even goes as far as when jurors are in deliberation! Social media […]

Why It’s Important for VIP’s & Executives to Hire a Private Investigator

Posted on: June 20th, 2014 by BrightStar Investigations

One group of individuals that need a private investigator the most are VIP’s and Executives. A common misconception is that a VIP or an Executive would only need the help of a private investigator AFTER something has gone wrong in their lives; IE, divorce, stolen assets, threats of blackmail, breach of data, unwanted photographs published […]

5 Out of the Box Things That a Private Investigator Might Do

Posted on: June 15th, 2014 by BrightStar Investigations

I have found that a common perception of a private investigator is that all that we do is sit in cars, follow people, take pictures of cheating spouses, smoke cigars and wear trench coats. Ha! This could not be further from the truth. With a new wave of younger private investigators, new technology, and a […]

The Status of TrueCrypt

Posted on: June 13th, 2014 by BrightStar Investigations

I have to admit it. I was shocked when I heard that TrueCrypt had been compromised. After working with professional hackers that have experience in top-level intelligence operations—who by the way depended on the use of TrueCrypt AND taught me how to use the software–I was floored when I heard that this software is now […]