Celebrating 50 years providing professional private investigations worldwide!

Celebrating 50 years providing professional private investigations worldwide!

Private Investigator Free Consultation (24hrs)

Available 24 hours with Rapid Response

Email Tracking and SMS Tracing


Email Tracking and SMS Tracing: In this age of electronic communication hiding one’s true identity appears to be easier than ever before, but ICS' private investigators have sophisticated tools at their disposal that can track down emails, instant messages, and cell phone calls to tell you where they are coming from and who is sending them.


Email Tracking and SMS Tracing

Are you finding instant messages or emails from unknown senders on your computer? Are the messages you are receiving threatening or creepy? Using SMS tracing software, an ICS investigator can track down the name, address and location of the sender, and tell you who is cyber-stalking you.

Conversely, our savvy cyber investigators can plant web bugs in your emails, and track them to tell you who opens your outgoing email, when the email is opened, if the email is forwarded to someone else, and who is receiving the forwarded mail. Web bugs are tiny, invisible objects that can be embedded in an email or on a webpage to monitor the activity associated with document. If you believe your children are communicating with someone you have ban them from associating with, or that your spouse is pursuing a cyber infidelity, simply send them an irresistibly funny, web-bugged email that they will want to share with others, and see who they forward it to.

Do you suspect your spouse or child is lying to you about where they are when they phone you? Using global positioning (GPS) tracking, an investigator can monitor the whereabouts of the cell phone when the call is placed. You will know almost instantly where the person who is calling you is located. With a GPS enabled cell phone you will be able to trace every movement of the person carrying the phone, and follow their trail from one location to another. (This GPS tracking is generally used by law enforcement in locating underage children, and can only be used by a private investigator for permissible purposes, please get a free consultation to find out the specifics as to the availability of GPS tracking for use in your case)

Are you a business owner who suspects that your employees are using company email inappropriately? You can rely on ICS for the best in email capture technology so that you will soon know who is passing on confidential company information to others. Do you suspect that your field staff is not where they are supposed to be when they leave the office? By using GPS cell phones you will be able to locate the whereabouts of your field staff on a moment’s notice. If your staff is engaged in hazardous work, the GPS tracking on these phones can also help you quickly locate them in the event of an accident or emergency.

Cell phones equipped with SMS tracking (spy software) enable a third party to secretly receive duplicate copies of all incoming and outgoing text message traffic on the phone. These messages will be forwarded directly to a third party phone without any indication to the person being spied on. You will know exactly what your spouse, children, or employees are saying while texting with others after our investigators download this software on to your phones.

Contact ICS today for a free consultation, and be prepared to answer the following questions so we can take quick action on your behalf.

  • What is your role?
  • When was the problem first suspected?
  • Does the subject use a PDA or Cell Phone?
  • How many computers are in question?
  • Do you have "Broadband" internet access? (DSL/CABLE/T1/OC12)
  • Are you aware of any encryption or passwords in use?
  • What is the operating system of the suspect computer?
  • Will you need these services on a regular or recurring basis?
  • By what date do the services need to be complete?
  • Do you know if "chain of custody" has been preserved?
  • Do you use VoIP? (Vonage/XO/Other)
  • Does the subject use IM, Chat or Email?
  • Please list any websites, social networking sites, enthusiast group, or forum sites the subject is known have or currently use: (i.e. myspace, orkut, friendster, Porsche forum, etc)
  • Will the results of this investigation be used in a court of law?
  • What are you trying to accomplish with this effort?
  • Could someone's employment be affected adversely from the results of this investigation?
  • Please understand that the budget for your case may vary depending on the complexity. What is the budget that you have in mind?

(2/20/2013)

A consultation for this investigation type may request the following information:

  1. What is your role?
  2. When was the problem first suspected?
  3. Does the subject use a PDA or Cell Phone?
  4. How many computers are in question?
  5. Do you have "Broadband" internet access? (DSL/CABLE/T1/OC12)
  6. Are you aware of any encryption or passwords in use?
  7. What is the operating system of the suspect computer?
  8. Will you need these services on a regular or recurring basis?
  9. By what date do the services need to be complete?
  10. Do you know if "chain of custody" has been preserved?
  11. Do you use VoIP? (Vonage/XO/Other)
  12. Does the subject use IM, Chat or Email?
  13. Please list any websites, social networking sites, enthusiast group, online games (MMOs) or forum sites the subject is known to have used or currently uses: (ie. Facebook, Google+, Twitter, LinkedIn, Pinterest, Tumblr, Instagram or any online gaming platforms such as World of Warcraft, WhatsApp, Handcent or other chat applications.)
  14. Will the results of this investigation be used in a court of law?
  15. What are you trying to accomplish with this effort?
  16. If you used a search engine to find us, please type the keywords here:
  17. Could someone's employment be affected adversely from the results of this investigation?
  18. Please understand that the funding for your case may vary depending on the complexity. So that we may help you, what range of funding would you estimate to be affordable for this matter?

Case Studies: Email Tracking and SMS Tracing

eDiscovery Proves No Sexual Harassment

Millions of people use their cell phones every day to send and receive text messages and emails,...

Email Harassment in Business

Do not let email harassment infringe upon your life. If you are being victimized by email...

Estranged Wife Uses Spyware to Harass

A man, recently separated from his wife, kept receiving text messages that stated his exact...

Internet Harassment on Flickr

The Internet connects billions of people across the world, allowing people in different countries...


Leave Comment

(REDACTED) commented 760 days ago
I have received a defamatory SMS from an (REDACTED).Is it possible to trace the identity of this person?
(Redacted) commented 1023 days ago
I am looking for an investigator to help me find out who is behind a fake Facebook account that has sent me threatening messages. I can't get a warrant for the IP address as the judge said it wasn't threatening enough. Please help. Thank you
(Redacted) commented 1173 days ago
I have received an email from a yahoo account (now it is being recycled due to inactivity) and a text message from the same person through a google voice number (now has been transferred to a different person) and I need to find out who this was. However, this occurred in 2011 and I was never able to find out. I would like a PI to address my concerns.
Catherine (Redacted) commented 1258 days ago
my son is getting text messages that appear to come from an email address....he is also getting things left on his vehicle and are not friendly, slightly threatening of his family. he says the address is not always the same....but it appears that the IP address comes up...if that's true (i have to see it myself first) is that traceable you think? he has small children and is really stressed out at this point.
(Redacted) commented 1288 days ago
I seriously need you help on this one........(Redacted)
krishna b. commented 1551 days ago
can u trace the gmail.com e-mail address? if so, i would like to contact with private investigater.
burberry commented 1942 days ago
This specific web page offers quite a bit straight answers in it, I evaluate that any time Im on the net. I wish many other web pages invested in the maximum amount period because one does earning information readable to be able to readers including on my own.
ST commented 2252 days ago
Can you trace the gmail.com e-mail address? If so, I would like to contact with private investigator.
shaheen commented 2317 days ago
I want to know the person indian address,from the company in Dubai where he was working till November 2009.H e is an Indian.He ahs resigned the job.Can I knw his address
D. S. commented 2319 days ago
can you trace the IP address for a computer that forwarded a threatning email from a created email address

Recent Investigation Inquiries

Origin Investigation Location
Wisconsin United States
Georgia United States
Arizona Mexico
Maryland Philippines
Colorado United States
New York United States
California California
Texas United States
Texas United States
California California

Find a Private Investigator by Closest Region

The ICS private investigator network can manage your case locally or across multiple jurisdictions. Your case will be worked by qualified and licensed private investigators where applicable. Through the innovative ICS Licensee Program, we are able to provide local private investigators in several states. Not all services are available in all areas. All private investigators can be identified upon request according to State law. Find a local Private Investigator:

Newport Beach
Columbia Ellicott City Elkridge
Crofton Crownsville
Dearborn
Apple Valley
Duluth
Columbia
Paradise
Tidewater
Calgary
Edmonton
Strathcona County
Abbotsford
Kelowna
Vancouver
Victoria
Brandon
Winnipeg
Fredericton
Moncton
Saint John
Conception Bay South
Corner Brook
Gander
St Johns
Yellowknife
Amherst
Cape Breton
Halifax
Barrie
Brampton
Chatham Kent
Guelph
Hamilton
Kingston
Kitchener
London
Oshawa
Ottawa
Peterborough
St Catharines
Sudbury
Thunder Bay
Toronto
Windsor
Charlottetown
Summerside
Laval
Longueuil
Montreal
Quebec City
Saguenay
Sherbrooke
Trois Rivieres
Prince Albert
Regina
Saskatoon
Whitehorse
Beijing
Chongqing
Hong Kong
Macao
Shanghai
Tianjin
Barranquilla
Bogota
Cali
Cartagena
Medellin
Pereira
San Salvador
Bangalore
Chennai
Delhi
Hyderabad
Kolkata
Mumbai
Kiev
Sevastopol
Abu Dhabi
Limon
Puntarenas
San Jose

Copyright © 2017 International Counterintelligence Services, Inc. All rights reserved.