Monthly Archives: September 2016

I’d Like to Phone a Friend

Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We put our Client’s first, we work on their behalf, we do what is right and we stay within the law to make sure anything we find can be used in the court of law. We don’t tell our Clients we are their friends, but we act upon the same basis. by Friends.com. If you look in the dictionary it will tell you that the definition of friendship is a state of being [...]

Just an Average Joe

Patty was in her 70’s, divorced for over 15 years and had been married for 35 when she contacted . Her personality made us smile and realize life doesn’t end because you are in your golden years, sometimes it can be the beginning. Patty met George through a mutual friend who thought it might be nice if they could have dinner together, maybe a movie or two or just someone to have a conversation with. That’s how it all started she told us. He was handsome, in his early 70’s, had lost his wife so long ago he couldn’t remember the year, but knew he could never find anyone that could hold a candle to her or her memory. Patty was intrigued with his life [...]

He didn’t send the emails, but they came from his computer

Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common.  The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation. I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]

Go to Top