All in Investigations

Category: Computer Forensics

  • Gaining Information in a Divorce Illegally

    Gaining Information in a Divorce Illegally

    Apps regularly pop up in divorce cases, experts say. Over 80% of U.S. divorce attorneys say they’ve seen a rise in the number of cases using social networking, according to the American Academy of Matrimonial Lawyers (AAML) Sometimes it’s not the social networking sites themselves, but how they are accessed to gain information. With that…

  • Knowing the Unknown is a Valuable Tool

    Knowing the Unknown is a Valuable Tool

    It isn’t easy to learn the truth and sometimes the truth isn’t easy on us either.  , clears the path of misconceptions, intuitions and gossip and focuses on facts. Sometimes the facts do not change the situation, and then there are times the facts create clarity and we see through all the haze and come…

  • I’d Like to Phone a Friend

    I’d Like to Phone a Friend

    Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We…

  • He didn’t send the emails, but they came from his computer

    He didn’t send the emails, but they came from his computer

    Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with…

  • My Husband is in Love with an Avatar

    My Husband is in Love with an Avatar

    An avatar is an icon or figure representing a particular person in computer games, Internet forums, etc. and that is exactly how some Client’s relationships end.  The computer is a gateway to be whatever you want to be, to represent yourself in a manner you could never do face to face.  It’s a make believe…

  • No One is Ever Going to Hear My Conversations, Or are They?

    No One is Ever Going to Hear My Conversations, Or are They?

    Social Media: There are so many ways to communicate with social media, but if you break it down, your communication is either by word of mouth or the written word (picture). When you verbally communicate, your message is delivered and heard, then responded to or ignored, but you know right then whether your point was…

  • They Thought They Permanently Deleted Files From Their Computer

    They Thought They Permanently Deleted Files From Their Computer

    Before writing this blog, I did some research on what computer users perceive when they delete a file from their computer. Instructions on how to delete. When you delete a file, it’s usually moved to the Recycle Bin so that you can restore the file later if necessary. For information about recovering a file, see Recover…

  • Discovery, Depositions and Findings

    Discovery, Depositions and Findings

    We had a Client, James who started and built a booming business with his longtime friend, Bill.  Bill was outgoing, charismatic while James was more laid back and book smart, while both had the desire and knowledge to start a company.  For years, growing up, through high school and college, they knew they wanted to…

  • Investments aren’t always Investments

    Investments aren’t always Investments

    We have all thought “What would have happened….if”, and never gave it a second thought. But in our business, we never wonder “what would have happened” we think “what did happen”. We had a Client whose best friend recommended an unusual investment opportunity to her. She had dabbled in gold dust outside of the US,…

  • Is Communication Really Safe

    Is Communication Really Safe

    In today’s world, there are so many avenues of communication.  We think face to face is the safest, as there are no footprints of the words we speak.  We fax because there isn’t a written line of communication, we talk on our cell phones without ever thinking someone else is listening.  We email without fear…