Computer Forensics

When I Say I Do!

Marriage: 1 a (1) : the state of being united to a person of the opposite sex as husband or wife in a consensual and contractual relationship recognized by law (2) : the state of being united to a person of the same sex in a relationship like that of a traditional marriage. Above is the definition of marriage, and into today’s society marriage can be between a man and a woman, a woman and a woman and a man and a man.  The definition doesn’t define each person who enters into a contractual relationship; it just explains the participants and nothing else.  Marriage is more than a contract, it is a relationship between two people who come together believing they know each other, that the [...]

Insurance Beneficiaries and Forensics Data Recovery

Insurance Companies and Law Firms deal with very controversial subject matters.  And usually when we are asked to conduct an Investigation for an Insurance Company, we can be assured there is an attorney on the other side. We were contacted by a Major Insurance Company regarding an apparent suicide, the coroner and the police department both stated the insured committed suicide, but yet the family couldn’t believe he would take his own life.  There was just too much, they felt, he had to live for.  There was no suicide note, no indication that he was depressed and he was supposed to announce his engagement in less than a week.  He and his girlfriend had recently returned from a Caribbean vacation and become engaged during the [...]

I Now Pronounce You Husband and Ex-Wife

Statistics claim that more people are not getting married for fear of divorce and further state that 50% of marriages end in divorce. That means that one out of every two people will find themselves in divorce court or one of two people will know someone that has gone through a divorce or going through a divorce. https://fox59.com/2016/02/12/legal-ways-to-track-a-cheater/ After the “I Do’s”, come the “I Can’t Believe He Would Do That To Me”. We hear that a lot here at . The ”I can’t believe” is always followed by financial woes. Having been left is hard; having been left with no financial security is difficult. Many times we hear how the wife has to succumb to these facts. Our Client was unaware of their finances [...]

Not Only Do I Hear What You Are Saying, So Is Someone Else

We had a gentleman who was on the verge of selling his multi-million dollar company.  He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island.  In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable.  The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings.  He had this feeling that something wasn’t right and he came to to hash over his suspicions to determine if that nagging warning was worth investigating. He [...]

Computer Forensics – A Powerful Tool in Investigations

Long before there were computers, internet connection and mobile phones, words were written by hand, pen/pencil and paper. If you made a mistake you would wad up the paper, throw it in the trash and start all over again, or use your trusty eraser and change the wording. Or you could use your “typewriter” and type a letter, same applied, if you made a mistake you would rip the paper out, roll in a new sheet and start all over. And if you had to research anything, you headed off to the library and conducted manual searches. If you didn’t check out a book, no one knew that you even opened up a book or copied the information. What you did on pen and paper [...]

Computer forensics with Inc.

Ever accidently delete a file on your computer only to try in vain to recover it.   Usually, a simple search in the recycle bin will allow you to recover the file.  However, if you permanently deleted the file (such as using the command Ctrl+Shift+Delete) then you won’t have much luck using the recycle bin.  There are available software that the home user can install that will provide a chance to recover the file but what if you don’t feel comfortable using such software or worse, the software did not yield the results you were hoping for?  This is where the professionals come in. has been in the game for years and employs its own forensics lab for both cellular and computer forensics investigations.  The main [...]

Correct approach to Computer Forensics

More than a few clients have walked through the doors of requesting their cell phone or laptop be analyzed by our digital forensics lab. Quite commonly the client is dealing with marital infidelity and highly suspects their spouse of a secret affair. The first questions we tend to ask in these cases pertain to the ownership of the device in question and inform the client that computer forensic firms in the US are legally obligated to obtain permission from the owner of the device and to follow a legal process for cell records in digital forensics. The same holds true for mobile phone forensics and during a cell phone investigation. A reputable forensic investigator should always gain written permission of the device owner prior to [...]

Can Spyware Be Installed On My Cell Phone Wirelessly?

Here at , we routinely get asked about cellular malware and how it is installed. One of the most common questions is if cell phone spyware can be installed on a cellular device Can Spyware Be Installed On My Cell Phone Wirelessly? Wirelessly. The answer: YES. So, how does one go about installing malware on a phone if they don’t have physical access? Well, there are several ways this can be done and one of which is an IMSI catcher. The police and some of the big three letter spooky agencies use commercially manufactured IMSI catchers such as the Stingray which is built by the Harris Corporation. We won’t get into the actual capabilities of the Stingray as there are legal ramifications in doing so, [...]

Are You Sabotaging Your Own Business’s Digital Security?

You wouldn’t be the first business owner to use their work email address for non business related tasks. Sometimes it might make sense to use your business email account during online orders, quote applications, etc. However, this might not be the smartest move. When you send an email anywhere the email will move through various networks. If the company your dealing with has lax daisy network security system you could in fact be asking for malware to be directed right back at your own network via email responses. There are other scenarios to consider as well. How many users and what type of privileges to the users on the business network have? Can they also send emails and if so are the emails monitored? If [...]

Can I Help You?

It was a hectic day here at when the door opened and a small framed middle aged man walked in. He was a rather nerdy fellow with small eyes and bushy eyebrows. In his hand was a small box; 5 inches by 8 inches and he carried it like it was filled with precious gems. He walked right into my office, sat down and said, “I’m here to help you!” which I found strange, because I believed I was here to help him. When I asked what he could do for me, he laid the box down on my desk, opened it up and lifted a smart phone out of it. We both looked at each other with surprise, me because it was just a [...]

Go to Top