digital forensics

Is Communication Really Safe

In today’s world, there are so many avenues of communication.  We think face to face is the safest, as there are no footprints of the words we speak.  We fax because there isn’t a written line of communication, we talk on our cell phones without ever thinking someone else is listening.  We email without fear because it’s all done electronically.  We text our family, our work, our friends, even businesses private information we think is safe and only that person is receiving it.  Once we hang up, hit send or end button we walk away thinking our communication is safe and secure.

That safe and secure world is behind us, we are in the 21st century and technology improves every day.  The same technology that [...]

When I Say I Do!

Marriage:

1 a (1) : the state of being united to a person of the opposite sex as husband or wife in a consensual and contractual relationship recognized by law (2) : the state of being united to a person of the same sex in a relationship like that of a traditional marriage.

Above is the definition of marriage, and into today’s society marriage can be between a man and a woman, a woman and a woman and a man and a man.  The definition doesn’t define each person who enters into a contractual relationship; it just explains the participants and nothing else.  Marriage is more than a contract, it is a relationship between two people who come together believing they know each other, that the words [...]

Insurance Beneficiaries and Forensics Data Recovery

Insurance Companies and Law Firms deal with very controversial subject matters.  And usually when we are asked to conduct an Investigation for an Insurance Company, we can be assured there is an attorney on the other side.

We were contacted by a Major Insurance Company regarding an apparent suicide, the coroner and the police department both stated the insured committed suicide, but yet the family couldn’t believe he would take his own life.  There was just too much, they felt, he had to live for.  There was no suicide note, no indication that he was depressed and he was supposed to announce his engagement in less than a week.  He and his girlfriend had recently returned from a Caribbean vacation and become engaged during the [...]

Dirty Little Secrets Hidden on Cell Phones

Some people are very protective of their information on the cellular devices. In many cases, marriages end by them. I’m not talking about too much texting or surfing, I’m referring to those secret texts and emails, along with photos. If your spouse is hiding his or her phone from you, or has it password protected and you can’t gain access to it, there is a reason. Either they are required if it is an employer issued device or they are hiding something they just don’t want you to see.

Let’s say you get access to their phone, you even have done some private investigation and learned their passcode and you still don’t see anything incriminating on the phone, but you know they are up to [...]

I Now Pronounce You Husband and Ex-Wife

Statistics claim that more people are not getting married for fear of divorce and further state that 50% of marriages end in divorce. That means that one out of every two people will find themselves in divorce court or one of two people will know someone that has gone through a divorce or going through a divorce.

Legal ways to track a cheater

After the “I Do’s”, come the “I Can’t Believe He Would Do That To Me”. We hear that a lot here at . The ”I can’t believe” is always followed by financial woes. Having been left is hard; having been left with no financial security is difficult. Many times we hear how the wife has to succumb to these facts. Our Client was unaware of their finances due [...]

  • Permalink Gallery

    Cell Phones Are Compact Computers with the ability to be “Hacked”

Cell Phones Are Compact Computers with the ability to be “Hacked”

Remember when your “Mobile Phone” was in a case as big as a small brief case and each call cost you a couple of dollars per minute and not cents? You were among a very elite if you had a “Mobile Phone” back in the day. Today, it is reported that more than 91% of adults in a survey of over 2,500 people own cell phones. They are replacing landlines, GPS Devices and tablets and many times every member in the family is linked to their own cellular device. A cell phone allows the user to make calls, send text message and emails, surf the web, schedule to wake you up, remind you of appointments and even goggle answers to questions when in a [...]

Not Only Do I Hear What You Are Saying, So Is Someone Else

We had a gentleman who was on the verge of selling his multi-million dollar company.  He had a qualified buyer who he had been working with for several months and he was excited about the prospect of walking away from the hustle and bustle of owning a company to the sandy shores of some tropical island.  In order to accomplish this, he would have to open his company finances to the buyer’s agent to verify his company was in fact viable.  The buyer now showed some hesitation and didn’t appear to be as excited as in previous meetings.  He had this feeling that something wasn’t right and he came to to hash over his suspicions to determine if that nagging warning was worth [...]

Computer Forensics - A Powerful Tool in Investigations

Long before there were computers, internet connection and mobile phones, words were written by hand, pen/pencil and paper. If you made a mistake you would wad up the paper, throw it in the trash and start all over again, or use your trusty eraser and change the wording. Or you could use your “typewriter” and type a letter, same applied, if you made a mistake you would rip the paper out, roll in a new sheet and start all over. And if you had to research anything, you headed off to the library and conducted manual searches. If you didn’t check out a book, no one knew that you even opened up a book or copied the information.

What you did on pen and paper [...]

Computer forensics with Inc.

Ever accidently delete a file on your computer only to try in vain to recover it.   Usually, a simple search in the recycle bin will allow you to recover the file.  However, if you permanently deleted the file (such as using the command Ctrl+Shift+Delete) then you won’t have much luck using the recycle bin.  There are available software that the home user can install that will provide a chance to recover the file but what if you don’t feel comfortable using such software or worse, the software did not yield the results you were hoping for?  This is where the professionals come in.

has been in the game for years and employs its own forensics lab for both cellular and computer forensics investigations.  The [...]

Correct approach to Computer Forensics

More than a few clients have walked through the doors of requesting their cell phone or laptop be analyzed by our digital forensics lab. Quite commonly the client is dealing with marital infidelity and highly suspects their spouse of a secret affair.

The first questions we tend to ask in these cases pertain to the ownership of the device in question and inform the client that computer forensic firms in the US are legally obligated to obtain permission from the owner of the device and to follow a legal process for cell records in digital forensics. The same holds true for mobile phone forensics and during a cell phone investigation. A reputable forensic investigator should always gain written permission of the device owner prior [...]