Computer Forensic Investigations Are on the RiseThe use of computer forensics analysis is exploding. A recent video at Investigation.discovery.com provides a brief overview of what is possible, but it also shows that computer forensic investigation is not a do-it-yourself project – it takes a computer forensics specialist to root out the hidden bits of data that computer forensics experts know will be evidence.

Police and other authorities are applying digital forensics to their investigations but so are others in the private sector.

is one computer forensics firm that works with many attorneys and other organizations to gather data and evidence. We often find two scenarios:

Scenario #1 – Is there a case?

There is a suspicion of covert or illegal activity and an attorney is brought in to consult on whether or not there is a case and how the client should proceed. The attorney contacts us to perform computer forensic services. We are provided the parameters and details of what information is being sought and a computer investigation is undertaken. A report is provided with all the data falling under the requested parameters included. Sometimes we work directly with an organization leader or business owner before an attorney is consulted.

Scenario #2 – Gathering evidence for defense

An attorney has a client who has been charged with a crime. Since we lead such digital lives, a person’s computer can tell a lot about someone; who they associate with, their lifestyle, what they research and buy. It can also show what was happening at specific times on certain days. The computer forensics investigator can dig into the hard drive and recover bits and pieces of a defendant’s life that can become evidence of innocence.

It takes an expert technician to not only complete the process to retrieve data, but to follow the protocol for data retrieval in order for it to be used in a court of law. There are professional protocols around obtaining the computer and other devices through legal means with a subpoena or with personal permission and then following and documenting an accurate and admissible chain of custody. No attorney nor defendant wants to know evidence is there but cannot be used.

So whether you need help with Scenario #1 or #2, computer forensics electronic discovery might be just the service you need. has been on the front edge of computer forensics analysis since the beginning with one of the first computer forensics investigation labs in the nation. When your clients deserve the best, use the best –

-Brenda McGinley, CEO, All in Investigations, All in Investigations