As the use of the Internet evolves, more great ways to educate, entertain and inform the world are constantly being developed and implemented. Unfortunately, there is a downside to all the great ways that computers connect the globe, and that means that more and more criminals seek ways to participate in illegal, untraceable crime through computers.
One great example of a greedy opportunist would be Chase Lindsey, a Texas chiropractor convicted last year of $3 million auto insurance fraud. For two years, Lindsey participated in a fairly elaborate rip-off scheme, involving fake auto dealerships and fake patients. He allowed fraudulent chiropractic bills to be created under his name, for treatment that was never provided, on patients that never existed. In addition, Lindsey sent fraudulent settlement letters to several auto insurance companies. He and others involved in the scheme were caught through surveillance and through the use of digital forensics, meaning that no matter how hard Lindsey tried not to leave a trail of guilt and greed, the professionals uncovered it anyway.
Though none of us want to ever be in a situation where we have to investigate someone we thought to be a trusted spouse or friend or business partner, it is important to remember that your concerns may never have to get as far as a court room.
It is not always immediately necessary to call on the police to investigate fraud being committed in your company or assets being hidden in your marriage. In fact, if there is no evidence of a criminal offense, the police will probably decline to help you. Turn to your attorney and she will tell you that you can hire a private investigator to conduct a digital forensics investigation. In fact, a private investigator will gather facts and evidence – the objective truth – to help you and your attorney determine the most appropriate path for your situation.
For example, if you own and can prove that you own all the computers in your office, you’re legally free to request that a forensic investigator perform a computer forensic examination.
During this confidential computer forensic analysis search by , deleted, encrypted or damaged computer files can be located, answers to your suspicions can be found and all of it can be done without being on the front page of the newspaper.
-Brenda McGinley, CEO, All in Investigations, All in Investigations
You must be logged in to post a comment.