certified computer examiner

I’d Like to Phone a Friend

Friends can be a neighbor, a kid you grew up with since grade school, a co-worker, a boss and your spouse. Nobody ever thinks that a private investigator could be a friend, but in many of our cases that we work, in the end, we have acted on the same level as a friendship. We put our Client’s first, we work on their behalf, we do what is right and we stay within the law to make sure anything we find can be used in the court of law. We don’t tell our Clients we are their friends, but we act upon the same basis. by Friends.com. If you look in the dictionary it will tell you that the definition of friendship is a state of being [...]

They Thought They Permanently Deleted Files From Their Computer

Before writing this blog, I did some research on what computer users perceive when they delete a file from their computer. Instructions on how to delete. When you delete a file, it's usually moved to the Recycle Bin so that you can restore the file later if necessary. For information about recovering a file, see Recover files from the Recycle Bin. To permanently remove files from your computer and reclaim any hard disk space they were using, you need to delete the files from the Recycle Bin. You can delete individual files from the Recycle Bin or empty the entire Recycle Bin at once. Open the Recycle Bin by double-clicking the Recycle Binon the desktop. Do one of the following: To permanently delete one file, click it, [...]

It’s the Little Details That Come from Computer Forensics Experience That Breaks Cases Wide Open

As a full-service investigative firm, is the source for a certified computer examiner in the Indianapolis area. Our experience is part of the reason attorneys turn to us. In fact, it is our knowledge and experience that can really make the difference in some cases. For instance, we were tasked with completing a computer forensic examination on a work computer used by a person accused of providing confidential information to a competitor. The accused knew his computer would be submitted to us during a general information meeting. Our impression, because, as investigators, we are highly observant during an investigation, was that the subject was confident, almost smug, that nothing would be found on the device. It was a red flag to us. The computer forensic [...]

Go to Top