computer forensic investigation

Investigators have to Follow the Path Where the Leads Take Them

Long before the attorney called to officially secure services with , his client had decided to part ways with his business partner. From the ground floor, their business had been built with good intentions. But as the business flourished and became more lucrative, his client began to see that his partner no longer offered 50% of the elbow grease. Though he could not prove it, the client also began to suspect that his partner might be stealing from the business, both in cash and assets. So when the attorney’s client announced his intention to part ways immediately, he only voiced his wish to buy out his partner's share. Unfortunately, the partner's attitude was anything but understanding. As the months wore on, the client began to [...]

Computer Forensics Fights Back

It happens. A disgruntled employee or maybe an ex-spouse posts a pornographic photograph on the web and claims that you are the person in that photo. Immediately, you begin to suffer the consequences of this vicious action. Something of this nature will of course negatively affect your professional life as well as your personal relationships. But how can you possibly fight back and clear your name? If these actions were taken on computers in your company or in your home, where you and your spouse both accessed them and you have ownership, the good news is that you have the opportunity to find the evidence you need to clear your name. Instead of immediately contacting police and waiting, your other, faster option is to contact [...]

Trends in Private Investigation for 2014

Clearly the investigative world continues to evolve. At we have taken on the latest trends. There is no one investigative technique that is best utilized and blended investigative strategies are more the norm. Two areas where stays on the cutting edge are cellular forensics and social media engineering. For example, the use of digital forensics has become a critical tool in the resource box. We could be doing a cell phone analysis for data recovery or cellular forensics for cellular location evidence. Communication modes from test to email or call logs are all records to substantiate or refute claims of guilt or innocence. Cell phone forensic tools provide facts, not claims. In 2013, industry experts predicted a significant rise in the utilization of mobile device [...]

The Objective Truth, is the Investigator’s Target

During her 30-year career as a private investigator, Caryn Gloyd has provided hundreds of court testimonies. She has logged thousands of hours of surveillance or digital forensics. She has spent countless hours tracking down and interviewing potential witnesses or suspects. In other words, Gloyd has seen it all and heard it all. But when she heard Georgetown Police Chief William Topping speak negatively about private investigators, Gloyd’s pride in her profession was challenged. “Private investigators are there to prove their clients’ cases,” Topping said during a 2009 interview. “There’s no impartiality or neutrality. They get their orders from their employers.” Gloyd went from feeling stunned to more than a little bit irritated by Topping’s statement. She felt that Topping was making a blanket statement that [...]

Internet Not an Anonymous Super Highway for

In the last decade, the primarily male populated world of private investigators has seen a big change, not only in technology but also in the faces of this career. In fact, females are flooding this career path. And they are taking it by storm. A great example is Michelle Gomez, a private investigator who broke a case that two other investigators and even the FBI failed to solve. Wanted for $2 million in fraud, Ryan Eugene Mullen apparently had simply vanished off the face of the earth. No one could find him until Gomez, who specializes in tracking down missing items and missing people, was asked to help with the case. Like the staff at , Gomez is also highly knowledgeable in digital engineering and [...]

Experienced Forensic Investigators Have Seen it All and Know Where to Look

Some people in the world put lots of time into being sneaky. Sometimes their goal is to elude the IRS by hiding money in offshore accounts or in hidden bank accounts under the names of friends or family. Sometimes the goal is insurance fraud or hiding property ownership. But whatever type of illegal activity you suspect, in your company or business, in your marriage or family, it’s very likely that you need help. When you can’t track down the answers on your own; call on the skills and abilities of a private investigator. In fact, even your attorney may suggest services of a firm like . No longer simply identified as a professional sleuth, a few private investigation firms have certified computer examiners on staff [...]

Digital Forensics is Now Available to Public

You have probably heard the story about how ex-Illinois governor, Rod Blagojevich spends his time these days. Right? He’s behind bars, serving a 14-year sentence for public corruption. A computer forensics expert found enough evidence for more than 18 charges to be filed against Blagojevich. He was caught trying to sell or trade a vacant U.S. Senate seat after President Obama left the Senate for the White House. Because the world continues to demand more and more expertise with technology, digital forensics is in high demand. Defined as the application of science and engineering for the purpose of retrieving digital evidence in a legally acceptable manner, computer forensic analysis is not only used by police detectives. are also well-versed in this area, with the ability [...]

Private Investigators Step Up For Investigation

As the use of the Internet evolves, more great ways to educate, entertain and inform the world are constantly being developed and implemented. Unfortunately, there is a downside to all the great ways that computers connect the globe, and that means that more and more criminals seek ways to participate in illegal, untraceable crime through computers. One great example of a greedy opportunist would be Chase Lindsey, a Texas chiropractor convicted last year of $3 million auto insurance fraud. For two years, Lindsey participated in a fairly elaborate rip-off scheme, involving fake auto dealerships and fake patients. He allowed fraudulent chiropractic bills to be created under his name, for treatment that was never provided, on patients that never existed. In addition, Lindsey sent fraudulent settlement [...]

Do You Need a Handwriting Analyst or a Computer Forensics Analyst?

Forgery isn’t always a signature. Generally speaking, forgery is creating a false copy in an effort to defraud someone or something. Through the years, has seen that something to be valuable; money, land, custody or control. A New York man was charged with felonies in two states for allegedly forging checks. But it wasn’t the signature that was forged – it was the amounts of the checks. The signatures were valid, but he was able to cash 13 checks for more than $8,000 over the original check amount. With handwritten checks, it is possible to complete a thorough handwriting analysis to determine if the maker of the check actually wrote the amounts on the check. Sometimes, in medium-sized businesses, the bookkeeper might make out the [...]

Think Computer Forensic Services if you are Concerned about Employee Theft

Employee theft can take many forms, not just stealing cash from the register or lifting product out the backdoor to an associate. In fact, in a recent article on American Express Open Forum, Barry Moltz lists several you might not have even considered, although he says they are common. Set up fake vendor accounts. Steal checks Falsify expense accounts. Buddy punching (timecards) Steal data Most of these can be precluded through strict protocol and a system of checks and balances. If you suspect employee theft, can step in and bring the truth to light. First, computer forensic examination reveals not just documentation to confirm wrongdoing, but also can identify groups of employees conspiring through email and other communications. Even if the employee deletes emails, a [...]

Go to Top