computer forensic investigation

Computer Forensics Investigation Uncovers Facts to Support Ruffled Feathers

Generally when employers find an ambitious employee who really wants to get ahead they jump to give him all the resources they need to do so. And employers know that other employees can get their feathers ruffled. When an employer contacted asking for help, that’s all he thought he had on his hands – ruffled employees. The employer explained that he had hired a salesman who was really ambitious and now other sales personnel were complaining. They were saying he was swooping in and taking their clients and leads before they even had a chance to get an appointment or meet with them. All their sales activity was kept on their computer accounts, but each one was password protected. We called in our computer forensics [...]

Cell Phone Forensic Investigation Finds Evidence to Support Gut Feeling

The owner of an aerospace company that manufactured parts for the government called with some concerns. Recently two of his key sales people had left the company under a cloud of suspicion. The company owner had no tangible proof of wrong-doing, but he had a feeling something wasn’t right. Both of the employees had been with the company for more than seven years and had always been straight up with him. But over the last year he felt his relationship with them changed. There was a distance that had developed and when they both suddenly resigned, it just didn’t feel good. They had left their computers and cell phones that were company issued. He’d had IT look at the computer, but both cell phones were [...]

Computer Forensics Investigations Reveal Truths – Wanted or Not

Computer forensics is not only used for criminal cases, but for civil cases as well. One illustrative case involved a worker who was placed on unpaid leave and then terminated. He filed a lawsuit against his employer alleging violations of the anti-retaliation provision of the False Claims Act and the Americans with Disabilities Act as well as the laws of the state of the occurrence. He told his attorney that several supervisors had conspired against him and that there were emails he had seen to prove it. The attorney obtained subpoenas for the computers of the supervisors and the terminated employee for computer forensics analysis. When the certified computer examiner began the process, he created a digital copy and found something unusual. The unallocated file [...]

When an Investigation Takes a Turn, Has the Experts

There is so much to say about employee theft and employee embezzlement investigations that it is difficult to sort it out into just one topic. And that’s what we find the clients of count on us for when they call. We are a one-stop service provider, we can provide whatever services are needed – here, in-house. Our clients don’t have to go to one service provider for handwriting analysis, another for covert surveillance and yet one other for computer forensic analysis or cell tower triangulation. does it all and this is why that is so very important: The attorney for a medium-sized small business contacted our office. His client was the company owner.  The owner had caught what he thought was evidence of a long-time [...]

Computer Forensic Investigations Are on the Rise

The use of computer forensics analysis is exploding. A recent video at Investigation.discovery.com provides a brief overview of what is possible, but it also shows that computer forensic investigation is not a do-it-yourself project – it takes a computer forensics specialist to root out the hidden bits of data that computer forensics experts know will be evidence. Police and other authorities are applying digital forensics to their investigations but so are others in the private sector. is one computer forensics firm that works with many attorneys and other organizations to gather data and evidence. We often find two scenarios: Scenario #1 – Is there a case? There is a suspicion of covert or illegal activity and an attorney is brought in to consult on whether [...]

Gone, But Computer Forensics Investigation Means He’s Not Forgotten – Or Forgiven!

It’s not unusual for a business owner to be so intent on running a business that they are taken by unscrupulous employees. received a call from an attorney who had a construction company owner as a client. We’d provided computer forensic consulting for other clients of his in the past. This client had called with what he said was a weird question. Apparently the construction company had a Vice President who had recently left the company – he resigned saying had had accepted a position in another company. The owner was sorry to lose him because he was grooming him to take over operations. Well, after he left, three of the jobs that had gone out for bid, which the owner thought were pretty much [...]

Computer Forensics and OTR Trucking

Computers are a part of every segment of our lives – from choosing a restaurant or moving and getting the route to get there on time to doing our work in an office, restaurant or on the road in our cars or vans. That is why computer forensics investigations are becoming more the norm than a specialty during investigations of all sorts. Computer forensics companies like are prepared to undertake inquiries in every industry and situation. A recent case demonstrates the spectrum of cases in which digital forensics can used.  Computer forensics investigators applied their skills in an investigation of a semi-truck driver. There were discrepancies in the weight records and the shipment manifests. The company replaced the computer in his tractor with a new [...]

Computer Forensic Examination is Becoming Routine Part of Investigations

Computer forensics investigations are not just about catching individual employees or spouses or scammers doing wrong, a computer forensic examination can also be used to support the claims of whistleblowers. Just recently an article in which whistle-blowing employees of a big bank exposed a culture where they claim, “We were told to lie” and that the culture was rampant from the top down. Because has been on the forefront of computer forensics, we know the amount of evidence that is thought to be available in their computers is massive. If an investigation is begun, computer forensics electronic discovery is expected to be employed to capture files including emails, reports and evaluations. With the amount of data to be collected, even with the authorities involved, they [...]

Computer Forensic Analysis is a Tool for Divorce Attorneys and Clients

Computer forensic investigators are bloodhounds for evidence of the truth. The truth could be evidence of a corporate crime or something as personal as relationships between spouses. Divorce attorneys contact often with different requests. One case recently involved a forensic computer analysis. The wife felt trapped in a marriage to a wealthy professional. Everyone thought he was a nice guy who did well at his job and provided a great home. In fact, he drank every night, spent time in his home office and would then go out for a few hours. She considered him a high-functioning alcoholic and was just waiting for the late-night phone call saying he’d been arrested for DUI or worse, had been part of an accident. She was looking for [...]

Computer Investigation Shows Employee Embezzlement is Digital Now, Too

Theft by employees is a problem for more than retail or restaurant businesses. It is a problem in the office, too. I am talking about more than office supplies and materials here. I am talking about the theft of ideas, processes, client lists and confidential corporate operations. This could include employee embezzlement through accounting or bookkeeping channels from corporate accounts, too. All of these things constitute theft in the workplace; some just look a little different than others. Instead of carrying something physically off, it’s moved digitally. And that is how exactly how it is found – digitally. Computers are the basis of most of the work done in many workplaces so when suspicions arise, a computer forensic investigation is one of the first steps [...]

Go to Top