computer forensics expert

He didn’t send the emails, but they came from his computer

Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with social media engineering being the third most common.  The key to a successful computer forensics investigation is that a competent computer forensics expert be willing to explore all conceivable possibilities while performing the investigation. I am reminded of a case we had about a year ago where the client had an employee log into his email account from their office computer and download emails that were sent to some of [...]

Is Communication Really Safe

In today’s world, there are so many avenues of communication.  We think face to face is the safest, as there are no footprints of the words we speak.  We fax because there isn’t a written line of communication, we talk on our cell phones without ever thinking someone else is listening.  We email without fear because it’s all done electronically.  We text our family, our work, our friends, even businesses private information we think is safe and only that person is receiving it.  Once we hang up, hit send or end button we walk away thinking our communication is safe and secure. That safe and secure world is behind us, we are in the 21st century and technology improves every day.  The same technology that [...]

Correct approach to Computer Forensics

More than a few clients have walked through the doors of requesting their cell phone or laptop be analyzed by our digital forensics lab. Quite commonly the client is dealing with marital infidelity and highly suspects their spouse of a secret affair. The first questions we tend to ask in these cases pertain to the ownership of the device in question and inform the client that computer forensic firms in the US are legally obligated to obtain permission from the owner of the device and to follow a legal process for cell records in digital forensics. The same holds true for mobile phone forensics and during a cell phone investigation. A reputable forensic investigator should always gain written permission of the device owner prior to [...]

Go to Top