Computer

When an Investigation Takes a Turn, Has the Experts

There is so much to say about employee theft and employee embezzlement investigations that it is difficult to sort it out into just one topic. And that’s what we find the clients of count on us for when they call. We are a one-stop service provider, we can provide whatever services are needed – here, in-house. Our clients don’t have to go to one service provider for handwriting analysis, another for covert surveillance and yet one other for computer forensic analysis or cell tower triangulation. does it all and this is why that is so very important: The attorney for a medium-sized small business contacted our office. His client was the company owner.  The owner had caught what he thought was evidence of a long-time [...]

Computer Forensic Investigations Are on the Rise

The use of computer forensics analysis is exploding. A recent video at Investigation.discovery.com provides a brief overview of what is possible, but it also shows that computer forensic investigation is not a do-it-yourself project – it takes a computer forensics specialist to root out the hidden bits of data that computer forensics experts know will be evidence. Police and other authorities are applying digital forensics to their investigations but so are others in the private sector. is one computer forensics firm that works with many attorneys and other organizations to gather data and evidence. We often find two scenarios: Scenario #1 – Is there a case? There is a suspicion of covert or illegal activity and an attorney is brought in to consult on whether [...]

Gone, But Computer Forensics Investigation Means He’s Not Forgotten – Or Forgiven!

It’s not unusual for a business owner to be so intent on running a business that they are taken by unscrupulous employees. received a call from an attorney who had a construction company owner as a client. We’d provided computer forensic consulting for other clients of his in the past. This client had called with what he said was a weird question. Apparently the construction company had a Vice President who had recently left the company – he resigned saying had had accepted a position in another company. The owner was sorry to lose him because he was grooming him to take over operations. Well, after he left, three of the jobs that had gone out for bid, which the owner thought were pretty much [...]

Computer Forensics and OTR Trucking

Computers are a part of every segment of our lives – from choosing a restaurant or moving and getting the route to get there on time to doing our work in an office, restaurant or on the road in our cars or vans. That is why computer forensics investigations are becoming more the norm than a specialty during investigations of all sorts. Computer forensics companies like are prepared to undertake inquiries in every industry and situation. A recent case demonstrates the spectrum of cases in which digital forensics can used.  Computer forensics investigators applied their skills in an investigation of a semi-truck driver. There were discrepancies in the weight records and the shipment manifests. The company replaced the computer in his tractor with a new [...]

Computer Forensic Examination is Becoming Routine Part of Investigations

Computer forensics investigations are not just about catching individual employees or spouses or scammers doing wrong, a computer forensic examination can also be used to support the claims of whistleblowers. Just recently an article in which whistle-blowing employees of a big bank exposed a culture where they claim, “We were told to lie” and that the culture was rampant from the top down. Because has been on the forefront of computer forensics, we know the amount of evidence that is thought to be available in their computers is massive. If an investigation is begun, computer forensics electronic discovery is expected to be employed to capture files including emails, reports and evaluations. With the amount of data to be collected, even with the authorities involved, they [...]

Computer Forensic Analysis is a Tool for Divorce Attorneys and Clients

Computer forensic investigators are bloodhounds for evidence of the truth. The truth could be evidence of a corporate crime or something as personal as relationships between spouses. Divorce attorneys contact often with different requests. One case recently involved a forensic computer analysis. The wife felt trapped in a marriage to a wealthy professional. Everyone thought he was a nice guy who did well at his job and provided a great home. In fact, he drank every night, spent time in his home office and would then go out for a few hours. She considered him a high-functioning alcoholic and was just waiting for the late-night phone call saying he’d been arrested for DUI or worse, had been part of an accident. She was looking for [...]

Computer Investigation Shows Employee Embezzlement is Digital Now, Too

Theft by employees is a problem for more than retail or restaurant businesses. It is a problem in the office, too. I am talking about more than office supplies and materials here. I am talking about the theft of ideas, processes, client lists and confidential corporate operations. This could include employee embezzlement through accounting or bookkeeping channels from corporate accounts, too. All of these things constitute theft in the workplace; some just look a little different than others. Instead of carrying something physically off, it’s moved digitally. And that is how exactly how it is found – digitally. Computers are the basis of most of the work done in many workplaces so when suspicions arise, a computer forensic investigation is one of the first steps [...]

Computer Forensics Analysis an Effective Evidence Collection Tool

Computer forensic investigation is becoming more and more a part of many crimes and alleged criminal activities. From activity on websites to chats and email, evidence can be extracted by a computer forensic investigator and by following data extraction protocol, what the forensic computer analysis uncovers can be used in a court of law. Here at , we have operated one of the first computer forensics labs in the nation and have built a reputation on our experience and professionalism. Attorneys know if it’s there, we will find it. With recent whistleblowers stepping forward from the ranks of Bank of America, the government’s Home Affordable Modification Program (HAMP) appears to have been hampered (pun intended) by executives in the bank. The thing is that it [...]

Computer Forensics Consultant First Line of Defense Against Spear Phishing

Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game fish. Spear phishing is an attack targeted very specifically to one simple point of contact – an inconspicuous email crafted to entice the receiver to click a link that opens malware or connects to a site that can compromise the recipient’s network – including intranet business network contacts. Computer forensics firms are seeing more and more evidence of the spear phishing technique as the bad guys are honing their infiltration [...]

Sometimes It’s Not Spyware Found During a Computer Forensic Examination

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an application that can open a port like a remote desktop – and it does it without your permission. Malware like Trojans can crash the computer or send you advertisements. It’s not necessarily spying on you – but it does make your online life miserable. This Trojan was causing the problems she was having and once removed, she was good to go. On occasion we discover that people do things on [...]

Go to Top