Computer

Talk to a Computer Forensics Consultant to Secure Your Retired Hardware

So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware. You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have confidential and corporate information on the drives. Computer forensic analysis can recover data even though users think the information has been “deleted.” In fact, in many cases, after completing a computer forensics electronic discovery service, uncovers evidence. As a computer forensics consultant, can work with companies and organizations to develop a security policy and procedure in regard to retired electronics. That single step in your IT security program could prevent [...]

Computer Forensics Investigations Uncover Evidence of Industrial Espionage

Corporate espionage is not limited to the development of products and top secret patents. Oh, no, any industry where there is competition, there is the potential for the need for experts in digital forensics. Even in an industry you might not suspect – the hotel and hospitality world. Starwood Hotels & Resorts accused Hilton of industrial espionage in 2009. Apparently Starwood lost 10 executives and managers to the Hilton chain and Starwood alleged that the departing employees downloaded massive amount of documentation before departing. This is a situation where a computer forensics specialist can undertake a computer forensics investigation to uncover what was done on each of the computers owned by Starwood and used by the departing employees. Once the computer forensics examination is complete, [...]

Is the Potential of a Computer Forensic Examination Part of Your Computer Usage Policy?

Employers hire people with the best of intentions. They hope the new employees will become loyal and exemplary representatives of the organization. But sometimes it just doesn’t work out that way. Take for instance the case of a middle school teacher in Downers Grove, Illinois. According to a Chicago Tribune article, the teacher has resigned and given up her teaching certificate after it was discovered she had explicit photos of herself on her computer at school. There is an investigation underway as to whether or not the photos were shared with any minors. Whenever employers suspect covert or criminal activity by an employee, one of the first places to look is their computer. A computer forensic investigator can complete a computer forensics electronic discovery that [...]

Computer Forensic Investigations are Best Left to the Professionals

A DIY approach to computer forensics opens up an unwanted can of worms – especially if evidence and factual data is found or recovered from the computer. With computers being the primary tool used by employees in the vast majority of industries and firms, evidence of wrong-doing is often on the machines once the employee has been terminated or resigned. If there is even the hint that digital forensics may uncover evidence, it’s best to hire a professional computer forensics expert right away. After the employee leaves and the hardware is turned over to the IT department, even the initial booting up of the computer can taint any evidence that would be recovered. Why? A few of the many reasons: The chain of custody and [...]

Keeping Track of Employees with Computer Forensics? You Betcha!

Employers don’t often think they really need the help of a computer forensics consultant or a computer investigation in the normal course of business. However, when something just doesn’t seem “right” it pays to listen to your gut carefully. Case in point is a story recently reported by NPR. What began as a hint that the computer infrastructure was being hacked by someone in China illuminated a scheme perpetrated by a worker. It seems the employee had outsourced his own work to a sub-contractor in China. Yes, you read that correctly. His job responsibilities for software development were being handled by someone in China – while he was earning a six-figure income! He was also reputed to be “the best developer in the building.” While [...]

Computer Forensic Investigation Uncovers Retailers Monitoring More Than Rental Due Dates

Apparently if you rent a computer from some retailers, you may be getting (or giving away) much more than you thought in the bargain. As computer forensics investigators, we are always watching for information about how bad guys can get into people’s lives on the sly. With computers the security loopholes are everywhere. So this article written by John E. Dunn at Techworld didn’t shock or surprise me. What I see escalating is the number of articles popping up in the mainstream media about computer spyware detectors and spyware removal. In most all of them, they now mention computer forensic services. As an aside, was one of the first to offer computer forensic services when no one really understood what a computer hacking forensic investigator [...]

Spyware That Lets Someone Get Up Close and Personal is Why You May Need Computer Forensic Services

What you may consider a quiet afternoon sipping a latte at the coffee shop and catching up with all your Facebook friends and email may be the quiet before the storm. The storm may end up with a computer forensics specialist performing digital forensics on your computer. After reading 10 Computer Threats You Didn’t Know About, I wondered how many people would really take them seriously. Not because they weren’t presented seriously, but more because of the mindset that “that wouldn’t happen to me.” I’m here to tell you, it COULD happen to you and more and more “average citizens” are seeing it happen to them. As computer forensics experts, is well aware of the increase in computer hacking and   the use of spyware: [...]

Mainstream Media is Reporting about Spyware and Computer Forensic Analysis

Oh yes, it is a small world – especially when you connect the dots on the Internet. Bloomberg writer Vernon Silver illuminated what happens when spyware is installed on a person’s computer. It’s done so quickly and almost without notice that the victim doesn’t realize until later that they have become a victim. Computer forensics experts here at have said that the incidence of spyware on computers is indeed rising. In addition to computer forensics investigations delving into files on the computer, our certified computer examiner is being asked to complete digital forensics and forensic computer analysis as spyware detectors and subsequently for spyware removal. The victim in the Bloomberg article was a law student who was a political activist. The spyware was installed on [...]

The Need for Computer Forensics Investigations is Growing

After the hustle bustle of the holiday season, most of us are ready to get back into our regular routines. However, I just read an article by Matt Gephardt at KUTV.com in Utah that there is actually a bump up in computer malware infections after the holidays – up to a 30% increase! That means there are those who are working extra hard right now to get personal information from your computer. The article says that much of this increase is due to people: getting new computers or other electronic gadgets as gifts for the holidays surfing the Internet before installing some sort of anti-virus protection surfing for online bargains in the holiday shopping season. There are ways to ascertain if your computer has been [...]

Computer Forensics Foils Robbers

Have you heard the complaint that computers are de-personalizing interactions in the world? I do know it is easier to hide an identity behind a computer, but that doesn’t take the human out of the equation, that’s for certain. Nor does it prevent the truth to be revealed through computer forensic investigation and computer forensic analysis. For instance, I just read about two robbery cases in Durham, N.C. that were solved by using computer forensics. The cases centered on the use of Craigslist. The victims responded to an ad on the site and were subsequently robbed. A computer forensics specialist was able to trace all the way back from the ad to the suspects to a physical address. In our experience here at , our [...]

Go to Top