You think it’s just a bump in the road, when in fact, it’s a full fledge road block

Mary would drive home every night from work with a heavy heart and so many thoughts running through her mind. Every night she wondered what time her husband would arrive home, would he be waiting for her or her waiting for him. It was a dreadful game she played with herself. For the last year and a half of her fifteen year marriage, Mary kept the thought of that little bump in the road to herself hoping it wouldn’t get any bigger, but that wouldn’t be the case for her. Mary felt she was dealing with an unfaithful husband and didn’t want to believe he could be a cheating spouse. An attorney friend recommended Mary to meet with to determine if in fact her “loving” [...]

It’s the Little Details That Come from Computer Forensics Experience That Breaks Cases Wide Open

As a full-service investigative firm, is the source for a certified computer examiner in the Indianapolis area. Our experience is part of the reason attorneys turn to us. In fact, it is our knowledge and experience that can really make the difference in some cases. For instance, we were tasked with completing a computer forensic examination on a work computer used by a person accused of providing confidential information to a competitor. The accused knew his computer would be submitted to us during a general information meeting. Our impression, because, as investigators, we are highly observant during an investigation, was that the subject was confident, almost smug, that nothing would be found on the device. It was a red flag to us. The computer forensic [...]

Do You Think Computer Forensics Conjures Up the Past Like Magic?

Computer forensics is not magic, in fact it is very technical in nature and can be very exacting. People always wonder how the computer forensics experts at can “conjure” up “stuff” from computers that the owners thought was gone. How does forensics data recovery work? When it comes to files, forensic computer investigations and computer forensic analysis works from a three-pronged approach. The first is to recover files as we users know them. For example, a Word document or an Excel worksheet or workbook. These are files that openly exist on the computer. These are not files the user thinks has been deleted or removed. Although some of those could exist in their original form in the recycle or trash folders. The second is the [...]

Disruptive Computer Hacking on the Rise

Everyone knows that businesses face risks from cyber threats. However, what isn’t realized is that the risk isn’t just a problem for BIG business, it’s a problem for EVERY business. As leaders in computer forensic investigation and experience as spyware detectors and spyware removers, the computer forensics experts at can tell you that the Allianz Risk Barometer 2015 is accurate in reporting that disruptive scenarios are increasing in number. The point they want to make is that risk management must reflect this new reality and we agree. Attacks made on servers and systems to infiltrate and steal information and data are still a prime concern, but that is not the only scenario that computer forensics companies are being called in to address. No, there are [...]

Computer Investigation is More Than Forensics, Especially for the Bullied

Being a parent is a big job and now with bullying and cyber bullying that job has become even harder. Years ago the topic of hazing was in the news and the public became aware of the dangers and harm from it. Now, bullying is coming up in the mainstream conversation and its impact is gaining attention. And parents are taking action. Here at , we are seeing that parents consider private investigators a tool in helping them combat bullying in the lives of their children. One case in Maryland caught national attention when an autistic teenager was tormented by two female schoolmates. Evidence of the mistreatment was caught on the girls’ telephones where they had videotaped horrific pranks played on the boy. Played is [...]

Digital Forensics Performed by Private Forensics Companies Picking Up Steam

There is a troubling trend growing in the world of crime and punishment and that’s why the phones at are ringing. Just like every other aspect, life has been impacted by technology, the crime world has taken advantage of new technology, too. But on the other hand, that means that the authorities who police and the attorneys who prosecute (or defend) those in court have to be prepared to use everything technology provides for them, as well. Living in the information age promulgated by technology makes that a challenge. There is just so much evidence and data that has to be uncovered and handled so that it can be used as evidence. The sheer volume is overwhelming authorities. It’s not just in the United States, [...]

Mobile Phones Recording the Best – and Worst – in People

While bullying and harassing classmates has been a long-time problem, today’s technology is not only bringing situations into the light of day, but providing evidence that is admissible in court. It’s not a “rite of passage” anymore. It is a criminal offense and can mean jail time. Last year an autistic boy in Washington, D.C. was tormented by his “friends” at knifepoint. They even made a video of the incident. Just prior to that incident, on a cold Valentine’s Day, he was lured out onto an icy lake and fell through. The “friends” didn’t go to his aid. Instead, they used their phones to make a video of it. Luckily the boy was able to save himself. With the evidence on the phones, these “friends” [...]

Private Investigators Play Big Role in Detecting Workers Compensation Fraud

As professional investigators, we provide each of our clients with only the best combination of skill sets. Very proudly, we can boast that our investigators are long-time leaders in the areas of digital forensics including both forensic computer analysis and mobile phone forensics. In fact, our lab is one of only a few private, full-service forensics labs in the nation. But along with our dedication to mastering all of the newest technology, we also pay close attention to social issues and criminal activities which, unfortunately, continue to thrive. One of the fastest growing schemes is fraudulent claims filed for workers compensation benefits. In fact, in the most recent studies of this form of fraud, more than 45,000 active cases were active, involving employees pretending that [...]

Investigation Evolves with Technology into Social Media

As the world of technology changes, the investigative techniques and strategies used by professionals like those at changes as well. We are known for staying on the cutting edge of both technology and investigative methods. And we like it that way. One of the areas that has grown, and will continue to grow, is the use of social media. Social media engineering is one investigative technique we have become proficient with, especially in our capacity as professionals who find missing persons. We were already renowned for our abilities in how to find missing person, but social media and social media engineering opens a new avenue in investigative work. Growth of Technology At , our computer forensic investigators are each a certified computer examiner. Almost 30 [...]

Go to Top