evidence

To Text or Not to Text

I have heard Client’s say they don’t answer calls from private numbers, they don’t answer calls from numbers unknown to them and they basically just do not answer their phone.  When asked why they have their phone they reply, to text, tweet, post and check Facebook, Instagram, Snapchat, Google search, listen to music, podcasts, and whatever else they do with their phone besides actually making and receiving phone calls.  Communication comes in many forms and for anyone younger than 40, audio (actually talking) is the least type of communication used.

I think to myself, well then voicemail should soon be obsolete and maybe we don’t need our ears or our mouths, but then how can girls take photos of themselves with puckered lips?  Now for [...]

  • Permalink Gallery

    Oh, the Secrets a Computer Reveals in a Computer Forensic Examination

Oh, the Secrets a Computer Reveals in a Computer Forensic Examination

We recently had a client who came to us unhappy – and angry.

The business owner was unhappy because he had lost a key employee in his company. But worse than that, he was angry because the employee had started a competing company and the owner suspected the new company was started not only while the worker was still employed by him, but using his firm’s trade secrets, equipment and resources.

He just couldn’t prove it. At least not with enough evidence for his attorney. Of course, the employee denied it when confronted.

Through a computer forensic examination, we were able to uncover documents and communications (e-mails and reports) that brought the truth out. The employee had started his new company before leaving the old one and [...]

May 3rd, 2012|Computer Forensics|