Forensics

Why Have Your Cell Phone Data Forensically Extracted?

There are many reasons an individual, attorney or a company would request an extraction from a device. An accusation of cheating on your spouse or even worse you suspect your spouse of being unfaithful can likely be addressed by analyzing cellular user data. More than likely there is sufficient evidence on of your cellular devices to either give credibility for or against the accusation. Now, what if the smoking gun was a GPS location saved in a temporary folder destined to soon be deleted? Or what if the text messages between a cheating spouse and their fling have been deleted? Our digital forensics software easily carves out deleted data and GPS location data from phones, but not all phones keep deleted user data the same [...]

Ostriches Don’t Get a Fair Deal in a Divorce

For those of us who have been divorced, we understand the process and procedures.  We know that we either represent ourselves (which could create problems during and after the divorce) or we retain the services of a reputable law firm (which prevents the pro-se issues).  We enter into a marriage full of hope and dreams and unfortunately, we are only in control of half of that relationship.  We enter into a divorce with the expectation to right the wrongs and in many cases, there are activities that need to be investigated.  The he/said she/said of the relationship holds little weight in court.  Documented behavior and actions are required.  Not all divorces are complicated, but in relationships that end due to deceit, hiring an investigative company [...]

Computer Forensics Specialists Can Remove Spyware From Mobile Worker’s Machines

Over the last few years something has happened in the business world – workers have become mobile. Unfettered through computers and use of the cloud, the old 9-5 doesn’t have to be within the confines of office walls. With that freedom have come other issues. One of the biggest issues is the protection of corporate assets. While workers have become mobile, they are carrying confidential corporate assets in the form of information with them on their computer and laptops. Those assets could include many things: actual computer hardware (theft from cars, restaurants, airports, etc.) client lists sales data financial data product research and development employee personnel information Computers and laptops are routinely stolen. But the thefts of hardware are usually just to get the computer [...]

Go to Top