
Computer forensic investigators are bloodhounds for evidence of the truth. The truth could be evidence of a corporate crime or something as personal as relationships between spouses. Divorce attorneys contact often with different requests. One case recently involved a forensic computer analysis. The wife felt trapped in a marriage to a wealthy professional. Everyone thought […]

Forgeries of paintings may be the stuff of movies, but forgery of signature on documents happens more often than the public realizes. For example, recently had an inquiry about a home that was being sold on a lease-to-rent agreement. The original tenant/buyer died during the term of the sales agreement. His sister and her husband, […]

Theft by employees is a problem for more than retail or restaurant businesses. It is a problem in the office, too. I am talking about more than office supplies and materials here. I am talking about the theft of ideas, processes, client lists and confidential corporate operations. This could include employee embezzlement through accounting or […]

Data Extraction. That’s what provides the evidence so many of our clients want when they request a mobile phone forensic analysis. Cell phone forensic tools allow a cellular forensics specialist to create an exact image of the cell phone hard drive and from that, complete a mobile phone analysis. The analysis will uncover any evidence […]

has a reputation for being able to locate missing heirs or people. Usually it is because a family member is trying to reconnect with another family member who has not been in contact for a long time. But other situations arise where we are asked to find people like the case of the veteran who […]

Computer forensic investigation is becoming more and more a part of many crimes and alleged criminal activities. From activity on websites to chats and email, evidence can be extracted by a computer forensic investigator and by following data extraction protocol, what the forensic computer analysis uncovers can be used in a court of law. Here […]

During nice weather, business is conducted in a lot of places outside the office. Think the golf course or even on a boat. was called about Technical Surveillance Countermeasures (TSCM) services from a financial planner’s attorney. His client had suddenly lost several clients to a specific competitor and was suspicious about why – and how. […]

There are many reasons to find a person from your past. was recently called in on a case involving an elderly man. He wasn’t ill. In fact, he was pretty spry for his age – at least physically. His spirits were pretty low because he had several children he hadn’t had contact with in more […]

Computer forensics investigation is not solely limited to the big companies who fear corporate espionage. No, every business has access to cutting edge investigative techniques. Business had been growing for a small fastener manufacturing company. Their bids were consistently being accepted and their pipeline was running full. Until, that is, when all of a sudden, […]

The first step takes in a due diligence investigation or background check is to verify the information we have received on the subject. The online searches or a Google search just take the information given and if that information is inaccurate or incomplete, so are the search results. That’s not how we work. For instance, […]