Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game […]
got a call from a CEO who was concerned about an upcoming board meeting. The board would be discussing some very confidential matters including the terms of the sale of the company. If news of the sale was leaked, it could damage not only the negotiations, but the financial health of the company and the […]
A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an […]
Teachers are always encouraging school children to look for patterns – that’s because patterns are so revealing. And it’s not only true in math and science; it’s true in investigations, too. No. 1 Secret – Patterns Tell a Story in Mobile Phone Analysis With years of experience in the field, the investigators at know how […]
Cell phone forensics at is more than mobile phone forensic analysis. It can include mobile phone spyware detection or cell phone hack detection and sim card forensics, but it includes many other aspects when it comes to defense in a criminal case. For instance, to provide admissible evidence to support a defendant, we employ a […]
We have talked a lot here in the ’ blog about being asked to find hidden assets in divorce situations, but we don’t want you to think that is the only time money is hidden away from the sight of others. Today I want to talk about another instance when we are called in to […]
We live in a time when it is not uncommon for a person to live in several states throughout their life. When is called in on a due diligence investigation or background check, we see that trend. If a subject has lived in a number of counties and states, that could be a major stumbling […]
Another interesting case recently investigated was centered in a child custody battle. A police officer and his wife in Iowa were divorcing and both wanted custody of their two children. The wife accused the officer of harassing her by sending threatening text messages. He was on the verge of losing any custodial rights as well […]
In a recent discussion with one of the cellphone experts at , I learned that the Blackberry is probably the least “hackable” phone out there. A cell phone forensic analysis can include what is called a password bypass. In fact, we have been asked to uncover passwords that had been lost or forgotten. That is […]
So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware. You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have […]