Computer Forensics

Is Using Surveillance Equipment Good or Bad?

If you watch TV at all, you hear continual references to closed circuit TV. In fact, if you spend time in the UK or other European countries you will see them everywhere. We realize that makes some people feel uneasy, but there are two sides to surveillance equipment. The Crime Prevention Side of Surveillance Equipment Not sure if I should call it crime prevention because it only seems to deter those who respect the law to begin with, but cameras can be installed inside and around public space and places of business to: Record evidence of theft and other wrongdoing such as vandalism. Authorities routinely use CC TV recordings to identify robbers and submit images to the public for help in apprehending the perpetrators. Employers [...]

Computer Investigation is More Than Forensics, Especially for the Bullied

Being a parent is a big job and now with bullying and cyber bullying that job has become even harder. Years ago the topic of hazing was in the news and the public became aware of the dangers and harm from it. Now, bullying is coming up in the mainstream conversation and its impact is gaining attention. And parents are taking action. Here at , we are seeing that parents consider private investigators a tool in helping them combat bullying in the lives of their children. One case in Maryland caught national attention when an autistic teenager was tormented by two female schoolmates. Evidence of the mistreatment was caught on the girls’ telephones where they had videotaped horrific pranks played on the boy. Played is [...]

Digital Forensics Performed by Private Forensics Companies Picking Up Steam

There is a troubling trend growing in the world of crime and punishment and that’s why the phones at are ringing. Just like every other aspect, life has been impacted by technology, the crime world has taken advantage of new technology, too. But on the other hand, that means that the authorities who police and the attorneys who prosecute (or defend) those in court have to be prepared to use everything technology provides for them, as well. Living in the information age promulgated by technology makes that a challenge. There is just so much evidence and data that has to be uncovered and handled so that it can be used as evidence. The sheer volume is overwhelming authorities. It’s not just in the United States, [...]

Why Computer Forensics Must be Handled by Experts

Getting and maintaining public trust is a critical component of business. So when a situation arises that can impact that trust, the phone at rings. Sometimes it’s an attorney, sometimes it is a CEO or CFO, and sometimes no one except the business owner can make the call. Recently in Indianapolis a CFO of a large business was arrested for theft. Big theft. Not only was he accuse of diverted company funds to his own personal use, it was believed that he had used funds from a client at a former place of employment to cover the funds taken from his current employer. It is a tangled web that is certain, in this case and in many others. Which is the reason why certified computer [...]

Handwriting Analyst Vindicates Parents’ Beliefs

Investigators are sought out during some of the more tumultuous and trying times in people’s lives. For instance, here at , we see… People who have lost touch with loved ones or want to find their birth parents Families in the midst of hostile divorces and contentious child custody cases People whose lives have been thrown into chaos by public accusations or acts of defamation Parents whose hearts are broken over the loss of a child, whether by their being missing or having died Once such set of parents were devastated by the death of their only son, Paul*. The circumstance was that Paul and his girlfriend had been found dead. The police determined that Paul had murdered his girlfriend and then committed suicide. His [...]

Legality of Digital Forensics Critical for Admissible Evidence

Right now there is a big controversy stewing regarding whether or not authorities have the right to seize computers at the borders of the United States. There is a “border search exception” regarding the seizure of physical objects from travelers and some say it should extend to computers. The final decision on the legality and practice of computer forensic analysis in that situation is still pending. What is not pending is that in order to conduct a computer forensic examination or a cell phone investigation, digital forensics firms or labs must have either the permission of the owner, a court order or subpoena for the device. That means that you cannot casually pick up someone’s phone, computer or tablet and bring it to a forensic [...]

Get to the Truth with Digital Forensics

You’ve probably heard by now that you can’t believe everything you see and hear on the Internet, right? But what happens when there is an image that is undeniably you or taken in your business or agency location that is being circulated? Case in point: A central Florida police department was the subject of a pornographic image that was being distributed via Twitter. Of course the police department released statements that it was a fake image, it created a PR problem. Through computer forensics it was determined that the image had been created using computer imaging software. What if it happens to YOU? Organizations can often get past the situation. Not as easy for individuals. When this sort of thing happens to private citizens, it [...]

Forensic Computer Analysis Can Uncover What’s Lurking Inside

Carrying cards instead of cash, well, it used to make us feel a bit safer. But no longer. Credit card theft has been a long-time problem, but now the thieves are using a new avenue and it puts businesses as well as consumers at risk. Several employees at the county courthouse in the northern Texas town of McKinney discovered that their credit card information had been compromised after they had had lunch at a local restaurant. The thief wasn’t an unscrupulous employee or patron who made purchases using their credit card information, it was a hacker. That’s right, a hacker got into the restaurant’s computer system and lifted the customer’s information. This is just part of an alarming trend in hackers infiltrating small business systems. [...]

Are You Being Proactive about Cyber Attacks in Your Small Business?

Small business owners have another growing trend to be concerned with in today’s online marketplace. Symantec reported that 30% of cyber attacks targeted small businesses. Not every cyber attack has to do with malicious threats or activities against a specific business or business owner. The fact is that some hackers simply want to cause a disruption for someone, somewhere. As forensics consultants, has seen a growing number of small business owners invest in computer forensic services as a regular expense of operations. This might fly in the face of what we talk about mostly – the use of spyware and malware to stalk or monitor the activities of others, but malware can also infect systems and networks and create complete upheaval – just for fun. [...]

Protect Yourself with Some Aluminum Foil

We can smirk about the people convinced aliens are invading who wear tin foil hats and cover all their windows with foil, but I’m here to tell you that there are some instances when aluminum foil might be a really good friend. Now, this is not a silly or trivial matter. No, it’s serious and it has to do with your money – and your ability to keep it in your pocket. And here at , we believe that a pound of prevention is better than a gallon of cure. In recent years RFID (Radio Frequency ID) cards have been marketed to consumers as a tap and go solution to paying at restaurants and retailers. But of course, if there is a new “quick card” [...]

Go to Top