computer forensic investigation

Computer Forensics Analysis an Effective Evidence Collection Tool

Computer forensic investigation is becoming more and more a part of many crimes and alleged criminal activities. From activity on websites to chats and email, evidence can be extracted by a computer forensic investigator and by following data extraction protocol, what the forensic computer analysis uncovers can be used in a court of law. Here at , we have operated one of the first computer forensics labs in the nation and have built a reputation on our experience and professionalism. Attorneys know if it’s there, we will find it. With recent whistleblowers stepping forward from the ranks of Bank of America, the government’s Home Affordable Modification Program (HAMP) appears to have been hampered (pun intended) by executives in the bank. The thing is that it [...]

Computer Forensic Analysis Solves Business Problems

Computer forensics investigation is not solely limited to the big companies who fear corporate espionage. No, every business has access to cutting edge investigative techniques. Business had been growing for a small fastener manufacturing company. Their bids were consistently being accepted and their pipeline was running full. Until, that is, when all of a sudden, their competitor started winning the majority of bids. Something was wrong or at least the owner smelled something fishy. His attorney contacted to arrange a meeting away from the business. The owner wanted to explore his options because he felt certain someone in his organization was sharing confidential bid information with outsiders – specifically his competitors. Rather than beginning with the potential of a computer forensics analysis, the owner wanted [...]

Sometimes It’s Not Spyware Found During a Computer Forensic Examination

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an application that can open a port like a remote desktop – and it does it without your permission. Malware like Trojans can crash the computer or send you advertisements. It’s not necessarily spying on you – but it does make your online life miserable. This Trojan was causing the problems she was having and once removed, she was good to go. On occasion we discover that people do things on [...]

Computer Forensic Investigation is NOT a DIY Project

Computer data forensics recovery is possible in many cases. Take, for instance, the smashed computer of Adam Lanza, the perpetrator of the recent shootings in Connecticut. Even though he sought to prevent anyone from accessing the information on his computer by smashing it, depending on the damage, data could possibly be recovered. The computer forensics experts at computer forensics companies like have tools and resources – and the knowledge – to complete a computer forensic examination and, if possible, uncover data and information that was believed to be erased or eradicated. Spyware removal is not the only reason a forensic investigator is called onto a case, even though digital forensics services can be used as spyware detectors and spyware removers. But data extraction is another [...]

Computer Forensics Investigations Uncover Evidence of Industrial Espionage

Corporate espionage is not limited to the development of products and top secret patents. Oh, no, any industry where there is competition, there is the potential for the need for experts in digital forensics. Even in an industry you might not suspect – the hotel and hospitality world. Starwood Hotels & Resorts accused Hilton of industrial espionage in 2009. Apparently Starwood lost 10 executives and managers to the Hilton chain and Starwood alleged that the departing employees downloaded massive amount of documentation before departing. This is a situation where a computer forensics specialist can undertake a computer forensics investigation to uncover what was done on each of the computers owned by Starwood and used by the departing employees. Once the computer forensics examination is complete, [...]

Computer Forensic Investigations are Best Left to the Professionals

A DIY approach to computer forensics opens up an unwanted can of worms – especially if evidence and factual data is found or recovered from the computer. With computers being the primary tool used by employees in the vast majority of industries and firms, evidence of wrong-doing is often on the machines once the employee has been terminated or resigned. If there is even the hint that digital forensics may uncover evidence, it’s best to hire a professional computer forensics expert right away. After the employee leaves and the hardware is turned over to the IT department, even the initial booting up of the computer can taint any evidence that would be recovered. Why? A few of the many reasons: The chain of custody and [...]

Keeping Track of Employees with Computer Forensics? You Betcha!

Employers don’t often think they really need the help of a computer forensics consultant or a computer investigation in the normal course of business. However, when something just doesn’t seem “right” it pays to listen to your gut carefully. Case in point is a story recently reported by NPR. What began as a hint that the computer infrastructure was being hacked by someone in China illuminated a scheme perpetrated by a worker. It seems the employee had outsourced his own work to a sub-contractor in China. Yes, you read that correctly. His job responsibilities for software development were being handled by someone in China – while he was earning a six-figure income! He was also reputed to be “the best developer in the building.” While [...]

Foil Corporate Espionage with Computer Forensic Investigation

Corporate espionage is not new. Since the beginning of business, unscrupulous competitors have tried to steal trade secrets and proprietary information. They have used whatever technology was current at the time and now, with computers who knows where the limits will be or what will be next. computer forensics experts regularly provide computer forensics consulting to organizations and businesses. We have been active in this field for years and cannot recall every case, but we do recall the differences and nuances between one computer investigation and another computer forensic investigation, because that is where we see changes and how we stay on top of what the bad guys are trying that is new. In a recent New York Times opinion piece, Eamon Javers made a [...]

Computer Forensic Investigation Uncovers Retailers Monitoring More Than Rental Due Dates

Apparently if you rent a computer from some retailers, you may be getting (or giving away) much more than you thought in the bargain. As computer forensics investigators, we are always watching for information about how bad guys can get into people’s lives on the sly. With computers the security loopholes are everywhere. So this article written by John E. Dunn at Techworld didn’t shock or surprise me. What I see escalating is the number of articles popping up in the mainstream media about computer spyware detectors and spyware removal. In most all of them, they now mention computer forensic services. As an aside, was one of the first to offer computer forensic services when no one really understood what a computer hacking forensic investigator [...]

Spyware That Lets Someone Get Up Close and Personal is Why You May Need Computer Forensic Services

What you may consider a quiet afternoon sipping a latte at the coffee shop and catching up with all your Facebook friends and email may be the quiet before the storm. The storm may end up with a computer forensics specialist performing digital forensics on your computer. After reading 10 Computer Threats You Didn’t Know About, I wondered how many people would really take them seriously. Not because they weren’t presented seriously, but more because of the mindset that “that wouldn’t happen to me.” I’m here to tell you, it COULD happen to you and more and more “average citizens” are seeing it happen to them. As computer forensics experts, is well aware of the increase in computer hacking and   the use of spyware: [...]

Go to Top