computer forensics

Gone, But Computer Forensics Investigation Means He’s Not Forgotten – Or Forgiven!

It’s not unusual for a business owner to be so intent on running a business that they are taken by unscrupulous employees. received a call from an attorney who had a construction company owner as a client. We’d provided computer forensic consulting for other clients of his in the past. This client had called with what he said was a weird question. Apparently the construction company had a Vice President who had recently left the company – he resigned saying had had accepted a position in another company. The owner was sorry to lose him because he was grooming him to take over operations. Well, after he left, three of the jobs that had gone out for bid, which the owner thought were pretty much [...]

Computer Forensics and OTR Trucking

Computers are a part of every segment of our lives – from choosing a restaurant or moving and getting the route to get there on time to doing our work in an office, restaurant or on the road in our cars or vans. That is why computer forensics investigations are becoming more the norm than a specialty during investigations of all sorts. Computer forensics companies like are prepared to undertake inquiries in every industry and situation. A recent case demonstrates the spectrum of cases in which digital forensics can used.  Computer forensics investigators applied their skills in an investigation of a semi-truck driver. There were discrepancies in the weight records and the shipment manifests. The company replaced the computer in his tractor with a new [...]

Computer Forensic Examination is Becoming Routine Part of Investigations

Computer forensics investigations are not just about catching individual employees or spouses or scammers doing wrong, a computer forensic examination can also be used to support the claims of whistleblowers. Just recently an article in which whistle-blowing employees of a big bank exposed a culture where they claim, “We were told to lie” and that the culture was rampant from the top down. Because has been on the forefront of computer forensics, we know the amount of evidence that is thought to be available in their computers is massive. If an investigation is begun, computer forensics electronic discovery is expected to be employed to capture files including emails, reports and evaluations. With the amount of data to be collected, even with the authorities involved, they [...]

Computer Forensic Analysis is a Tool for Divorce Attorneys and Clients

Computer forensic investigators are bloodhounds for evidence of the truth. The truth could be evidence of a corporate crime or something as personal as relationships between spouses. Divorce attorneys contact often with different requests. One case recently involved a forensic computer analysis. The wife felt trapped in a marriage to a wealthy professional. Everyone thought he was a nice guy who did well at his job and provided a great home. In fact, he drank every night, spent time in his home office and would then go out for a few hours. She considered him a high-functioning alcoholic and was just waiting for the late-night phone call saying he’d been arrested for DUI or worse, had been part of an accident. She was looking for [...]

Computer Investigation Shows Employee Embezzlement is Digital Now, Too

Theft by employees is a problem for more than retail or restaurant businesses. It is a problem in the office, too. I am talking about more than office supplies and materials here. I am talking about the theft of ideas, processes, client lists and confidential corporate operations. This could include employee embezzlement through accounting or bookkeeping channels from corporate accounts, too. All of these things constitute theft in the workplace; some just look a little different than others. Instead of carrying something physically off, it’s moved digitally. And that is how exactly how it is found – digitally. Computers are the basis of most of the work done in many workplaces so when suspicions arise, a computer forensic investigation is one of the first steps [...]

Computer Forensics Analysis an Effective Evidence Collection Tool

Computer forensic investigation is becoming more and more a part of many crimes and alleged criminal activities. From activity on websites to chats and email, evidence can be extracted by a computer forensic investigator and by following data extraction protocol, what the forensic computer analysis uncovers can be used in a court of law. Here at , we have operated one of the first computer forensics labs in the nation and have built a reputation on our experience and professionalism. Attorneys know if it’s there, we will find it. With recent whistleblowers stepping forward from the ranks of Bank of America, the government’s Home Affordable Modification Program (HAMP) appears to have been hampered (pun intended) by executives in the bank. The thing is that it [...]

Computer Forensic Analysis Solves Business Problems

Computer forensics investigation is not solely limited to the big companies who fear corporate espionage. No, every business has access to cutting edge investigative techniques. Business had been growing for a small fastener manufacturing company. Their bids were consistently being accepted and their pipeline was running full. Until, that is, when all of a sudden, their competitor started winning the majority of bids. Something was wrong or at least the owner smelled something fishy. His attorney contacted to arrange a meeting away from the business. The owner wanted to explore his options because he felt certain someone in his organization was sharing confidential bid information with outsiders – specifically his competitors. Rather than beginning with the potential of a computer forensics analysis, the owner wanted [...]

Computer Forensics Consultant First Line of Defense Against Spear Phishing

Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game fish. Spear phishing is an attack targeted very specifically to one simple point of contact – an inconspicuous email crafted to entice the receiver to click a link that opens malware or connects to a site that can compromise the recipient’s network – including intranet business network contacts. Computer forensics firms are seeing more and more evidence of the spear phishing technique as the bad guys are honing their infiltration [...]

Sometimes It’s Not Spyware Found During a Computer Forensic Examination

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an application that can open a port like a remote desktop – and it does it without your permission. Malware like Trojans can crash the computer or send you advertisements. It’s not necessarily spying on you – but it does make your online life miserable. This Trojan was causing the problems she was having and once removed, she was good to go. On occasion we discover that people do things on [...]

Talk to a Computer Forensics Consultant to Secure Your Retired Hardware

So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware. You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have confidential and corporate information on the drives. Computer forensic analysis can recover data even though users think the information has been “deleted.” In fact, in many cases, after completing a computer forensics electronic discovery service, uncovers evidence. As a computer forensics consultant, can work with companies and organizations to develop a security policy and procedure in regard to retired electronics. That single step in your IT security program could prevent [...]

Go to Top