computer forensics

Computer Forensics Investigations Uncover Evidence of Industrial Espionage

Corporate espionage is not limited to the development of products and top secret patents. Oh, no, any industry where there is competition, there is the potential for the need for experts in digital forensics. Even in an industry you might not suspect – the hotel and hospitality world. Starwood Hotels & Resorts accused Hilton of industrial espionage in 2009. Apparently Starwood lost 10 executives and managers to the Hilton chain and Starwood alleged that the departing employees downloaded massive amount of documentation before departing. This is a situation where a computer forensics specialist can undertake a computer forensics investigation to uncover what was done on each of the computers owned by Starwood and used by the departing employees. Once the computer forensics examination is complete, [...]

Is the Potential of a Computer Forensic Examination Part of Your Computer Usage Policy?

Employers hire people with the best of intentions. They hope the new employees will become loyal and exemplary representatives of the organization. But sometimes it just doesn’t work out that way. Take for instance the case of a middle school teacher in Downers Grove, Illinois. According to a Chicago Tribune article, the teacher has resigned and given up her teaching certificate after it was discovered she had explicit photos of herself on her computer at school. There is an investigation underway as to whether or not the photos were shared with any minors. Whenever employers suspect covert or criminal activity by an employee, one of the first places to look is their computer. A computer forensic investigator can complete a computer forensics electronic discovery that [...]

Computer Forensic Investigations are Best Left to the Professionals

A DIY approach to computer forensics opens up an unwanted can of worms – especially if evidence and factual data is found or recovered from the computer. With computers being the primary tool used by employees in the vast majority of industries and firms, evidence of wrong-doing is often on the machines once the employee has been terminated or resigned. If there is even the hint that digital forensics may uncover evidence, it’s best to hire a professional computer forensics expert right away. After the employee leaves and the hardware is turned over to the IT department, even the initial booting up of the computer can taint any evidence that would be recovered. Why? A few of the many reasons: The chain of custody and [...]

Keeping Track of Employees with Computer Forensics? You Betcha!

Employers don’t often think they really need the help of a computer forensics consultant or a computer investigation in the normal course of business. However, when something just doesn’t seem “right” it pays to listen to your gut carefully. Case in point is a story recently reported by NPR. What began as a hint that the computer infrastructure was being hacked by someone in China illuminated a scheme perpetrated by a worker. It seems the employee had outsourced his own work to a sub-contractor in China. Yes, you read that correctly. His job responsibilities for software development were being handled by someone in China – while he was earning a six-figure income! He was also reputed to be “the best developer in the building.” While [...]

Foil Corporate Espionage with Computer Forensic Investigation

Corporate espionage is not new. Since the beginning of business, unscrupulous competitors have tried to steal trade secrets and proprietary information. They have used whatever technology was current at the time and now, with computers who knows where the limits will be or what will be next. computer forensics experts regularly provide computer forensics consulting to organizations and businesses. We have been active in this field for years and cannot recall every case, but we do recall the differences and nuances between one computer investigation and another computer forensic investigation, because that is where we see changes and how we stay on top of what the bad guys are trying that is new. In a recent New York Times opinion piece, Eamon Javers made a [...]

Spyware That Lets Someone Get Up Close and Personal is Why You May Need Computer Forensic Services

What you may consider a quiet afternoon sipping a latte at the coffee shop and catching up with all your Facebook friends and email may be the quiet before the storm. The storm may end up with a computer forensics specialist performing digital forensics on your computer. After reading 10 Computer Threats You Didn’t Know About, I wondered how many people would really take them seriously. Not because they weren’t presented seriously, but more because of the mindset that “that wouldn’t happen to me.” I’m here to tell you, it COULD happen to you and more and more “average citizens” are seeing it happen to them. As computer forensics experts, is well aware of the increase in computer hacking and   the use of spyware: [...]

Mainstream Media is Reporting about Spyware and Computer Forensic Analysis

Oh yes, it is a small world – especially when you connect the dots on the Internet. Bloomberg writer Vernon Silver illuminated what happens when spyware is installed on a person’s computer. It’s done so quickly and almost without notice that the victim doesn’t realize until later that they have become a victim. Computer forensics experts here at have said that the incidence of spyware on computers is indeed rising. In addition to computer forensics investigations delving into files on the computer, our certified computer examiner is being asked to complete digital forensics and forensic computer analysis as spyware detectors and subsequently for spyware removal. The victim in the Bloomberg article was a law student who was a political activist. The spyware was installed on [...]

The Need for Computer Forensics Investigations is Growing

After the hustle bustle of the holiday season, most of us are ready to get back into our regular routines. However, I just read an article by Matt Gephardt at KUTV.com in Utah that there is actually a bump up in computer malware infections after the holidays – up to a 30% increase! That means there are those who are working extra hard right now to get personal information from your computer. The article says that much of this increase is due to people: getting new computers or other electronic gadgets as gifts for the holidays surfing the Internet before installing some sort of anti-virus protection surfing for online bargains in the holiday shopping season. There are ways to ascertain if your computer has been [...]

Computer Forensic Services Illuminate the Truth

According to an article I read recently, the courts in different states have different views on the Computer Fraud and Abuse Act (CFAA). The case referenced was one in South Carolina in which an employee left the employ of one company but downloaded several proprietary files including pricing terms, pending projects and technical capabilities before leaving. He then took that information to his new employer who promptly was able to win over a major customer with the information. The original employer sued – and lost. According to the article, “the appellate judges agreed that the employer had sued under an inappropriate law – one designed to prosecute hackers committing genuine fraud, not disloyal employees.” Courts in other states from Maine and New Hampshire to Illinois, [...]

Computer Forensics Foils Robbers

Have you heard the complaint that computers are de-personalizing interactions in the world? I do know it is easier to hide an identity behind a computer, but that doesn’t take the human out of the equation, that’s for certain. Nor does it prevent the truth to be revealed through computer forensic investigation and computer forensic analysis. For instance, I just read about two robbery cases in Durham, N.C. that were solved by using computer forensics. The cases centered on the use of Craigslist. The victims responded to an ad on the site and were subsequently robbed. A computer forensics specialist was able to trace all the way back from the ad to the suspects to a physical address. In our experience here at , our [...]

Go to Top