All in Investigations

Tag: Computer forensics investigation

  • Free Will or Foul Play?

    Free Will or Foul Play?

    Twenty-year-old Sean Purcell lived in the basement of his parents’ home. His living area had its own entrance. With school and work, it wasn’t unusual for his parents not to see him every day. He also wasn’t known for returning texts or phone calls speedily, so the Purcell’s weren’t too concerned when they didn’t see…

  • It Just Seemed Too Good: How An Employee Gained Unauthorized Access to HIPPA Records and Lost Her Job

    It Just Seemed Too Good: How An Employee Gained Unauthorized Access to HIPPA Records and Lost Her Job

    Do the best you can, be kind and courtesy, have good work product and treat clients, patients and co-workers with respect, work well with others and be on top of your game.  All these applied to our Client, Amanda’s Office Manager Sharon, she was a team player from the outside and yet, things just seemed…

  • He didn’t send the emails, but they came from his computer

    He didn’t send the emails, but they came from his computer

    Computer forensic analysis can range in scope depending on the case.  We get cases ranging from clients wanting to find deleted emails, pictures, etc. all the way to malicious software investigations.  As with all digital forensics, forensic data recovery is the most common request that we get followed closely by mobile phone spyware detection with…

  • Forensic Computer Analysis Can Uncover What’s Lurking Inside

    Forensic Computer Analysis Can Uncover What’s Lurking Inside

    Carrying cards instead of cash, well, it used to make us feel a bit safer. But no longer. Credit card theft has been a long-time problem, but now the thieves are using a new avenue and it puts businesses as well as consumers at risk. Several employees at the county courthouse in the northern Texas…