All in Investigations

Tag: Computer

  • Foiled by a Mole, Proven by a Computer Forensics Investigation

    Foiled by a Mole, Proven by a Computer Forensics Investigation

    Computer forensics investigators are asked to work on a wide variety of cases – from businesses concerned with the release of proprietary information to spouses in the midst of bitter divorce battles. Here at , we find that computer forensics investigations are also becoming a tool in relationship investigations. For instance, we had a case…

  • Be Safe, Ask a Computer Forensics Expert When You Need Help

    Be Safe, Ask a Computer Forensics Expert When You Need Help

    Not too long ago we had a case here at that pointed out how important it is to work with professionals. A woman came to us about her son. He and his wife were in the midst of a bitter divorce and child custody proceeding. Her son had temporary custody and the wife would come…

  • Informed Decisions Begin with Objective Computer Forensics Analysis

    Informed Decisions Begin with Objective Computer Forensics Analysis

    Although computer forensics analysis is often used as a spyware detector and for spyware removal, there are many other reasons someone might look for computer forensic services. For instance, one very wet, drippy day a woman knocked on the door here at . She came in and sat down and it was apparent that she…

  • Computer Forensic Analysis Uncovers Facts

    Computer Forensic Analysis Uncovers Facts

    One thing about investigation – you uncover truths. They might not be the truths you are looking for or that the client expects, but it’s the truth that comes out in the end. We had a client who asked us to complete a computer forensics examination of her family computer. She was looking for financial…

  • Computer Forensic Analysts Provide Factual and Objective Data

    Computer Forensic Analysts Provide Factual and Objective Data

    When computer forensics investigators extract data, it is handled completely objectively. Many times, we don’t know the implications of what is – or is not – found in the data. We compile the information and turn it over to the client. That’s just the way it is with computer forensics analysis. For example, was involved…

  • Data Extracted in Computer Forensics Results in Additional Charges

    Data Extracted in Computer Forensics Results in Additional Charges

    Even though the protocol and process a computer forensics investigator uses to extract and analyze data from a computer are the same no matter who owns the computer, ownership does make a difference in the outcome once the facts are uncovered. For one thing, the owner of the machine has to provide appropriate permission for…

  • Computer Spyware is a Real and Viable Threat

    Computer Spyware is a Real and Viable Threat

    TV, movies and media provide a glimpse into situations that the everyday person may not consider reality. However, we in the investigative world see that not everything is so fantastic that it is improbable. Take a scene from a sitcom where one character witnesses what is going on in his ex-wife’s home because his son…

  • Data is Data to Cell Phone and Computer Forensic Experts

    Data is Data to Cell Phone and Computer Forensic Experts

    “But I didn’t open anything bad!” That’s what one of our clients said when our computer forensic specialist was trying to explain that she did, indeed, have spyware on her cell phone. The thing is that a link is a link is a link. By that, I mean that the hardware – the cell phone…

  • Computer Forensics Discovery Reveals the Truth

    Computer Forensics Discovery Reveals the Truth

    When Brad called , he was pretty distraught. The conversation with him was peppered with one phrase. He kept saying he just wanted the truth. The truth he was seeking was about Lynn, his wife. Lynn was a freelance graphic artist. She worked from home and spent hours in front of the computer. She had…

  • In Computer Forensic Analysis, the Broader the Scope the Better

    In Computer Forensic Analysis, the Broader the Scope the Better

    Have you ever heard about the form of marketing called drip marketing? It’s where a little bit of information is “dripped out” a little bit at a time over an extended period. It reminds me of the form of torture where it is set up that a drip of water is dropped on the victim…