
Computer forensic investigators are bloodhounds for evidence of the truth. The truth could be evidence of a corporate crime or something as personal as relationships between spouses. Divorce attorneys contact often with different requests. One case recently involved a forensic computer analysis. The wife felt trapped in a marriage to a wealthy professional. Everyone thought […]

Theft by employees is a problem for more than retail or restaurant businesses. It is a problem in the office, too. I am talking about more than office supplies and materials here. I am talking about the theft of ideas, processes, client lists and confidential corporate operations. This could include employee embezzlement through accounting or […]

Computer forensic investigation is becoming more and more a part of many crimes and alleged criminal activities. From activity on websites to chats and email, evidence can be extracted by a computer forensic investigator and by following data extraction protocol, what the forensic computer analysis uncovers can be used in a court of law. Here […]

Computer forensics investigation is not solely limited to the big companies who fear corporate espionage. No, every business has access to cutting edge investigative techniques. Business had been growing for a small fastener manufacturing company. Their bids were consistently being accepted and their pipeline was running full. Until, that is, when all of a sudden, […]

Chances are if you hear a conversation these days about spear fishing, it is not about someone’s exciting experiences on an exotic vacation. You are probably hearing about SPEAR PHISHING and the need for a computer forensics investigator. It may sound the same, but you or your organization are the targets instead of a game […]

A very frustrated woman brought the family computer to because she was convinced spyware had been installed on it. Our computer forensic investigator began the spyware detector process. In this instance, the analyst started with the open ports and he did indeed find something, but it wasn’t spyware. He found a Trojan, which is an […]

So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware. You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have […]

Computer data forensics recovery is possible in many cases. Take, for instance, the smashed computer of Adam Lanza, the perpetrator of the recent shootings in Connecticut. Even though he sought to prevent anyone from accessing the information on his computer by smashing it, depending on the damage, data could possibly be recovered. The computer forensics […]

Corporate espionage is not limited to the development of products and top secret patents. Oh, no, any industry where there is competition, there is the potential for the need for experts in digital forensics. Even in an industry you might not suspect – the hotel and hospitality world. Starwood Hotels & Resorts accused Hilton of […]

Employers hire people with the best of intentions. They hope the new employees will become loyal and exemplary representatives of the organization. But sometimes it just doesn’t work out that way. Take for instance the case of a middle school teacher in Downers Grove, Illinois. According to a Chicago Tribune article, the teacher has resigned […]