Who uses the service of a computer forensic investigator?
Law Enforcement is not the only employer of forensics.
Many people use this service to confirm their suspicions and reveal
suspicious files such as illegal photos and or documents on a computer.
Forensics can also show what web pages kids, spouses, and / or employees
have visited and when they have done so.
Recover deleted files, email correspondences, and more.
Discover the history of any suspect computer system.
We use the exact same methods and software in our examinations as most
other companies in the computer forensics field.
Why are we so inexpensive compared to other companies offering the
Simple, when we have completed our investigation we pass the information
on to you and we're done. We do not provide expert witness or depositions.
We prefer to deal in investigations that won't make it to court. We
simply do not have the have the personnel to spare. Providing our service
to such individuals as: suspicious spouses, curious parents, and employers
that want to know what an employee has been up to. These type of investigations
don't usually end up in litigation so we can offer a much more affordable
A Summary of What We Do:
- Protect the suspect computer system during the forensic examination
from any possible alteration, damage, data corruption, or virus introduction.
- Discover all files on the suspect drive. This includes existing
normal files, hidden files, password-protected files, deleted yet
remaining files, and encrypted files.
- Recover all discovered deleted files.
- Reveal the contents of hidden files as well as temporary or swap
files used by both the operating system and the application programs.
- Access the contents of protected or encrypted files.
- Analyze all possibly relevant data found in special (and typically
inaccessible) areas of a disk. This includes but is not limited to
what is called 'unallocated' space on a disk, as well as 'slack' space
in a file.
- Print out an overall analysis of the suspect computer system, as
well as a listing of all possibly relevant files and discovered file
data. Further, uncover attempts to hide, delete, protect, encrypt
information, and anything else that has been discovered and appears
to be relevant to the overall computer system examination.
Our head forensic investigator has trained law enforcement and the
government (FBI San Diego, 2004) in special computer crime and investigation
Call our lab for more information.
Toll Free (877)738-6900