Computer Forensics Services

Computer forensics refers to the collection, preservation, analysis and presentation of computer-related evidence. In summary, it helps determine the WHO, WHAT, WHERE, and WHEN related to a computer-based crime, deceit or violation. It can also be used when there are doubts about what an individual is using a specific computer for. The proper collection and analysis of computer evidence through accepted computer forensic protocols is a critical component to any internal investigation or audit.

Home / Office Computer Forensics Investigations Can be Used For:

  • Marital issues
  • Employee theft
  • Inappropriate email and internet use in the work place

Marital Issues

Spousal computer forensics investigations can be useful if you are looking for the truth. They may bring up evidence in the form of emails, computer messaging, CDs, disks, internet history, documents, other files or printouts made by a specific computer relevant to the suspected affair. It is not just the content of emails, documents and other files which may be of interest to investigators, but also the metadata associated with those files. A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions. A cheating spouse would be unable to deny the facts identified in a computer forensic investigation. These investigations can be carried out very quickly and the information can be removed safely with no danger of it being damaged or the confidentially of the investigation compromised.

Employee Theft

Employees are often the culprits in company theft; this can range from the theft of physical goods covered up with shadow invoices, to theft of information. When an employee takes company data, it may be sensitive data to sell to competitors called commercial espionage, or theft of company data for personal gain. The reasons an employee takes confidential company information vary from being benign and misguided to premeditated and intentional for the purposes of personal gain. One example is theft of customer details, so that when the employee leaves the company, they can then deal with the clients themselves. This is also known as embezzlement.

Inappropriate Email and Internet Use in the Work Place

Inappropriate use of computers in the workplace comes in many forms, and ranges in severity and risk for the business. For example, an employee sending lewd e-mails through the company's email server could expose the company to liability. The policies should give employees clear direction on how the company's internet access can be used.

Excessive use of the internet on company time on Facebook or LinkedIn for example, can amount to up to ninety minutes per employee per day. Unsurprisingly this can amount to serious costs from lost time and efficiency. While such time-wasting is problematic, inappropriate computer use has other more serious forms including personal emails to clients, sending inappropriate images to others from company emails, and Facebook statuses that could compromise the company's reputation.

Computer Forensic Investigations

We at City Investigations can come to your home or workplace and examine your computers. We use our computer forensic tools to obtain a complete report of all of your computer usage in your home or business, which you will then receive in hard copy.

We follow a strict set of rules in conjunction with our computer forensics and all chain of evidence rules are adhered to in order to ensure that you are in a sound legal position, should it be necessary to take up legal action against an individual who breaches your company policies.

The four main principles in computer forensics are as follows:

  • No action should change data held on a computer or storage media which may be subsequently relied upon in court.
  • In circumstances where a person finds it necessary to access original data held on a computer or storage media, that person must be competent to do so and be able to give evidence explaining the relevance and the implications of their actions.
  • An audit trail or other record of all processes applied to computer-based electronic evidence should be created and preserved. An independent third-party should be able to examine those processes and achieve the same result.
  • The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.

Therefore, you can be assured of a complete and professional approach by our professional forensic specialists who are highly skilled at obtaining the evidence you need.

No matter what your computer forensic needs are we can help you. City Investigations is experienced in all areas of computer forensic investigations, and our goal is to reach the case objectives and resolve the client's issues as quickly and cost effectively as possible.