Hard drives forensic examiners tackle may be as little as 20 gigabytes, or some newer drives are 250 gigabytes, even up to 750 gigabytes.
Computer forensic examiners, using special computer forensic software, first acquire an image of the target media, then do an analysis.
A lot of the evidence you seek will not be visible to the untrained eye. You won´┐┐t find it in a Word document by using Windows Explorer, or by starting a program from a shortcut on the desktop.

Find Colorado computer forensic examiner - Dave Pettinari on Facebook
The key piece of evidence that could prove your case undoubtedly resides on your suspect's computer. But how do you get to it in a way that preserves the evidence, and makes certain the outcome of the criminal or civil case or employment action is in your favor?

Don't feel as if you are powerless and without options. The wealth of evidence that can prove your case can be quickly and effectively recovered through the assistance of our team of forensic experts.

Forensics examiners can quickly identify places to look, things to look for, and other sources that might provide additional evidence.

Perhaps the forensic examiner will discover earlier versions of data files before they were revised, or evidentiary data in a different format. For example, information in a Word table might eventually end up in a spreadsheet. That information might then have been e-mailed to someone else. A picture that is evidence might have been included in a document or spreadsheet, and also saved as a stand-alone image file.

Why we can find the computer evidence you need...
Cases can be resolved very quickly and decisively when computer evidence is discovered that slams the lid shut on denial or evasion of responsibility.

Our computer forensic examiners have years of experience with a multitude of operating systems and different case types. They have written numerous search warrants, seized several hundred systems, and testified in court about their findings on numerous occasions.

Types of cases we handle...
  • Theft of intellectual property
  • Destruction of, or misappropriation of data
  • Alteration of data, alteration/misuse of programs
  • Unauthorized access to a computer system
  • Unauthorized use of a company's computer for private gain
  • Downloading/distribution of pornographic material
  • E-mail misuse
  • Insurance fraud
  • Terrorism
  • Blackmail
  • Money Laundering
  • Murder
  • Rape
  • Child pornography/child solicitation
  • Internet e-mail tracing
  • Collection of digital evidence at web sites, newsgroups, and chat rooms
  • Online auction fraud
  • Death investigation
What is computer forensics?
Computer forensics is collecting, preserving, analyzing, and presenting computer-related evidence. Computer evidence is often extremely telling in civil litigation, employment proceedings, and criminal cases.

A computer retains far more information than many people realize. When you delete a file, send e-mail, or merely browse the Internet, it is very difficult to erase your digital tracks. Even if your subject has intentionally deleted information, in many cases experienced computer forensic specialists can recover that information.

You can also keep in contact with us through Blogspot