We can find malware, spyware, VPNs, Bash history, and other forms of unauthorized remote access to your computer most of the time, if it exists – but we can’t find it every time.
Many times, in many states, for more than a decade.
Yes, we do it pretty much all the time.
Yes, that’s its main function.
Yes, that’s a big part of what we do.
We’re neither the most expensive, nor the cheapest. Analysis on the average computer costs around $2,000-$2,500, a phone is about half that, and our minimum fee is $1,100.
We’re based in California, but we do work all over North America, and occasionally for other continents as well. For better or worse, we meet only about 5% of our clients in person.
About half are attorneys. Another large percentage are corporate IT departments and the US military. A substantial percentage of our work is with individuals.
We just don’t do that. Our job is to find data; not to destroy it.
Most operating systems don’t keep track of what was copied from it, although we often can find what has been sent via Cloud storage, text, message, or email. As below, we can often identify what device has been attached, so you can request, demand, or subpoena it.
Yes. And often the make, model, serial number, and date as well.
As long as some other process has not overwritten the data, we can find deleted texts, messages, photos, etc. on a smart phone such as an iPhone or Android.
There is data, especially in photos, that can identify locations where a phone has been.
We do work with cell phone tower data provided by phone companies.
Phones are rarely hacked. When they are, they rarely give a clue as to who has hacked it.
At this point in time, we do not.
You can find some ways to harden your network, and practices to avoid here and here.
That is a service we offer. We suggest getting the source electronic email, and not working from a printout.
For electronic documents, we can examine the metadata and search the computer for previous versions of it. We don’t do a lot with paper documents.
Always a tough situation. We can usually find more than 100,000 deleted History entries, deleted emails, text, messages, photos, videos, and much other evidence that would indicate a level of faithfulness.
Not a problem. In Windows, we would generally lost just the root directory. On a Mac, we would lose names and dates of files, but still recover the content.
It is extremely rare that someone manages to actually wipe a drive irrevocably.
We do indeed!