Computer Forensics In Action

Evidence Spoliation — During an internal investigation, two executives were ordered to turn their laptops over to the company's outside counsel……

Intellectual Property Theft — A professional staffing firm relied heavily on the use of a single spreadsheet that contained information on prospective……

Laptop Compromise — A financial service firm's IT personnel installed remote access software with a weak password on an executive's laptop……

Instant Messaging Alibi — Law enforcement requested insight on a criminal case that involved a gang-related assault and battery outside of a high……

Source Code Theft — A software developer was alerted by one of their customers that a post had been made to an online forum, in a foreign……

IT Gone Rogue — An IT Director noticed that his network engineer, who was involved in a back-pay dispute with the company, was reading the HR……

Server "Crashing" — A retail company's IT staff were unable to access their mail server which was hosted by a third party. The company first suspected……

Date and Time Manipulation — An individual sued his former employer for wrongful termination related to a whistle blowing complaint……