CyberCrime is an attack on a computer and/or a network of computers, or a computer itself being used to commit a crime or offense. New computer purchases continue to soar. Whether being acquired for use at home, or office, each system is a potential target for an ever-growing number of hackers and virus writers. If traveling with a corporate computer, there are additional threats that may not have been considered. At best an internal IT staff is typically overwhelmed with requests and has little or no time to stay up-to-date with the ever-changing technological landscape. Even the most techno-savvy individuals often do not consider the every day risk associated with the most basic of computing tasks. We are well versed in the many aspects of computer / Internet risk management and security. Our investigators have backgrounds ranging from the development of corporate usage policies, to email tracing, to low-level data recovery and forensics in order to identify, recover, extract, and preserve data residing on a computer.
Mohr Investigative Services, Inc. utilizes standard industry techniques in use by state & federal law enforcement agencies. We offer unique and cost effective solutions that can be used a multitude of environments. Our services encompass a wide range of systems which typically allows us to be to address situations in both corporate, government and professional offices. The goal of our computer forensic services is to recover as much critical evidence as possible that is relative to your unique requirement.
Our services can be used for a variety of reasons, including criminal, civil, financial and other reasons. Representative clients include government agencies, corporations, attorneys, licensed professionals, and individuals with challenges that exist within a home or business.
Government Agencies: Typically the federal government already has the resources to for investigations of this nature, however city, county, and state government agencies have other responsibilities to deal with. By examining government computer systems, we can provide information pertaining to vendor & procurement fraud, sexual harassment and EEO issues, the use of govt. computers to run home based business's, harassment of other employees, and illegal content to include downloading of images and other questionable materials. This is a growing trend. Not only is it a significant liability risk, it also reduces employee productivity.
Corporations: Use of company systems for illegal or unethical reasons. Fraud, theft, embezzlement, theft of trade secrets, sexual harassment/EEO problems, misuse of the internet or corporate computing resource.
Attorneys: Civil cases, Will & Estate matters, intellectual property violations, labor & employment litigation, entertainment & sports litigation. It is important to remember that most documents & other financial records are maintained primarily on computers.
Listed below are the most common hardware and software configurations that we support at this time:
Microsoft Operating Systems to include 95/98, 2000, Millennium, & XP Professional. This also includes PC's in a client server configuration, as well as Windows 2000 Server, 2003 Server.
Pocket PC type PDA devices that work in conjunction with PC's as part of a standalone or enterprise network.
This includes all of the normal files, even those that were deleted, hidden and or encrypted files. This also includes data created by applications such as Microsoft Office, Photoshop, Adobe, Quicken/Quickbooks, and other application software products, as well as the recovery of the temporary and/or swap files, allocated and unallocated space, and other key areas that are not usually known to most computer users.
Analysis & Reporting
Mohr Investigative Services, Inc. will provide a complete analysis of the entire process so you know what evidence has been recovered, and if other action needs to be taken, to include other suggested technical options. Our report will detail hardware, software, applications used, data recovered, to include photos, images, and other evidence. As experts in this field, we can also provide expert testimony in the event it is required.
While technical data such as system components is important, it is typically secondary to information pertaining to user information. Our detailed reports include information outlining system configuration as well as persons that have logged in/used the system. Information recovered typically includes: sent/received email messages, web sites visited, files and documents accessed, programs used, and timeline of system usage. Our reports are prepared in a concise format for ease of use by persons without a degree in computer science.
Email Tracing / Internet Profiling
While the Internet is a valuable tool in our society, it is often used for deceitful or abusive purposes, such as infidelity and Internet stalking. Individuals engaging in illicit activities on the Internet often do so believing that they will remain nameless and hidden in cyberspace. We can assist to uncover the true identity of these individuals. Our IIU (Internet Investigations Unit) employs techniques similar to those used by government law enforcement agencies.
Our tiered service offerings allow us to tailor our services to your unique requirements. Should you simply need to obtain the identity and address of the primary individual responsible for the email account, our Basic Email Trace would be appropriate. If additional information is required (complete history of the individual including; name, address, phone number, aliases, address history, spouse, neighbors, date of birth, social security number, civil history, property ownership, other e-mail addresses, and Internet history), then our Advanced Email Trace would be the route to take.
Internet Profiling is similar to uncovering fingerprints left behind by an individual. When a person interacts on-line, a trail is silently left behind from chat rooms, posted messages, purchases, digital photographs and hobby groups, just to name a few.
Through highly-specialized recovery techniques and tools, this information can be uncovered to develop a profile of an individual. The level of detail produced through an Internet Profile Report (IPR) is directly related to a person's frequency and the degree of their activity while on-line. Internet Profiling is not designed to replace a standard background investigation, but can be used to link an individual to specific activities, interests, and online habits.
Via our Basic Internet Profiling, through the use of an e-mail address or sometimes just a name, we can determine a person's past activities on the Internet. Our Advanced Internet Profiling service will provide additional information on a subject including: name, address, phone number, aliases, address history, spouse, neighbors, date of birth, social security number, civil history, property ownership and other e-mail addresses.
Back to top