Computer Forensics Computer Forensics Computer Forensic Services, Inc
About Us | Digital Evidence Services | Contact Us | Forensic Imaging
Join our Email List
Computer Forensics and Cell Phone Forensic Services
Our high-technology digital evidence services are performed by certified IT security investigative professionals.

We use only licensed investigators or trained computer forensic examiners at Computer Forensic Services, Inc. This means the State or Computer Forensic Services, Inc. has performed background checks and has determined the individual to be qualified, capable and of sound character to perform investigations.

Under current Texas State law, it is a major risk and violation of the Private Security Act for an law firm, organization or individual to use an un-licensed investigator in the analysis and investigation of digital evidence. Please see the following links:

Each individual has passed tests administered by professional organizations to demonstrate competency in the subject areas

Professional insurance is maintained.

We are trained in and use the latest technology. We are familiar with the rapidly changing legal landscape as it relates to high-technology investigation.

This is our primary responsibility. We will not be investigating while performing other operational tasks.

We do not engage in activities that would reflect poorly on ourselves, our customers or the professional organizations we belong to.

Our investigative service offers a better value and is Cost Effective. Using outside investigative services is an economical alternative to providing internal IT investigative capability.

Computer Forensic Services, Inc. uses best practices chosen and developed through experience in high-tech investigations. Our procedures are designed to avoid common mistakes that jeopardize the interest of the client.

It is very difficult to keep internal investigations confidential using internal investigators. Breaches of confidentiality can damage reputations and compromise cases. Often state laws protect employee assigned investigators with "whistle blower" statutes should they decide to break the confidentiality. Texas requires licensed external investigators to maintain the confidentiality of the client to which they are engaged.

At times internal investigators find themselves investigating colleagues, superiors or subordinates. This may have not been known at the start of the investigation. These situations may lead to dismissal of claims, civil actions and situation escalation

Sanction Failure to utilize "best available" procedures and techniques in dealing with evidence can lead to court sanctions and spoliation claims.

Computer Forensics
Get the facts when faced with:
-A hostile separation
-A pattern of suspicious behavior
-Unexplained lost business
-Legal actions

You'll receive:
-A written forensics analysis detailing evidence of questionable activity
-Relevant materials extracted onto CDROM and DVD.
-State of the art analysis
-Forensically trained investigators or examiners
-Specialized analysis hardware
-The same analysis systems used by leading law enforcement labs
-Safe and Confidential 

Retrieve evidence of:
-Internet History and Searches
-Instant and Chat Message Logs
-Email Accounts
-Social Networking History
-Time and Activity of Computer Files
-Hidden Assets
-Side-business operation
-Hacking tools 
-Sexual harassment
-Previously Attached USB Devices
-Webmail from Gmail, Yahoo and Microsoft.
-Dropbox, iCloud, Skydrive and Google Drive

We Use:
-Forensic Best Practices
-Chain of custody
-Write blocking devices
-Detailed procedural reporting