Computer-Based Activity Investigations
After making a copy of a suspect’s desktop computer, laptop or tablet (including servers and clouds where materials may be stored), the professional licensed investigator will follow the user’s trail and try to recreate the computer-based activity. This method can highlight efforts the accused may have made to conceal offline and online activity.
When you suspect a computer-related issue, the best thing to do is to leave the computer alone and allow the computer forensic investigator determine the timeline of actions that occurred.
The Debugging Experts
Jack Sandlin & Associates
Third Eye Investigations
Our members have been screened and pledge to uphold our standard of ethics.
However, IAPI accepts no liability arising from the use of these services.