All posts by admin

The use of computer forensics in private investigations

Computers (and the way they connect us) are arguably one of the greatest achievements of mankind. However, there is also a somewhat dark side to connectivity – one which most everyday users would find abhorrent. Computers can be used to commit fraud, to deal illegal or contraband goods/services, to exploit vulnerable people and harass innocent members of the public.

While many of us have a rudimentary understanding of how computer forensics can be used to either exonerate or prosecute an individual in a criminal trial, few of us are aware of the role computers, mobile phones and other devices can play during a private investigation.

The answer of course is in much the same way. It would be naïve to assume that once browsing history or files have been deleted from a hard drive that they are somehow magically lost forever. The truth is that most information is recoverable, and every single key input and mouse-click leaves a trail that a good private investigator in Dallas will have the skills and tools to uncover.

Why use a private investigation service in Texas?

Businesses and individuals alike have plenty of reasons to turn to private investigation and computer forensics. Some of the most popular reasons for businesses to request the forensic services of a digital private investigator in Dallas include the following:

  • Obtaining evidence of computer misuse on company time
  • Identifying posters of potentially libellous content (such as false reviews)
  • Identifying website cloners/intellectual property theft
  • Obtaining evidence for employment disputes

Likewise, individuals might have good reason to employ computer forensics as part of a private investigation. It’s a discreet way to uncover whether a partner or family member is:

Being unfaithful

  • Accessing pornography
  • Accessing extremist content
  • Partaking in online harassment/bullying

Whatever your reasons for requiring a private investigation service in Texas, you can rely on ICFECI to deliver a professional, discreet and confidential service which will help to put your concerns at rest one way or another. For further information on the types of computer and mobile phone forensics we provide, please do not hesitate to get in touch with us today.

How computer forensics is used to tackle blackmail and harassment

In an age of seemingly limitless connectivity, people all over the world now have the ability to contact one another with relative ease, 24-hours-a-day. While smart phones, tablets and computers are great at facilitating everything from business deals to online dating, they also make the potential for harassment much easier – and therefore more widespread – than ever before.

Online harassment, abuse and blackmail are on the rise, with individuals, small businesses and even large multinational corporations being open to these forms of attack. In some cases, the perpetrators might even try to use VPNs or anonymous browsers like Tor to conceal their identity – but thankfully there are methods to identify perpetrators in ways which are admissible in a court of law.

Following Digital Footprints

If you’re currently the subject of online harassment – be it on an individual or commercial basis – why not allow the best computer forensics analyst in Texas to help you track down those who seek to damage your reputation?

As a specialist computer forensics analyst in Dallas, we’re able to track down cell phone numbers, social media accounts, IP addresses and even specific devices used in online harassment, blackmail, extortion and hate crime. With unique tools and skills, we’re able to confirm the identity of online harassers with a large degree of success.

Defending Against Online Harassment

The relative anonymity of the online world is something of a myth. Even if an individual goes to great lengths to conceal their identity (such as using false email addresses or “sock puppet” social media accounts), a computer forensics analyst in Dallas should be able to track the IP addresses and domains used to harass you.

Harassment can have a huge impact on your quality of life – and if your harassers are also willing to target your business, it could affect your income. If you’ve got an idea of who is causing distress and bad-mouthing your company online, our experts are able to cross-reference IP addresses to make sure.

From here, you’ll then be in a position to present your evidence to a court of law – be it for a civil claim due to loss of earnings, or a criminal suit due to the impact of harassment upon your life.

For more information, why not contact ICFECI today? As the finest computer forensic analyst in Texas, we’re on your side to help you get the justice you deserve.

How USB Forensics Can Uncover Illegal Activity

For the past decade, digital forensics has been a hugely prominent force in the fight against illegal activity. Cases can be supported or dismissed on account of evidence gleaned from mobile forensics, computer forensics, and cell site analysis. However, cases usually require a device such as a smartphone or a laptop to be in the possession of the prosecution – but what if the information has been placed onto a computer or copied from a computer, and you don’t have access to the physical hardware used to do so?


The good news is that ICFECI – the best private investigator Dallas has to offer – can uncover the history of every device connected to your computer via USB.


Private investigator Texas: why USB connectivity information matters


In an age of wireless connectivity, you might not think USB device connection history is important. However, proof that a USB device has been connected to your computer in your absence could help support your case. The idea of a connected USB device may seem innocuous enough, but it’s a fact that USB connection history is useful can be useful to determine:


  • When sensitive information (such as bank details) has been copied from a computer.
  • When illegal files have been copied to or from a computer.
  • When a mobile device has been charged via a computer (for example, if a cheating spouse allowed their lover to charge a phone via a USB slot on a laptop).
The above scenarios are just three examples of how people can leave a digital footprint via USB connectivity. As the best private investigator, Fort Worth has to offer, we’re able to employ a series of complex digital forensics techniques to identify when devices have been connected to your device and the purpose of the connection of these devices.


How can I tell what USB devices have been connected to my computer?


Computers feature a database known as the registry. This registry is where the core settings of the operating system are stored. Whenever a USB device is inserted into a computer, a key is created within the registry. This registry key contains information about the USB device, and with the right tools and know-how, a private investigator can extract this information.


If you’d like to know more about how our digital forensics services could help you identify when USB devices have been connected to your computer, why not get in touch with the team at ICFECI today. We’ll be happy to discuss your requirements and offer advice on how our service could benefit you.

Challenges in Mobile Forensics: How Manufacturer Security Is Getting Tighter

In 2020, the main challenge for cell phone forensics teams has continued to be encryption. This year, the encryption bundled with Android devices as standard has started to cause issues for computer forensics firms.

While encryption has been around since Android 6, all mid-range Android devices and Samsung smartphones prior to 2019 made use of Full Disk Encryption or FDE. This form of encryption uses a less secure encryption scheme that protects mobile data with “default password” as the encryption seed key – nothing new for your average purveyor of computer forensics in Dallas to crack.

As of 2020, most new cell phones come with File-Based Encryption (or FBE of short). This newer encryption scheme encrypts files with a key based on the screen lock passcode of the user. While experts in computer forensics in Texas can still prevail when it comes to decrypting data from new smartphones, acquisitions will undoubtedly become significantly more time-consuming and difficult as a result.

Why Android forensics is causing headaches

For those without mobile forensics expertise who need to access encrypted data, Android is causing some serious problems. The smartphone market is saturated with thousands of different low-budget Android models. These models are equipped with all sorts of different chipsets from a variety of manufacturers.

Powerful data acquisition methods, such as EDL extraction, can be used to access a special “safe mode” which exists on most devices for engineering/diagnostic purposes. However, these methods might not be suitable and will depend on individual device settings which could actually enforce enhanced encryption, should the device recognize that its data may be compromised.

Dedicated forensic tools

Ultimately, in 2020 a computer forensics team in Texas will need an arsenal of dedicated forensic tools to access encrypted data. In addition to this, they may employ techniques such as cloud extraction to acquire data.

If you’re in Dallas and have been locked out of a cell phone, or need to access encrypted data for legal purposes, chances are you’ll need access to computer forensics in Texas to achieve the desired result. In 2020, technology has become incredibly complex, and it pays to let the experts do the work for you.

6 Types of Digital Forensics That Can Help Solve Your Case

Digital or cyber forensics are changing the way that crimes are solved. In crimes related to a computer or similar electronic device, digital forensics can also be used in a court of law. But it’s not only the police force who use digital forensics. If you hire a private investigator in Texas they can help answer your questions using some of the latest technology.

Here are six different types of digital forensics you need to know about.

Image forensics

Similar to video and audio forensics, the metadata of images are analyzed in order to determine the legitimacy and locate a source for it.

In 2020, digital forensics is a very dominant component of forensic science and the legal industry. In essence, as technology continues to advance at a rapid pace, there will be a growth in subdisciplines of digital forensic approaches.

Computer forensics

This is the recovery of material and information found on a computing device such as a desktop PC, laptop and any of its internal storage components such as hard drives where information can be collected as evidence.

Mobile device forensics

Similar to computer forensics, this is applied to the storage media used by mobile devices such as phones or tablets – typically via SIM cards or GPS. This can often be crossed over with computer forensics due to the similar approach.

Networking forensics

This is the analysis and retrieval of information over a networking server. This is applicable to locating sources of cyber attacks and other malicious transferrals over a network that can potentially be collected as evidence for crimes.

Memory forensics

This is the live analysis and recovery of information and data operating on the system’s memory (RAM). This is useful when there is information present in a system’s volatile data that isn’t easily found on storage media.

Video and audio forensics

This is the analysis of digital audio or video recordings. This is carried out to determine legitimacy of the recording to determine whether or not it has been edited or modified – which then determines its potential for use in court.

This is why we private investigators here in Fort Worth and Texas are continually developing our skills in the world of cyber forensics.

How to protect yourself from false forensics

It is commonly understood that once something leaves the closed system of your phone or computer, it is out of your hands. Text messages are saved by providers, blog posts are screenshotted and saved, and calls are logged or recorded. When it comes to technology, nothing is ephemeral.

That said, technology is highly adaptable by nature. Every time we think we have found a way to outsmart it, a new strain of deception appears. Many people are aware of ‘deep fakes,’ a method of effectively impersonating someone via video editing. Considering how simple it has become to alter someone’s face and words, the act of altering text is hardly outside the realm of possibility.

Problems with digital evidence

On top of this, a number of problems prevent law enforcement from accurately assessing digital evidence. This includes the amount of digital evidence (thousands of texts can be sent within the span of a few hours); the difficulty of obtaining original copies of messages (screenshots are easily edited and tech giants are notoriously slow at providing data); and the ease of cherry-picking information from a seemingly endless source (you might have searched for a term tangentially related to the crime five years ago).

False forensics can be particularly damaging in cases that involve fraud and sexual assault. Messages can be erased or edited to appear in someone else’s favor or to hide evidence of misrepresentation. Especially when dealing with law enforcement who might not be trained to deal with digital evidence, a doctored email could sway an entire case against you.

Computer forensics in Dallas

Bearing everything in mind, it is crucial to consider your own technological safety. Computer forensics should be handled by experts, who have a professional understanding of the evidence. ICFECI offers computer forensics in Dallas and computer forensics in Fort Worth with the goal of protecting you from false accusations or mishandling of crucial evidence. Our experts are trained to identify relevant parts of data, in addition to often overlooked warning signs for when messages have been deleted or doctored.

In today’s world, it is easier than ever to frame someone using technology. You need to ensure that you are doing everything you can to make technology work in your favor.

How Cell Phones Can Save the Day

When people think about the insidious and, frankly, not unwelcome, growth of technology in our lives, it is usually with a twinge of guilt: ‘I shouldn’t spend so much time on Twitter,’ or ‘I’m working on keeping screen-time to a minimum,’ and so on. But the rise of mobile technology is probably here to stay: it’s just too useful to us! Need milk? Message your partner to pick some up. Running late? A quick phone call, email or SMS reassures the person you are meeting that you are on the way.

But there are other ways that being ‘always connected’ can help, and that is when a crime is committed and someone else ends up being accused because of an unfortunate coincidence. This can be a resemblance between them and the real criminal, crossing paths with the real criminal as they make their getaway, or any number of happenstances that can occasionally happen – some of them being so very unlikely that a writer of fiction would not dare make them up. As the saying goes, life is often stranger than fiction as seen by this tale, often recounted in cybercrime anecdotes all across the US, from cyber forensic services in Fort Worth to police forces in Seattle and Minneapolis.

Charley Bergin, a tow truck driver, was called out one night to discover that a man had got his truck stuck in the New Mexico desert. The man had called his son, who obligingly drove out to rescue his dad, only to get stuck himself. The man and his son then called on another friend to help them, and that friend got stuck too! Realizing they needed expert help, they finally called on Charley who came out and pulled all three trucks free of the mire. In the midst of all this busy-ness, Charley’s wife phoned him and they got into an argument. Tiring of his beloved’s voice, Charley lobbed his phone into nearby bushes, finished his job and drove home to face the music. The discovery of not one but several bodies in the vicinity, alongside Charley’s phone, had Charley on the hook for serial murder, but after he told his highly unlikely tale, the police checked it out, and soon had the real murderer safely locked up!

But phones can save suspects in other ways too: Larry T Roberts looked very much like a man wanted for murder and was accused. Witnesses, misunderstanding their instructions, picked out Roberts as the guilty party, and things looked very bleak until his cell-phone was forensically examined, and a timeline of his calls and movements over the night in question showed that he was many miles away for considerable time on either side of the murder. On the brink of being jailed for a very long time, Roberts was hugely relieved that the truth was uncovered in time.

And this is the worth of cyber forensic services in Dallas and all across the US: done correctly they can ensure that the truth of your innocence is revealed ensuring that justice is correctly served for the victims as well as for the innocents wrongly accused of crimes they did not commit.

Retrieve Data from Damaged Cell Phone to Uncover Evidence of Crime

Cell phones are the most used communication tools in the current generation. Everyone regardless of age uses the cell phone and it becomes a part of human life. With the boom in cell phone technology, it has become a storage device as well. The increased uses result in an increased number of damages. Since cell phones become important in almost every aspect of one’s personal and professional life, gaining access to the information is critical to an investigation to secure evidence. Cell Phone Forensics is a branch of digital forensics which is used in extracting data/information from mobile phones with the help of forensic techniques and equipment. It is possible to recover deleted text messages from a cell phone if you have the proper forensic tools and training. A great deal of erased data can be recovered including but not limited to

  1. Detailed Call Logs
  2. Address Book
  3. Calendar
  4. Memos / Notes
  5. File System
  6. Pics
  7. Texts or SMS
While it’s important to recover texts we should not limit ourselves to just one portion of evidence and instead make a concerted effort to recover every possible tidbit of information and evidence available on that device. In many cases, phones are damaged, dramatically, to destroy evidence. Some professionals are available that know the process of how to recover various types of data from damaged cellular devices. Not only do these experts know how to undelete deleted text messages, but they can also retrieve email addresses, text messages, SMS messages, caller ID, contact names and telephone numbers, graphics and pictures, videos, address book, and call records with detailed information such as times and duration of calls made and received. A cell phone forensic investigation is the best investigative tool available today to uncover crime.
A professional cell phone investigator is one of the most eminent functions that any person would want to take advantage of. Since the necessity of this technology has become prevalent in modern times, you would be surprised with the kind of advanced tools and techniques that have been developed to deal with the ever-changing cell phone designs and software. When you recover deleted text and other important data from the damaged phones, it is important to rely on a professional that knows how to undelete text messages without damaging any of the data that is on your cell phone. However, this process is something that is used and implemented in a legal manner or as an investigative service aid. The technology is practiced and implemented by only those who have the knowledge, skill, experience, equipment and are legally licensed.

At ICFECI, data recovery from the damaged cell phone, accidental screen damage, water damage or electrical power damage are handled by a professional who has experience can solve complicated problems. They know different types of problems and provide Certified Cellular Examination and analysis using court-validated digital forensic services with tools. You will certainly be satisfied with the service you receive from us.

How Your Mobile Phone Can Save You from a Conviction

It would be nice to think that law and order was a black and white affair: this action is illegal and deserving of a prison sentence, while that action is legal and undeserving of censure. The truth is much murkier, especially when it comes to situations where it is one person’s word against another. Fortunately, modern technology comes to our rescue here too, as in so many areas of life, with digital forensic investigation.

Text and Call InformationSituations can get out of hand and what starts out as a friendly date can turn into an awkward encounter. In worst-case scenarios, it can end with an accusation of rape or sexual assault.Age fib:  Sometimes people can lie about their age and it can be hard to tell the difference between a legal eighteen-year-old and a mature fifteen-year-old. This is often a highly sensitive situation, as children are, rightly, deserving of the full protection of the law, but it can happen where the other party is innocent of any wrong intention and completely unaware that they have been deceived. Taking someone’s word for their age should not be a crime, but it can happen that a charge of statutory rape is laid. Having a private investigation service uncover text and email proof that the age given was legal, and being able to show a reasonable assumption of a legal and consensual relationship, will give you a better chance of earning leniency from a judge or the prosecution service.

Cheat: Being caught cheating can sometimes lead people to lie. It is easier to say ‘they forced me’ than to own up to a moment of lust, but if the cheated upon partner then insists on a police case being opened, you might be forced into making a defense. Having proof that the meeting and the sex were consensual can get you off the hook, leaving the cheat with some questions to answer to his or her partner!

Regret: Rarely, people can regret the impulsion to a one-night stand. Sometimes this is, as above, because they have a partner already, at other times it could be because they have religious beliefs or other moral concerns over their own behavior which they alleviate by putting the blame on the other person concerned: unfair and illogical, but humans are messy and emotional sometimes! Again, proof positive of their consent can be found on a mobile phone through cell phone forensic investigation.

GPS Data

GPS data pinpoints where the phone user is at any point in time and accurately reading this can help to confirm your story or show holes in an accusation.

It is this last point where mobile phones can really help in a situation where actions can be ambiguous or open to several interpretations. If a narrative does not line up with text and GPS data it is easier for a defense lawyer to unpick that narrative, providing doubt about the accusation and leading to a (deserved) acquittal and dismissal of charges.


What can cyber forensic services do for you?

Being accused of a crime is scary. It is a life-changing moment when simply knowing that you have been accused can cause friends to turn their backs on you, family members to harbor suspicions and colleagues and employers can take steps to distance themselves from you, just in case, the accusation happens to be true.

Of course, sometimes the accusation is true, but there are few people who take the side of the perceived criminal, and accidents and happenstance is seldom accepted on the word of the so-called perpetrator.

This is where digital forensic services can help both sides: offering evidence of the truth of one’s statement. For example, if there is no way to leave a room without leaving fingerprints, and your fingerprints cannot be found anywhere in the room, it must be accepted that you were never in that room.

Today, fingerprints are the old-school example of forensic investigation. Today, there are often more subtle ways to prove alibis and statements. Let us have a look at some of these:

GPS locations

Many devices contain GPS features so that you can access maps and plot courses to new places. These devices tend to keep records of your locations so that a certified fraud examiner can verify your whereabouts at the time being analyzed. They can help to prove that you were elsewhere when a crime was committed and can even attest to your state of mind. For example, sharing a cute cat video during the occurrence of a robbery is a fair indicator that you were elsewhere!

Otherwise, if someone is accusing you of committing a crime against them, an examination of their phones or devices can be useful. For example, if they say that they were not at a certain place, their devices can prove that this is not true and that they have perhaps muddled one day up with another.

Cyber forensic services and computer activity

Many murderers are caught because of their search history into how to commit the heinous act, but sometimes this can work the other way. Lack of searches about criminal activity, proof of attempts to go straight, even social media posts, all can help to prove a defendant’s claims as to their state of mind, activities and more, giving their lawyer something to face down the prosecution with.

Undoing fit-ups

Should someone try to frame you for a crime, a good computer forensics expert can help with this. There is no action taken on a computer that an experienced digital investigator cannot track, and this includes the careful planting of data – and being able to prove that someone else has the means, motive and the method is an excellent way to instill reasonable doubt in any judge or jury.

If you are in need of a criminal defense investigator, why not gives us a call today? Our investigators have the expertise that you need right now.