Contact CyberlabsHomeSite MapDownloadsCyberlab NewsSolutionsWeb ResourcesAbout Cyberlab

1) Law Firms:

Digital Discovery and Data Authentication. Courts are now ordering "digital discovery" along with the more traditional forms of discovery. Absent the services of a forensic examiner, the potential is great for a party to falsify, change, or doctor computer files before disclosing them to the other side in a case or litigation. Such "discovered" evidence might appear to be authentic but in reality be contrived (as well as a fraud on the court). A forensic computer examiner can verify whether computer files disclosed between the two parties match the original files residing on a litigant’s hard drive.

2) Businesses and Corporations:

American businesses lose hundreds of millions of dollars each year through computer security breaches, much of it from external attacks and most from internal employee misconduct. The biggest losses are from theft of proprietary information and financial fraud. Only about a fourth of the businesses surveyed in 2001 reported such problems to the police. Businesses often hope to solve the problems internally and keep the bad news from hurting their stock values or investor confidence.

Businesses also often make the mistake of using only their own in-house computer experts, who may not be trained in forensic methods and procedures, to conduct the internal inquiry. Too often mistakes are made that can cause the results to be inadmissible in a court of law, even if the company is fortunate enough to figure out the source of the misconduct.

Using an untrained person can result in not finding or recovering deleted data, not recovering password-protected data, or not finding secreted, disguised, or hidden data. An untrained person might inadvertently cause the loss, corruption, or destruction of data, trigger destructive processes or data bombs, activate viruses leading to a total crash of the computer, cause your data to be inadmissible in court, cause your law suit to be thrown out, or subject you to being sued. Using only your own in-house experts immediately raises conflict of interest questions and may foster suspicions of self-dealing or corporate misconduct.

Cyberlab Computer Forensics, LLC can assist businesses and corporations with internal theft and fraud examinations with strict confidentiality and secrecy. We can help determine whether an employee has been accessing, tampering with, or copying sensitive files. We can assist in investigating whether an employee has embezzled funds electronically or misappropriated trade secrets or other valuable intellectual property. We can assist a company with internal security of data, recover accidentally deleted files, and recover important files or other data destroyed, deleted, or placed under a password by disgruntled employees. All such investigations are handled with scrupulous regard for state and federal laws relating to computers, individual rights, personal privacy, and the rights of employers and employees.

Employee misconduct can take many forms, from sexual harassment to felony fraud. Cyberlab Computer Forensics, LLC can provide sound, forensic investigations for businesses and corporations regardless of the nature of the suspected misconduct.

3) Accountants, Fraud Examiners, Auditors.

Accountants, fraud examiners, and auditors expect routinely to encounter computers and computer memory devices that contain important financial data. Cyberlab Computer Forensics, LLC can examine computer media for financial records and corporate books. In cases involving financial misconduct, sometimes the real books are given disguised file names, are password-protected, or are hidden by other ploys or stratagems. We can forensically examine the media for you, find the financial records and related data, and do so in a manner that will preserve the evidence to be used in hearings or other proceedings if necessary. We can also convert the data to a format that is understandable and easy to use when needed. Cyberlab Computer Forensics, LLC can provide the data to you on read-only CD-ROM to insure that your evaluation of the data does not alter the original.

4) Prosecutors and Law Enforcement:

Prosecutors and law enforcement agencies often lack critical resources for conducting sound investigations, searches and seizures, and prosecution of computer crimes. Federal guidelines recommend that a trained, forensic computer specialist be one part of a three-part team for such investigations, searches, and seizures:

1) Assemble a team consisting of the case agent, the prosecutor, and a technical expert as far in advance of the search as possible.

. . . [C]omputer searches generally require a team with three important players: the agent, the prosecutor, and a technical specialist with expertise in computers and computer forensics. In most computer searches, the case agent organizes and directs the search, learns as much as possible about the computers to be searched, and writes the affidavit establishing probable cause. The technical specialist explains the technical limitations that govern the search to the case agent and prosecutor, creates the plan for executing the search, and in many cases takes the lead role in executing the search itself. (Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations, U.S. Department of Justice Search and Seizure Manual, January 2001,

Cyberlab Computer Forensics, LLC can assist prosecutors and law enforcement agencies by serving as the technical specialist in the search and seizure of computers and computer data as recommended in the Department of Justice Guidelines. (See also, Electronic Crime Scene Investigation: A Guide for First Responders, National Institute of Justice, July 2001,

Cyberlab Computer Forensics, LLC can assist prosecutors and law enforcement in a broad range of areas where computer evidence has been used, such as homicide cases, kidnaping or child abduction, pornography, child abuse, fraud, arson, drug dealing, counterfeiting, racketeering, conspiracies, financial crimes, stalking, extortion, blackmail, assaults, and other types of crime where computer records, e-mail correspondence, pictures, financial data, or other documents are involved.

We can also re-examine media that has been examined by other examiners or agencies if the examination was not timely, was incomplete, was not in a useful or understandable format, or has other deficiencies or defects detrimental to fair and effective prosecution.

5) Private Investigators:

Cyberlab Computer Forensics, LLC can assist in any investigation involving computers or computer data. This can be particularly helpful, for example, in cases of missing and exploited children who may have used computers to compose letters or e-mail correspondence, or who have contacted others over the Internet of left messages in Internet chat rooms. Modern computer operating systems create numerous hidden files and temporary files that record such activities, and log dates and times. Even if the files only indicate which computer chat rooms were accessed and when, such leads can become extremely important in the search for missing persons. In other contexts computer evidence may be important in sex, age, or race discrimination cases, marital infidelity cases, fraud and arson investigations, and many other sorts of matters routinely encountered by private investigators.

6) Insurance Companies.

It has become commonplace for data or evidence related to insurance investigations to be contained on computers. Computer evidence has been used in arson and related insurance fraud investigations, wrongful death, workman’s comp, and other cases involving insurance claims. Cyberlab Computer Forensics, LLC can assist insurance investigators in uncovering any computer evidence, accessible or inaccessible, password-protected, recently deleted, or otherwise hidden if located on computer hard drives, floppy disks, LS 120 floppies, zip disks, or CD-ROMs.

About Cyberlab | Web Resources | News | Downloads
Solutions | Site Map | Contact Cyberlab
Privacy Statement | Legal Notice

Copyright © 2001 Cyberlab Computer Forensics, LLC. All Rights Reserved

Last Updated: Mon, Sep 10, 2001