We offer full service computer forensics, cell / mobile phone forensics and e-discovery solutions, utilizing state-of-the-art techniques and court proven processes that are second-to-none. We specialize in providing secure solutions using the following processes and technologies.
Computer Forensics and Electronic Discovery, utilizing court proven processes and tools to collect, preserve, analyze, and present electronically stored information (ESI) evidence maintaining proper chain of custody and evidence integrity
Digital Evidence Acquisition
Onsite, Live, and Remote
Digital Evidence Analysis, Interpretation, and Explanation
Jury Comprehensible Expert Reports and Presentations for all Forensic Analysis
Prepare Cases for Civil Litigation or Law Enforcement Referral
Assist with the Preparation of E-Discovery Plans and the Preservation of ESI
Complete Cellular Phone and Mobile Device Forensics Utilizing State of the art Tools and Techniques
Recover and Present
Phonebook / Contact Lists
SMS / MMS Text Messages
Call History Logs
Pictures and Vdieos
Calendar and Task / To Do Lists
File System Extraction
SIM Card Cloning and Extraction
Secure facilities and computer forensic lab
Seminars, presentations, and hands-on classes in Computer Forensics and E-Discovery
Florida Bar CLE Apporved Classes
Computer Forensics LLC is available in West Palm Beach, Miami-Dade, Fort Lauderdale-Broward, Stuart-Martin, Port Saint Lucie, Fort Pierce, Treasure Coast, Vero Beach-Indian River, Orlando-Orange County, Daytona Beach-Volusia, Cocoa Beach-Palm Bay-Titusville-Melbourne-Brevard, and Kissimmee-Saint Cloud Florida for Civil and Criminal Cases
Business Litigation and Evidence Spoliation
Intellectual Property, Patent, and Trademark infringement
Fraud and Breach of Contract
Piracy and Copyright Violations
Workplace Misconduct, Sexual Harassment, and Discrimination
Security Incident Response Handling:
Security Audits and Vulnerability Assessments
Secure Internet and Remote Access
Secure Infrastructure Design and Installation
Secure Client/Server Architecture Design and Installation
Secure E-Mail Solutions
Business re-engineering and Process Improvement
Project Management Systems Integration
Data Analysis and Custom Application Development
Contact Us by Email:
Contact Us by Phone:
Computer Forensics LLC
1880 North Congress Ave. Suite 333
Boynton Beach, Florida 33426
See our Subject Matter Experts national news television appearances NEWS
Locate our Computer Forensic Expert Witnesses in FindLaw's Case Law section U.S. v. MORTON - U.S. v. SCHALES
German police say they have arrested two people and seized illegally generated bitcoins worth more than 700,000 euros ($950,000) in an investigation of computer fraud.
Read more about Bitcoins Seized in German Fraud ProbeComments
A U.S. senator has asked 20 of the world's biggest automakers for information on how they secure their vehicles from cyber attacks, in light of reports by security experts who say they have identified ways to hack into cars.
Read more about US Senator Seeks Information on Carmaker Efforts to Thwart HackersComments
A new point-of-sale (POS) skimmer, used for lifting credit card details and PIN data at retail locations, has gone on sale for thousands of dollars on semi-private underground crime forums. The skimmer is notable in that it can be installed and removed in the blink of an eye.
Read more about Simple Yet Elegant Card Skimmer Goes on Sale in Time for the HolidaysComments
Ted S. writes in:
"I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &c), replace the original (optionally backed up) with the smallest of th
The Canadian government recently put forward a new set of cyber laws designed to prevent online bullying.
The proposed legislation immediately drew howls of outrage from all corners, accusing the government of simply reviving its previous failed attempt at introducing draconian state snooping in a new disguise.
Read more about Proposed Canadian Cyber Law - Anti-bullying or Pro-snooping?Commen
U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) teamed with 10 foreign law enforcement agencies to seize hundreds of domain names that were illegally selling counterfeit merchandise online to unsuspecting consumers.
Read more about ICE, International Law Enforcement Agencies Seize Domains on Cyber MondayComments
Passwords remain the primary means for online authentication and must be protected when stored on a server. Encryption is an option, but it has an inherent weakness in this application because the server authenticating the password must have the key to decrypt it. An attacker who steals a file of encrypted passwords might also steal the key.
Read more about Why Salted Hash is as Good for Passwor