{"id":738,"date":"2023-03-05T15:02:03","date_gmt":"2023-03-05T15:02:03","guid":{"rendered":"https:\/\/asginvestigations.com\/attorney-services\/?page_id=738"},"modified":"2023-04-15T18:01:23","modified_gmt":"2023-04-15T18:01:23","slug":"computer_forensics","status":"publish","type":"page","link":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/","title":{"rendered":"Expert Computer Forensics Investigators"},"content":{"rendered":"<div class=\"gb-container gb-container-f0cf2d08\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-01555574\">\n<div class=\"gb-grid-column gb-grid-column-ae0aa6f8\"><div class=\"gb-container gb-container-ae0aa6f8\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-d7d6b328 gb-headline-text line-before\">Discretion Expertise Results<\/p>\n\n\n\n<h1 class=\"gb-headline gb-headline-bf57f736 gb-headline-text\">Expert Computer Forensics Investigators<\/h1>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-0d4b2eec\"><div class=\"gb-container gb-container-0d4b2eec\"><div class=\"gb-inside-container\"><\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-89d3c5c7\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-d9ae0f7e gb-headline-text line-before second-line-indent\">Contact Us<\/h2>\n\n\n\n<!-- SharpSpring Form for Contact Us Sidebar - Spry Style (ASG New)  -->\n<script type=\"text\/javascript\">\n    var ss_form = {'account': 'MzawMDGzNDI3AgA', 'formID': 'MzG1ME8yNDHUNTVLTdM1MTM00LU0tDDTNTY1SDYwNTazMEqyAAA'};\n    ss_form.width = '100%';\n    ss_form.domain = 'app-3QNFC7F5DW.marketingautomation.services';\n    ss_form.hidden = {'_usePlaceholders': true};\n    \/\/ ss_form.hidden = {'field_id': 'value'}; \/\/ Modify this for sending hidden variables, or overriding values\n    \/\/ ss_form.target_id = 'target'; \/\/ Optional parameter: forms will be placed inside the element with the specified id\n    \/\/ ss_form.polling = true; \/\/ Optional parameter: set to true ONLY if your page loads dynamically and the id needs to be polled continually.\n<\/script>\n<script type=\"text\/javascript\" src=\"https:\/\/koi-3QNFC7F5DW.marketingautomation.services\/client\/form.js?ver=2.0.1\"><\/script>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-d79eeaf9\">\n<div class=\"gb-container gb-container-f0ab50c2\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-734aff11\">\n<div class=\"gb-grid-column gb-grid-column-21672ec2\"><div class=\"gb-container gb-container-21672ec2\">\n\n<figure class=\"gb-block-image gb-block-image-306236d4\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" class=\"gb-image gb-image-306236d4\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg\" alt=\"Channel Checking Investigations\" title=\"Channel-Checking-Investigation-300x200\"\/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-55137b6e\"><div class=\"gb-container gb-container-55137b6e\">\n\n<p>With over 90% of the world\u2019s business documents being drafted on computers and the relentless use of e-mail, instant messaging and internet business by nearly everyone, much of today\u2019s civil litigation evidence can be derived from computers. ASG has a computer forensics investigation team with the ability to locate and recover any and all relevant information or traces of same that may exist on a computer or digital storage device. This includes recovering items such as e-mails viewed but not \u201csaved\u201d, websites visited, deleted documents, uninstalled software, etc. The great news about this type of data is that unlike a piece of paper which only shows us what we can see, electric data can have information about its creation, multiple versions of that information, who it was transmitted to, history of its use, etc. We are proud to say that if a piece of information exists on a computer or storage device, we will be able to locate it and produce it for inclusion in evidence.<\/p>\n\n\n\n<p>This type of computer forensics investigation should not be confused with the type of searches the average I.T. employee or computer consultant will conduct. We employ a number of methods and\u00a0investigative tools to locate and reconstruct each file or fragment, often including deleted items and fragments that other I.T. Consultants reported did not exist. Many of our clients, as well as the opposition, are often surprised at what we are able to find that was thought to be deleted or erased.<\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-5908e4de\">\n<div class=\"gb-container gb-container-8fc80b44\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-2b02a22d\">\n<div class=\"gb-grid-column gb-grid-column-9ecfeed7\"><div class=\"gb-container gb-container-9ecfeed7\">\n\n<h2 class=\"gb-headline gb-headline-e00aa08b gb-headline-text\">What Can Be Uncovered in Computer Forensic Investigations<\/h2>\n\n\n\n<p>We can recover electronic evidence during a computer forensic investigation from the following types of devices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hard Drives<\/li>\n\n\n\n<li>Back-up Storage Media<\/li>\n\n\n\n<li>Databases<\/li>\n\n\n\n<li>E-mail Servers<\/li>\n\n\n\n<li>Web Servers<\/li>\n\n\n\n<li>Internet Sites<\/li>\n\n\n\n<li>Smart Phones<\/li>\n\n\n\n<li>Digital Cameras<\/li>\n\n\n\n<li>Zip Drives<\/li>\n\n\n\n<li>Fax and Copy Machines<\/li>\n\n\n\n<li>Digital Answering Machines<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-8d6d7814\"><div class=\"gb-container gb-container-8d6d7814\">\n\n<figure class=\"gb-block-image gb-block-image-bd9bca6a\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1200\" class=\"gb-image gb-image-bd9bca6a\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigations.jpg\" alt=\"Computer forensic investigations and spoilation of evidence\" title=\"computer forensic investigations\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigations.jpg 1800w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigations-300x200.jpg 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigations-1024x683.jpg 1024w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigations-768x512.jpg 768w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigations-1536x1024.jpg 1536w\" sizes=\"auto, (max-width: 1800px) 100vw, 1800px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-fbb7b2c0\">\n<div class=\"gb-container gb-container-66d28775\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-9e61b739\">\n<div class=\"gb-grid-column gb-grid-column-ad62bb1a\"><div class=\"gb-container gb-container-ad62bb1a\">\n\n<figure class=\"gb-block-image gb-block-image-d82f9281\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"546\" class=\"gb-image gb-image-d82f9281\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation.jpg\" alt=\"computer forensic experts\" title=\"computer forensic investigation\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation.jpg 800w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation-300x205.jpg 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/computer-forensic-investigation-768x524.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-be7dffcc\"><div class=\"gb-container gb-container-be7dffcc\">\n\n<h2 class=\"gb-headline gb-headline-de232700 gb-headline-text\">Features and Benefits of a Computer Forensic Investigation<\/h2>\n\n\n\n<p><strong>Features<\/strong><\/p>\n\n\n\n<p>Computer Forensics Investigations conducted by licensed private detectives<br>Priority on site data capture allowing your client to begin using the computer in question immediately<br>Court recognized expert forensic investigators<br>All computer forensics experts have extensive experience testifying in court<br>Curriculum Vitae of our experts available upon request<\/p>\n\n\n\n<p><strong>Benefits<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Evidence that frequently cannot even be produced by your opposition is now available to you<\/li>\n\n\n\n<li>Our work product confidentiality is protected by law<\/li>\n\n\n\n<li>Evidence can be collected wherever the computer\/storage device is located and is stored at our location to protect chain of custody<\/li>\n\n\n\n<li>Cost effective evidence collection without parallel<\/li>\n<\/ul>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b437fa15\">\n<div class=\"gb-container gb-container-6d9b8758\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-ba89df08\">\n<div class=\"gb-grid-column gb-grid-column-4eb29dc2\"><div class=\"gb-container gb-container-4eb29dc2\">\n\n<h2 class=\"gb-headline gb-headline-46c88737 gb-headline-text\">Why Choose ASG for Computer Forensic Investigations?<\/h2>\n\n\n\n<p>Our expert computer forensics investigators work in a forensically sound manner, thus preserving the integrity associated with that piece of electronic evidence. As licensed private detectives, we are in a far better position to find evidence than the office I.T. guy or other companies because we already have the investigative knowledge, training, and mindset. We have a multitude of court recognized software programs and tools to employ along with our vast experience in both the technological aspects as well as generally accepted investigation practices. This combination is vital to preventing any corruption of the evidence. Make no mistake, one does not learn how to conduct this type of investigation and become a computer forensic expert in a classroom alone. Microsoft does not certify people to conduct this type of investigation. We are unique and if you end up encountering us in court, you may learn that the hard way.<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-72d8a2d3\"><div class=\"gb-container gb-container-72d8a2d3\">\n\n<figure class=\"gb-block-image gb-block-image-c32ecd4a\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" class=\"gb-image gb-image-c32ecd4a\" src=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1.png\" alt=\"ASG Investigations - leading private investigation agency\" title=\"asg-transparent-logo-1\" srcset=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1.png 500w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1-300x300.png 300w, https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/asg-transparent-logo-1-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Contact Us<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-738","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Expert Computer Forensics Investigators - ASG Investigations<\/title>\n<meta name=\"description\" content=\"Expert Computer Forensics Investigators providing computer forensics, cell phone forensics and expert testimony in computer forensic cases\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Computer Forensics Investigators - ASG Investigations\" \/>\n<meta property=\"og:description\" content=\"Expert Computer Forensics Investigators providing computer forensics, cell phone forensics and expert testimony in computer forensic cases\" \/>\n<meta property=\"og:url\" content=\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Attorney Services\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-15T18:01:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/\",\"url\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/\",\"name\":\"Expert Computer Forensics Investigators - ASG Investigations\",\"isPartOf\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg\",\"datePublished\":\"2023-03-05T15:02:03+00:00\",\"dateModified\":\"2023-04-15T18:01:23+00:00\",\"description\":\"Expert Computer Forensics Investigators providing computer forensics, cell phone forensics and expert testimony in computer forensic cases\",\"breadcrumb\":{\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#primaryimage\",\"url\":\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg\",\"contentUrl\":\"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg\",\"width\":300,\"height\":200,\"caption\":\"Channel Checking Investigations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/asginvestigations.com\/attorney-services\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Expert Computer Forensics Investigators\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/asginvestigations.com\/attorney-services\/#website\",\"url\":\"https:\/\/asginvestigations.com\/attorney-services\/\",\"name\":\"Attorney Services\",\"description\":\"Expert Private Investigators for surveillance &amp; background checks\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/asginvestigations.com\/attorney-services\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Expert Computer Forensics Investigators - ASG Investigations","description":"Expert Computer Forensics Investigators providing computer forensics, cell phone forensics and expert testimony in computer forensic cases","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/","og_locale":"en_US","og_type":"article","og_title":"Expert Computer Forensics Investigators - ASG Investigations","og_description":"Expert Computer Forensics Investigators providing computer forensics, cell phone forensics and expert testimony in computer forensic cases","og_url":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/","og_site_name":"Attorney Services","article_modified_time":"2023-04-15T18:01:23+00:00","og_image":[{"url":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/","url":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/","name":"Expert Computer Forensics Investigators - ASG Investigations","isPartOf":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/#website"},"primaryImageOfPage":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#primaryimage"},"image":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg","datePublished":"2023-03-05T15:02:03+00:00","dateModified":"2023-04-15T18:01:23+00:00","description":"Expert Computer Forensics Investigators providing computer forensics, cell phone forensics and expert testimony in computer forensic cases","breadcrumb":{"@id":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#primaryimage","url":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg","contentUrl":"https:\/\/asginvestigations.com\/attorney-services\/wp-content\/uploads\/sites\/4\/2023\/03\/Channel-Checking-Investigation-300x200-1.jpg","width":300,"height":200,"caption":"Channel Checking Investigations"},{"@type":"BreadcrumbList","@id":"https:\/\/asginvestigations.com\/attorney-services\/computer_forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/asginvestigations.com\/attorney-services\/"},{"@type":"ListItem","position":2,"name":"Expert Computer Forensics Investigators"}]},{"@type":"WebSite","@id":"https:\/\/asginvestigations.com\/attorney-services\/#website","url":"https:\/\/asginvestigations.com\/attorney-services\/","name":"Attorney Services","description":"Expert Private Investigators for surveillance &amp; background checks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/asginvestigations.com\/attorney-services\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages\/738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/comments?post=738"}],"version-history":[{"count":4,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages\/738\/revisions"}],"predecessor-version":[{"id":1047,"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/pages\/738\/revisions\/1047"}],"wp:attachment":[{"href":"https:\/\/asginvestigations.com\/attorney-services\/wp-json\/wp\/v2\/media?parent=738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}