hard-drive.jpg
 

20+ years of law enforcement & technology experience

investigations + computer forensics

 

Blue Line Forensics delivers a combination of expert investigative, forensic and computer technology skills creating a dynamic environment which allows us to professionally and thoroughly meet the needs of our clients. We serve clients nationwide!

 


With more than 20 years of law enforcement and computer technology experience, our staff recognizes the need for effective service and thorough documentation.  A relentless drive for perfection empowers our staff to view their work as a passion rather than simply a “job”.  


Our motto is “if it’s there . . . we will find it”.  The combination of expert investigative, forensic and computer technology skills on our staff creates a dynamic environment which allows us to professionally and thoroughly meet the needs of our clients.


Technology

A variety of application packages are utilized to assure the most thorough exam possible.  Constant research of new applications and periodic upgrades to our software and hardware keep us on the cutting edge of computer forensics technology. 


Customer satisfaction is our number one priority. We focus on the continued training and development of our staff to ensure this priority is upheld. Additionally, our equipment is benchmarked against that of several law enforcement agencies to verify that we do have the best product available.

 

Need more info? Feel free to call or complete this form. We'll respond within 24 hrs. 

Attorney Services

Our staff can assist with any litigation or case where a computer was used to store any type of electronic documents. This includes documents, spreadsheets, databases, internet history, photos and any other type of computerized information.

Often files are deleted when a lawsuit is on the horizon. Those deleted files can be restored as long as they have not been overwritten. We can assist you in documenting all relevant files on the computer and present the information in a variety of formats. All files can be saved and stored off to a CD or DVD depending on the size of the files. If the files exceed the size of a DVD we can also put the files on a hard drive at your request.

We employ proven techniques for recovering passwords. If a password is lost or forgotten we can help.

Let us help to ensure that you get all the information from the computer during discovery. Often information is intentionally deleted or hidden to conceal assets. Our staff can forensically examine the computer to verify you get the most for your client.

The possibilities are not limited to your clients. Our trained staff can also assist with internal investigations.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions.


MCLE Training - California MCLE
Minimum Continuing Legal Education

Equip your firm to save clients thousands of dollars by learning:

 •What is Computer Forensics and How Can It Help my Case?

   -Avoid costly discovery motion practices.

   -Gather and preserve the right data at the right time using early discover planning tools.

   -Avoid the traps of improperly identifying, preserving, or mishandling computer data.

 •The Steps of a Forensic Exam.

   -Know how information is gathered and chains of custody are preserved.

   -Observe a live exam demonstration.

 •How to Write Depositions and Declarations that Target Computer Functionality.


Participants can see what an evidentiary image looks like and will understand unallocated space, slack space, and where deleted data resides. Additionally, participants will learn tips on how to formulate reasonable discovery requests and how to successfully challenge unreasonable ones.

This training focuses on a variety of practical material including:

  •  Understanding technology and the terminology of e-discovery
  •   Learn how forensics experts find hidden data.
  •   Ensure that collected data is admissible.
  •   Avoid collecting too much or too little data.
  •   How to protect clients from sanctions for inadequate preservation efforts.
  •   How to identify data needed to support the case.
  •   How to manage e-data once gathered.
  •   Find deleted images and emails

* Learn what computer evidence may be used for:

 a. Child Pornography

 b. Adult Pornography

 c. Financial Fraud

 d. Illegal Software

 e. Illegally Downloaded Movies or Music

 f. File date and time stamps.

 g. Meta Data

     i. What is meta data?

     ii. Where can meta data be found? (Word, Excel)

     iii. What does it contain?

 h. Computer Network Intrusions

 i. Internal Network Intrusions


Prosecutors & Law Enforcement

With our many years of law enforcement and computer experience our staff can assist you in acquiring data from all forms of electronic media. We can assist in all cases where a computer, cell phone or PDA was used. Our staff is experienced in preparing packages for court that provide a complete picture of the crime.

We have investigated many high profile crimes including crimes against children. Our experience ensures that you will you get a clear, concise report of the evidence found in a format ready to add to your case.

Frequently evidence is challenged because the chain of custody is broken. Our professional, law enforcement background makes us experts in this area. We will verify the chain of custody remains intact and not allow the evidence to become tainted. We use proven forensic techniques to make sure your evidence is credible.

Now more than ever cell phones and PDAs are in use by an ever growing number of people. These devices can contain valuable information that can lead to a successful prosecution.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions.


Private Investigators

Email, Instant Messaging, and web site history can all provide valuable information to help you solve your case more quickly. We can assist in the examination of any computer media to uncover additional evidence.

One such example is examining the computer where infidelity is an issue. We can search the computer for any indication of an affair. Often times email is used to keep things quiet.

Additionally, we can assist parents or spouses in examining home computers where suspicion of illicit activities exists.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions


Corporations

Frequently files are accidentally or intentionally deleted by employees. When this occurs, we can assist in recovering files, provided the files have not been overwritten.

Passwords are frequently lost, misplaced or are no longer accessible. We can assist you by determining what password was used in order to allow access to the data.

Our staff can assist with matters involving crime or corporate espionage. Examination of computer evidence can reveal numerous inappropriate activities. We can help identify these activities.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions.

women-phone.jpg

Today, cell phones and PDAs are fundamental tools in our professional and personal lives.  These devices, with their ever growing list of capabilities, are an excellent source of information. 

Our team can retrieve a variety of information from cell phones and PDAs based on the make and model of the device.  This includes but is not limited to:

  • Contact information
  • Dialed and received calls
  • Calendar entries
  • Photographs
  • Internet history
  • User name and passwords

As a result, cell phones and PDAs have the potential to provide a wealth of information.  Our dedicated team can examine these devices and present the data in a relevant format.

Please fill out whatever information you have on the person you are searching in the spaces below: