1629 K Street NW, Suite 311
|
"When you have eliminated the impossible, whatever remains,
however improbable, must be the truth"
Sherlock Holmes, literary Consulting Detective
Our services include:
|
"Paul Drake" for the following "Perry
Masons"
"Shaddock is a very conscientious and thorough investigator."
"No one gathers evidence and organizes it better for me than
Shaddock."
References |
||||||||||||||||||||||||||||||||||||||||||
High Tech Crime Network
|
Windows, Netware, DOS, Macintosh, Android, Palm, Palmtops, PDAs, Zip dives and other storage media
Some recent cases
Considering the evidence in the conference room to solve a client's case of
computer hacking
We proved that a felony phone threat suspect was innocent
because voice mail was truncated.
We proved an abusive husband forged the signature on
his wife's $100000 Life Insurance Policy,
sold her car without her knowledge, left her a car with bad brakes, contributing
to her fatal accident.
We proved a company owner falsely accused a former employee of
assault,
and created a computer generated voice "phone threat".
Computer ForensicsComputer forensics is the application of computer investigation and analysis techniques for determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, such as theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer specialists can draw on various methods for discovering data that reside in a computer system, or recovering deleted, encrypted, or damaged file information. Any or all of this information may help during discovery, depositions, or litigation |
|
An impartial computer expert who helps during discovery will typically have experience
on a wide range of computer hardware and software. This is especially beneficial when your
case involves hardware and software with which this expert is directly familiar. But
fundamental computer design and software implementation is often quite similar from one
system to another, and experience in one application or operating system area is often
transferable to a new system.
Unlike paper evidence, computer evidence can exist in many forms, with earlier versions
still accessible on a computer disk. Knowing the possibility of their existence, even
alternate formats of the same data can be discovered. The discovery process can be served
well by a knowledgeable expert identifying more possibilities that can be requested as
possibly relevant evidence.
In addition, during on-site premises inspections, for cases where computer disks are not actually seized or forensically copied, the forensics expert can more quickly identify places to look, signs to look for, and additional information sources for relevant evidence. These may take the form of earlier versions of data files, such as memos and spreadsheets, which still exist on the computer's disk or on backup media, or differently formatted versions of data, either created or treated by other application programs.
Protection of evidence is critical
A knowledgeable computer forensics professional will ensure that a subject computer system is carefully handled to ensure that:
|
ProceduresThe computer forensics specialist will take several careful steps to identify and attempt to retrieve possible evidence that may exist on a subject computer system:
|
|
Applications of Computer ForensicsMany types of criminal and civil proceedings can and do make use of evidence revealed by computer forensics specialists:
|
Where Can Clues Be Found?
|
|
Computer Forensic ToolsEncaseBasic WinZip TechniqueNorton UtilitiesCaller Id Spoof Awareness |
|
Special storage device enables contents of seized hardware to be recorded without changing the contents |
CICorporation.US
|
Recording data on CD enables the user to continue to use his or her computer during the investigation. |
High Tech Crime Network
|
|||||||||||||||||
National Forensic Center17 Temple Terrace Locating Expert Witnesses and Litigation Consultants Nationwide |
|||||||||||||||||
EnCase
|
EnCase Forensics Tools
|
||||||||||||||||
We assist Dr. Lawrence Farwell
|
|||||||||||||||||
Truth & Justice Foundation |
|||||||||||||||||
Enlightened Sentencing Project |
|||||||||||||||||
National Association of
Investigative Specialists
|
|||||||||||||||||
High Technology Crime Investigation Association |
|||||||||||||||||
U.S. Secret ServiceBest Practices for Seizing Electronic Evidence |
|||||||||||||||||
|
Department of DefenseComputer Forensic Laboratory - DCFL |
||||||||||||||||
Leon Demsky, Esq.Attorney at Law, Arlington VADemskyLaw.com |
|||||||||||||||||
Ian A. Williams, Esq.Attorney at Law, Washington DCIanWilliamsLaw.com |
|||||||||||||||||
Robert Stone, Esq.Attorney at Law, Arlington and WashingtonBobStoneLaw.com |
|||||||||||||||||
Metropolitan Detective Agency |
|||||||||||||||||
|
MDBInternational.com |
||||||||||||||||
EnCase CertificationThe recognized leader in computer investigation certification |
|||||||||||||||||
AccessData
|
|||||||||||||||||
MaresWare
|
Certifications of Dan Mares
|
||||||||||||||||
|
ContentWatch.com - free content auditThere are a number of ways objectionable material can find its way onto your computer without your knowledge or permission. Some of the most common ways are through receiving email, and intentionally or accidentally accessing inappropriate websites. This tool can help you avoid wrongful accusation. |
||||||||||||||||
HackerWatch.Org |
|||||||||||||||||
International Association for Cryptologic Research |
|||||||||||||||||
Symantec Security Consultants |
|||||||||||||||||
|
SpyWare |
||||||||||||||||
MaresWare.com - useful utilities |
|||||||||||||||||
|
WrongfulConvictions.org
|
||||||||||||||||
Paul J. RileyAttorney at Law, Washington DC |
|||||||||||||||||
Ken KleinAttorney at Law, Washington DC |
|||||||||||||||||
Ken Ketterhagen, Esq.Attorney at Law, Fairfield, IA 52556
|
|||||||||||||||||
|
Robert Shaddock, Esq.
|
||||||||||||||||
Brandon Nelson, Esq.Attorney at Law, Fairfield IA |
|||||||||||||||||
Scott SexauerAttorney at Law, Springfield VA |
|||||||||||||||||
CourtTV.com |
|||||||||||||||||
|
Computer Instructors CorporationFACES and other computer software training |
||||||||||||||||
Dr. Joseph Bell Edinburgh, Scotland doctor and instructor of surgery of the late 1800's whose amazing powers of observation and deduction were Sir Arthur Conan Doyle's inspiration for the Sherlock Holmes stories. Dr. Bell helped Scotland Yard to stop Jack the Ripper |
|||||||||||||||||
http://www.paraben-forensics.com
|
|||||||||||||||||
GlobalSat DG-100
|
Vehicle tacking services We place a device and provide a report of the whereabouts. |
||||||||||||||||
Domain-history.domaintools.com
|
You can get some clues from previous web sites | ||||||||||||||||
911Investigators.com
Investigating the Biggest Murder Mystery in American History |
|||||||||||||||||
Sherlock Holmes Rick has read
all
60 stories |
"I'm a consulting detective. I invented the job"
Sherlock Holmes