Loading...

Computer Forensics Experts

Technical Resource Center is a full-service Computer Forensics Investigation Lab.
We assist attorneys, corporations, and individuals with computer evidence collection, investigations, and data recovery. We have locations in Los Angeles, Orlando, and Atlanta and provide services throughout the United States.

Services

Our team of dedicated specialists looks forward to assisting you with your Computer Forensics and Cell Phone Investigations, as well as your e-Discovery, Expert Witness, Data Recovery, and Evidence Preservation needs. We are experts in the following investigations and services:
  • Computer Forensics Investigations

    Computer Forensics combines the fields of Computer Science and Law. Our experts can preserve, analyze, and report on the digital evidence found on computer hard drives, USB devices (thumb drives and external hard drives), online data storage (i.e. Dropbox, Google Drive, and OneDrive), and online email services (i.e. Gmail and Yahoo email).

    Details
  • Cell Phone Forensics Investigations

    Cell Phone or Mobile Device Forensics consists of the extraction, preservation, analysis, and reporting of data located on mobile devices in a forensically acceptable and court approved process. TRC can examine more than 15,000 different types of cell phones including the most popular phones on the market, iPhone and Android-powered smartphones.

    Details
  • e-Discovery

    The duty to preserve Electronically Stored Information (ESI) begins when litigation is reasonably anticipated. TRC has the unique advantage of having worked on behalf of both plaintiffs and defendants and of having served as a Neutral Expert for the Court on multiple Electronic Discovery cases. Ask about our distinctive process known as “Forensics e-Discovery.”

    Details
  • Expert Witness Services

    Our Lab Director, Neil Broom, has been appointed to the Los Angeles Superior Court Panel of Expert Witnesses for Computer Forensics. Mr. Broom has been qualified as an Expert Witness multiple times in state and federal courts, in civil as well as criminal cases. Neil is also the co-author of the book “Computer Forensics Jumpstart” and has trained over 3,000 students in Computer Security and Forensics.

    Details
  • Evidence Preservation

    At times, simply preserving evidence for potential future litigation may be all that is necessary. TRC specializes in large collections (over 50 computers) but can assist with any size forensics preservation. Windows based computers, Apple Mac devices, and mobile devices (cell phones and tablets) can be collected, forensically preserved, and returned to service quickly and professionally.

    Details
  • Data Recovery

    Corrupted Operating System? Deleted photographs? Lost data? Our technicians can restore data from damaged computer hard drives, cell phones, and USB devices and get you back to work quickly. Data Recovery can be a cost effective method to restore damaged devices as opposed to recreating business data and sometimes it can be the only solution to recover the lost memories found in deleted photos.

    Details

Frequently Asked Questions


If you have any questions, please do not hesitate to contact us.

Computer Forensics FAQs


What is Computer Forensics exactly?

Computer Forensics is the use of specialized techniques for the preservation, identification, extraction, authentication, examination, analysis, interpretation and documentation of digital information. Computer forensics comes into play when a case involves issues relating to the reconstruction of computer system usage, examination of residual data, authentication of data by technical analysis or explanation of technical features of data and computer usage. Computer Forensics requires specialized expertise that generally goes beyond normal data collection and preservation techniques available to end-users or system support personnel.

What is a Chain of Custody / Chain of Evidence?

Chain of custody is the record of the custodial history of evidence.

Chain of Evidence or authentication is the record of the collection, processing and analysis of digital evidence. It proves that the presented evidence is unequivocally derived from the acquired digital information.

What is a Forensics Image?

A forensic image (sometimes called a forensic copy) is an exact bit-by-bit copy of a digital device (hard drive, USB device, cell phone, etc.) including active data, slack space, unallocated space (or unused space). We use court approved, forensic tools for making these images. Our tools produce authentication information, called a hash value, to ensure the integrity of the image.

What is a hash value?

A hash value, commonly referred to as an MD5, SHA-1, or SHA-256 hash (based on the algorithm used to produce the hash) is used to authenticate digital evidence.

MD5 Hash Example: e6196e1b4f0d1535244eaab534428542

A hash value is a mathematical algorithm produced against digital information (i.e. a file, a physical disk, or a forensics image) thereby creating a digital fingerprint for that information. It is by purpose a one-way algorithm and thus it is not possible to change digital evidence, without changing the corresponding hash values. In other words, if the hash value of a file has not changed, the file itself has not changed.

How do I change my custody and support orders?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

How to make a General Diary?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

Mobile Forensics FAQs


How do I protect a business name?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

Why, how, where do we need to keep corporate records?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

Should I incorporate my business?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

What are the steps in selling my business?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

What are the steps in selling my business?

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

What certifications and licenses does Technical Resource Center's staff possess?

Certifications:
CCE - Certified Computer Examiner - International Society of Forensic Computer Examiners (ISFCE)
CISSP - Certified Information Systems Security Professional - International Information System Security Certification Consortium (ISC)²
CFE - Certified Fraud Examiner - Association of Certified Fraud Examiners (ACFE)
CHFI - Computer Hacking Forensic Investigator - EC Council
CEH - Certified Ethical Hacker - EC Council
EnCE - EnCase Certified Examiner - Guidance Software
ACE - AccessData Certified Examiner - AccessData Group
Certified ProDiscover Examiner Instructor - Technology Pathways
Certified XRY Physical Mobile Phone Examiner - MSAB

Licenses:
Licensed CA Private Investigator #28170
Licensed GA Private Detective Agency #PDC002261
Licensed GA Private Detective #PDE047488

Case Types


Technical Resource Center has over 15 years of experience working the following types of cases:

icon
personal cases

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum fringilla sem ut nisl auctor, sit amet auctor tortor mollis. Aliquam nibh elit, tincidunt sit amet orci ac, pellentesque pretium mi.

icon
Business Cases

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum fringilla sem ut nisl auctor, sit amet auctor tortor mollis. Aliquam nibh elit, tincidunt sit amet orci ac, pellentesque pretium mi.

icon
Criminal Defense

We have the experience and knowledge to conduct an impartial review of the evidence in your case to assist your attorney in making critical legal decisions.

OUR EXPERT


We are a full service Computer Forensics Investigative firm.

Neil Broom
Computer Forensics Expert

Lab Director

Contact us

We look forward to hearing from you...