Computer Forensics

Printable Brochure

Tectonic Energy Consulting Inc. Security Division provides computer/cellular forensics services to both the general public as well as to corporations. One of the key elements in every data forensics procedure is time. Users may unintentionally or inadvertently overwrite evidence simply by continuing to complete their daily tasks. Our specialists will quickly and cost-effectively collect and preserve data or evidence that may have been deleted or become inaccessible through normal computing methods. Our specialists can determine if certain information exists and if so, where it might be located.

We can recover electronic evidence during a computer forensic investigation from the following types of devices:

  • Hard Drives
  • USB Drives
  • Databases
  • Personal Digital Devices (Blackberries and cellular phones)
  • Back-up Storage Media
  • Email Services
  • Digital Cameras and Zip drives
  • Web Services
  • Internet Sites
  • Virtually any Electronic Storage Device

Our computer forensic investigations are conducted in a forensically sound manner, thus preserving the integrity associated with a particular piece of electronic evidence. As licensed private investigators, our IT security team is better qualified to find evidence than the average office IT specialist or other IT companies, as we already have the investigative knowledge, training and mindset. We have a multitude of court-recognized software programs and tools to employ, along with our vast experience in both the technological aspects and generally accepted investigation practices. This combination is vital to preventing any corruption of the evidence.

Our computer forensic investigations experts specialize in conducting an exhaustive, detailed and accurate investigation of information derived from computers around the world for attorneys, businesses and individuals. In addition, you can be assured of our qualifications, since our chief agent is one of very few computer forensics specialists to hold the designations of GCFE, GCFA, GSEC, GISF, as well as Advanced Microsoft Windows Forensics Specialist.

For further information please contact Jim Seweryn at (403) 238-2812.