Optional Info

Sidebar image descriptionAny information can be placed in the sidebar to help your website visitors navigate your site.

To make a boxed heading like the one above, simply apply the H3 tag.

To make a box like this, assign the "sidebarlt" class.

You can do anything with a sidebar box. Insert images, ads or other web content.

Here's a text link.

To make a box like this, assign the "sidebardk" class.

You can do anything with a sidebar box. Insert images, ads or other web content.

Here's a text link.


Confidentiality Guaranteed

We also understand that the prospect of hiring a private investigator may be uncomfortable to some. You have our guarantee that no matter what your situation involves, we will listen to you and give you a detailed explanation of how we can help. A consultation with a private investigator is free and strictly confidential.

If you have a case in an area where we are not able to provide you with service, we would be more than happy to give you a complimentary referral to another private investigator that can assist you.

Bluegrass Private Investigations is highly trained in the art of Investigation and Surveillance. This training, combined with our diligence, work ethic and integrity, offer you the best service and the best results.

Computer Forensics

Electronic Data Discovery (EDD)
Complete Forensic Investigation Service
Incident Responses & Forensics
Forensic Processing of Computer Evidence
Regulatory Support

We have extensive experience with firewalls, routers and global TCP/IP, based networks. We are experts in all versions of Windows, including, Windows NT, Windows 2000 Professional and Server, XP, etc., along with Unix, Linux and Solaris.

We also have extensive experience working with corporate attorneys, outside counsel, internal investigative staff, federal, state and local law enforcement.

Unlike some of our competitors, our computer forensics consultants are employees. We DO NOT outsource to consultants to process computer evidence. Also, our experts are leaders in the field of computer forensic science.

Electronic Data Discovery (EDD)

Recent surveys confirm that more than 90 percent of all documents produced since 1999 were created in digital form.

Document & File Discovery

Bluegrss Private Investigations offers the ability to locate and recover previously inaccessible documents and files through computer forensic processes. We assist your pre-trial disclosure of pertinent facts or documents by one or both parties to a civil action or proceedings.

Preservation of Evidence

You can entrust us with your electronic media safe in the knowledge that we will use the highest standards and methodologies to protect and preserve the original media.

We follow a strict carefully developed set of procedures that address security, authenticity and chain-of-custody of the original media. We teach Law Enforcement how to preserve digital data, and our information on this was said to be one of the books strengths (by several reviewers) so our methodology is sound.

Data Recovery & Analysis

We have conducted forensics around the globe and our data recovery services have been used to help some of the world's largest companies. Our computer forensic experts work side by side with your staff and may access data storage devices using recovery and analysis tools and techniques in an attempt to recover active and deleted data from inaccessible media and deleted files, including email. Our computer forensic experts retrieve data from virtually all storage media and operating systems, including Windows 2000/XP, UNIX, Linux and Solaris.

Analysis of User Activity

We will provide reports on all user activity including, but not limited to, electronic mail, Internet and Intranet files accessed, files created and deleted, and user access times.  We can also provide analysis of corporate server and gateway logs.

Password Protected Files

We use several state of the art tools and techniques to access password protected files and hard drives. We do not rely on just one tool, we use many! This is one of our strengths and we would be happy to discuss this more, just give us a call.

Expert Reporting

Our reports provide a detailed depiction of the breadth and scope of our analysis that can be customized to meet your needs. Once our data analysis is complete, our computer forensic experts will furnish detailed reports about the data collected and produced to support the case. Computer Forensic Services finishes the project by producing the data collected in a readable format. Typically, the data can be provided in a format that you select (electronic, printed or a combination of both). We can also provide the reports so that you can view them with Web browser.

We also will print data to hard copy or import it to an existing litigation support database upon request.

Top of Page

 

Complete Forensic Investigation Service

If your company requires an investigation staff, but your budget can not afford all the related expenses for salaries, benefits, equipment, training, etc. we can help. Our contracted costs are lower than the cost of an in-house staff.

Our principles have over decades of experience in cyber investigations and forensics in both law enforcement and fortune 50 companies.

Services include, but are not limited to:

  • Two-day planning session
  • Personalized customer guide
  • 24-hour emergency response
  • On-site support
  • Weekly proactive investigative service included, AT NO EXTRA COST, in yearly contract
  • Cyber forensic investigative services
  • Hostile workplace allegations
  • Theft of trade secrets/intellectual property
  • Employee Fraud
  • Post mortem, with recommendations

Top of Page

 

Incident Responses & Forensics

CLIENTS ONLY access to 24x7 phone support and response.  Contact us today before an incident happens.

Incident response service includes developing and refining clients' internal crisis management processes, providing emergency response support, distributing threat and vulnerability advisories, and assistance in cyber crime prevention and/or litigation. In addition, Computer Forensic Services provides consulting services during an incident. Clients receive:

Top of Page

 

Forensic Processing of Computer Evidence

Law Firms

Specializing in:

  • Document and FileDis Recovery
  • Cyber forensic investigative services
  • Copyright Infringement
  • Theft of trade secrets/intellectual property
  • Employee Fraud

Corporations

Services include, but are not limited to:

  • Two-day planning session
  • Personalized customer guide
  • 24-hour emergency response
  • On-site support.
  • Cyber forensic investigative services
  • Hostile workplace allegations
  • Theft of trade secrets/intellectual property
  • Employee Fraud
  • Post mortem, with recommendations

Training

  • Expert training on multiple platforms (UNIX, Windows OS).
  • Demonstration of current methods and tools
  • Hands-on and Onsite training available
  • Visit the Training page for more information

Top of Page

 

Regulatory Support

We have supported many investigations that are regulatory in nature either proactively or reactively.  We work quickly and confidentially to support corporate counsel, outside counsel and audit committees respond to employee complaints.

Proactive

We are used by our customers to image computers of high ranking company officials when they exit the business.

Reactively

When companies want to investigate allegations of regulatory improprieties we have assisted on several occasions in imaging, analysis and production of material.

Audit Committees

We can obviously help in imaging drives (locally or remotely) and searching electronic data at the request of the Audit Committees.

Destruction of Audit Records

Our imaging and storage services can assist in the proactive retention of electronic records.  Our complete forensic processing has assisted in SEC investigations.

Rules Regarding Attorneys

We support attorneys in finding the facts and support them with searching for hard evidence if they have to report something to the company officers or the board.

We can also proactively protect the company by imaging computers and storage of the images for the 5 year retention period.  If someone exits the company calls us to image the computer in case it is required at a later date.

Top of Page

 

Website templates by JustDreamweaver.com -- Copyright © 2010 Bluegrass Private Investigations