Computer Forensics Investigation

Computer Forensics Investigation: You need a leader in high technology crime solutions that’s licensed to practice investigations. Many times we have to correct the mistakes of misled IT technicians and ill-equipped users. In our computer crime lab we take Forensics science to a new level. M-R GROUP is your friend in the Digital Age.

M-R GROUP provides highly technical Internet crime investigations and computer usage analysis. Many services are offered under the name Computer Forensic Investigation Services. By using highly certified network and computer engineers, specially trained private investigators, and forensic technicians and scientists, M-R GROUP can conduct an extrapolation of data. Whether it be via remote session or an on-site investigation, M-R GROUP will efficiently resolve your computer Forensics needs.


Our mission serves both the corporate and domestic clientele with integrity as a quality high technology crime recovery company. We demonstrate excellence in the field of digital evidence processing and analysis, by consistently exceeding our customers’ expectations and demonstrating the highest character in the examination of information.

Forensic Data Recovery is the science of recovering information from a computer that may have been deleted or otherwise damaged or hidden.

Some data recovery firms have qualified forensic examiners. However, the majority do not. While some of the same skills and software are used in both computer Forensics and data recovery, computer Forensics require extensive additional knowledge and experience.


Our technicians are highly trained specialists in the use of advanced forensic, analytical and recovery techniques for reconstruction and preservation of data. We can examine desktop computers, laptops, network servers, handheld PDAs, digital cameras, memory cards, floppy and Zip disks, as well as most other forms of media and data storage.

Our labs are capable of retrieving data from Windows, Apple/Macintosh, Unix, Linux, Novell, and most other computer operating systems along with interstate Internet and E-mail communications.

Expert consultants are available for both the prosecution and defense.

Our expert consultants are available 365 days per year, to travel to any location worldwide, to assist and advise you with your high tech issues. If your project or organization has a requirement for our consultants, please contact us and we will send you an information pack containing specifications, rates, and terms of service.

Recovered data may show which particular files were deleted or removed and is a valuable insight into what the person was trying to do at the time of the deletion.

Computer Forensics is the scientific examination and analysis of data held on or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law.

The subject matter includes:

  • Secure collection of computer data

  • Examination of suspect data to determine details such as origin and content

  • Presentation of computer-based information to courts of law

  • Application of a country’s laws to computer practice.

Items that relate to this service:

  • Cyber Sabotage
  • Risk Assessments and Audits

  • Corporate Intelligence

  • Network Intrusions

  • Digital Evidence Examination

  • Recent Internet History Evaluations

  • Internet Crime & Fraud Investigations

  • Forensic Technology Services

  • Track and Resolve Computer Intrusions (Hacking)

  • Keystroke logging & recording

  • Cyber Stalking Investigations and Cyber Harassment Investigations

  • Detection and Disabling of Unauthorized Terminal Capture Program

  • Computer Surveillance

  • Identification of Hidden Locations Where Files are Created

  • Recovery of Deleted Data

  • Child Enticement

  • Internet Fraud

  • Tracing Pornography

  • Privacy Violations

  • Email Recovery

  • Virus Removal

  • E Computer Crimes

  • Chat Room and Instant Message Tracing

  • Child Pornography

  • Computer Forensics to Recover Instant Messenger Messages

  • Internet Service Providers

  • Internet Profiling

  • Online Fraud

  • Stalker and Harassment

  • Litigation Support and Expert Witness Testimony

  • Covert and Undercover Assignments

Case Type Difficulty

  • Effort: Apex Investigation

  • Duration: 3-14 Days

A consultation for this investigation type may request the following information:

  1. What is your role?

  2. When was the problem first suspected?

  3. Does the subject use a PDA or Cell Phone?

  4. How many computers are in question?

  5. Do you have “Broadband” internet access? (DSL/CABLE/T1/OC12)

  6. Are you aware of any encryption or passwords in use?

  7. What is the operating system of the suspect computer?

  8. Will you need these services on a regular or recurring basis?

  9. By what date do the services need to be complete?

  10. Do you know if “chain of custody” has been preserved?

  11. Do you use VoIP? (Vonage/XO/Other)

  12. Does the subject use IM, Chat or Email?

  13. Please list any websites, social networking sites, enthusiast group, online games (MMOs) or forum sites the subject is known to have used or currently uses: (ie. Facebook, Google+, Twitter, LinkedIn, Pinterest, Tumblr, Instagram or any online gaming platforms such as World of Warcraft, WhatsApp, Handcent or other chat applications.)

  14. Will the results of this investigation be used in a court of law?

  15. What are you trying to accomplish with this effort?

  16. If you used a search engine to find us, please type the keywords here:

  17. Could someone’s employment be affected adversely from the results of this investigation?

  18. Please understand that the funding for your case may vary depending on the complexity. So that we may help you, what range of funding would you estimate to be affordable for this matter?