You are on page 1of 8

Asmostpeoplehavecometorealize,theextraordinarygrowthofthecomputerindustry

has become, at best, a double-edged sword. Unquestionably, advances in computer


technology and the explosion of the Internet have given today's business world
incredible advantages, most notably an era of unprecedented globalization that has
revolutionized the modern marketplace. At the same time, illegitimate and malicious
computeractivityhasbecomeaseriousproblemthatshowsnosignsofslowingdown.
Viruses, system hacking, unsolicited email and countless online frauds have become
someofthemostcommoncrimesontheplanet,andduetotheanonymityandworldwide
reachoftheInternet,thereisonlysomuchthatcanbedonetostemthetide.
Fortunately, you don't have to be a victim. Even virtual crimes leave a trail, and no
firmintheworldcantrackdowndigitalclueslikeKesslerInternational.Foryears,our
computerforensicsstaffhasbeenbringinghigh-techthievestojusticeandprovidingour
clientswithsmartsolutionstoeventheirmostcomplextechnologicaldilemmas.Armed
withanin-depthknowledgeofcomputersystemsandthemostadvancedsoftwareinthe
industry,Kessler'steamofexpertsisacutabovetherest,andthey'llworkdiligentlyto
ensureyoursecurityasweblastthroughtheinformationage.
Message from Michael G. Kessler
"Just as the Internet has opened new doors of opportunity for
business, it has opened the floodgate to crime and abuse.
Studies show that more than 75% of computer systems used by
Fortune 500 companies have recorded some form of unauthorized
use, and the FBI estimates losses from cybercrimes at more than
$10 billion per year. The individuals who commit computer
crimes are very sophisticated, but we make it our business to
stay several steps ahead of them."
- Michael G. Kessler
President & CEO, Kessler International
Ashigh-techcrimecontinuestoproliferate,electronicevidenceisbecominganincreas-
inglycrucialfactorinconvictingsuspectedlawbreakers.Asinglekilobyteofdatacanbe
thedifferencebetweenfreedomandaprisoncell.Clearly,securingthissortofevidence
isacriticalstepinmanymoderncases,butacquisitioncanoftenbeadifficultprocess.
Data can be easily corrupted, and sometimes, simply turning a computer on or off can
destroyvitalinformation.
That's why the job of gathering this information should
belefttoanexperiencedcomputerforensicsspecialist,
andKesslerInternationalhasbeenattheforefrontofthe
industry for years. Our team of computer forensics
experts is specially trained to uncover and preserve
delicate digital evidence that may make or break an
entirecase,evendatathathasbeenpreviouslydeleted
orhidden.Byutilizingadvancedsoftwareandavariety
ofproveninvestigativetechniques,ourtechnicianscan
safelyextractevidencefromalmostanysystem,bringit
tolight,andhelpyouplanacourseofaction.
Sometimes, the equipment that
must undergo examination
cannot be taken off-site and
sent for analysis. Perhaps
the hardware in question
is central to your business
operations, or maybe you
don't want to arouse any
suspicion in the workplace.
That's why Kessler offers
on-site acquisition. We can
conduct evidence searches and
perform recovery services on-
site quickly and discreetly,
so that your business doesnt
miss a single step.
Whether it's a hundred-page thesis, personal financial
recordsorimportantbusinessdata,theinformationthat
residesonyourcomputerornetworkmayverywellbe
thecornerstoneofyourprofessionallife.Unfortunately,
electronic disasters such as viruses, hackers and
power surges can strike without warning, destroying
or corrupting your precious data, and leaving you
feelinghelpless.
But there is good news the highly-trained staff at
Kessler International can recover lost data from almost
anystoragesystemandrestorecorruptedfilesbackto
theiroriginalcondition.Andshouldyouneedassistance
recovering from the calamity, Kessler will help you
getyourbusinessoperationsbackontrackquicklyand
efficiently.
On-Site Acquisition
I! "%e &i#le 'ie&, "&' b%eak-i!& a!d &ec(%i',
b%eache& i!)"l)ed &"e &"%' "f #h,&ical ca#e%i!g, a!d
a! effec'i)e ala% &,&'e *a& (&(all, e!"(gh '"
kee# b(&i!e&& "*!e%& &a'i&fied. The&e da,&, h"*e)e%,
b(%gla%ie& a%e "f'e! c"i''ed f%" %e"'e l"ca'i"!&
i! c"#le'e &ile!ce, a& 'hie)e& a!d hacke%& #illage
(!#%"'ec'edc"#('e%&,&'e&.Maki!ga''e%&*"%&ei&
'he &hee% diffic(l', i! fi!di!g 'he "ffe!de%&, ac$(i%i!g
#e%'i!e!' e)ide!ce, a!d "f c"(%&e, #%e)e!'i!g f('(%e
(!a('h"%i-edacce&&.
Ke&&le%I!'e%!a'i"!al'&c"#('e%c%iee+#e%'&&#eciali-ei!de'ec'i!ghigh-'ech&ec(%i',
b%eache&'ha'ca!daage"%de&'%",,"(%da'a.E#l",i!g'hela'e&''ech!"l"g,,"(%
'ea*ill(!c")e%all'hedi%',de'ail&,l"ca'e'h"&e%e&#"!&iblea!dga'he%'hee)ide!ce
!eeded '" #%"&ec('e 'he '" 'he f(lle&' e+'e!' "f 'he la*. A!d if ,"( *a!' '" kee#
ba!di'&a*a,f%","(%file&#e%a!e!'l,,"(%e+#e%ie!ced'eaca!hel#,"(#%e#a%ea
'a%ge'ed#%e)e!'i"!&'%a'eg,'ha'*ill&ec(%e,"(%&,&'e&a!dgi)e,"('hef%eed","(
!eed'""#e%a'e,"(%b(&i!e&&effec'i)el,.
Ma!, "%ga!i-a'i"!& ha)e &(&#ici"!& "f illici' i!'e%!al
ac'i)i',, b(' fe* k!"* *he%e '" begi! l""ki!g f"%
e)ide!ce, e&#eciall, i! '"da,'& &"#hi&'ica'ed b(&i!e&&
e!)i%"!e!'. Th"%"(ghl, &ea%chi!g c"#('e% &,&'e&
f"% e)ide!ce "f *%"!gd"i!g i& a g""d #lace '" &'a%', b('
a!,i!di)id(al&ha)e!"idea*ha''"l""kf"%,(chle&&
*he%ea!dh"*'"fi!di'.
The&killedi!)e&'iga'"%&a'Ke&&le%I!'e%!a'i"!al%"('i!el,
#e%f"% elec'%"!ic d"c(e!' di&c")e%,, diggi!g (#
#e%'i!e!' da'a 'h%"(gh ca%ef(l e+ai!a'i"! "f c"#('e%
&,&'e&. I!c%ii!a'i!g file& 'ha' *e%e "!ce dele'ed
ca! be %ec")e%ed a!d #%"d(ced a& e)ide!ce, a!d
beca(&e *e adhe%e '" &'%ic' g(ideli!e&, ,"( ca!
%e&' a&&(%ed 'ha' a!, i!f"%a'i"! *e #%")ide *ill be
adi&&iblei!ac"(%'"fla*.
Message from creepyuser101
creepyuser101: i know where
u live, so dont even think
about calling the cops
NotThreatened23: Guess what?
I hired an investigator to
find out who you are and help
put you behind bars!
creepyuser101: >:(
Up until the recent boom in technology, security was
generally a matter of locking up the office, keeping
valuables sealed in a safe, and perhaps hiring a guard
towatchoverthebuildingatnight.Thesedays,however,
complicated computer systems safeguard your assets,
and access is almost always managed through complex
passwords. While this method is usually fairly secure,
passwordscanbelost,forgotten,changedorevenstolen,
andyoumaynolongerbeabletoaccesscriticalsystems
andinformation.
But all is not lost Kessler's team of computer forensics
specialists can recover passwords that you thought
weregoneforgood,allowingyoutoregaincontrolofyour
important data. In addition, we'll go the extra mile and
assist you in devising password strategies and other
security measures so that you'll never be faced with a
similarsituation.
One of the most alluring aspects of
the Internet is the amazing level of
anonymity it affords. Unfortunately, this
also allows many potentially dangerous
individuals to wreak havoc online
without fear of being discovered.
Cyberstalking, annoying or harassing
emails, junk mail flooding, viruses and
personal threats make many victims'
lives miserable, and aside from filing a
complaint with their Internet provider,
there'susuallynotmuchtheycando.
Fortunately,weknowhowtotrackdowncyber-terroristsandputanendtotheirhigh-tech
harassment.Byutilizingadvancedemailtracingsoftwareandtechniques,ourcomputer
forensicsteamcanfindoutwhoisresponsibleforthetormentandbringthemtojustice.
Kessler International will help you obtain the evidence you need, using time-tested
procedures to ensure the integrity of the information. Our expert witnesses can then
takethestandincourtanddeliverstraightforward,compellingtestimonythatwillclarify
theevidencepresentedandlendsubstantialcredibilitytoyourcase.
While email and the Internet may provide your business
with unprecedented levels of communication and market
outreach, it can also leave your company wide open
to modern risks. For instance, your company is legally
liable for all electronic correspondence sent through
your system, including email, instant messages, web
postings and more. In addition, unchecked employees
may distribute confidential or proprietary files through the
Internet, or put your company in jeopardy by accessing
illegalcontent.
KesslerInternationalunderstandsthenumerousrisksthat
corporations face, and our computer forensics experts
canhelpyoucontrolyourlevelofsusceptibilityandavoid
costly lawsuits. We'll help you develop procedures that
will hold employees responsible for the information they
transmit,reduceabuseofcompanysystems,andprevent
thelossofintellectualpropertyandtradesecrets.
Sometimes, piecing together a case can be extremely
difficultacquiringevidence,presentinginformationintheright
fashion and locating credible witnesses may turn
out to be tougher tasks than you expect. And when
computers are introduced to the mix, things often become
considerably more challenging. Evidence obtained from
computer systems can be easily corrupted, and must be
gathered in an extremely precise, controlled fashion to be
admissible in court. In addition, such evidence often needs
to be supported by expert witnesses that can explain and
demonstratecomplicatedtechnicalissues.
Intodaystechnology-drivensociety,computersarethebackbone
of almost every business. All over the world, companies rely on
intricate computer systems to manage many of their day-to-day
operations,andmostarefacedwithsecurityrisks,incessantjunk
mail and seemingly irreparable technical issues. Thats why it
paystohaveanexperiencedcomputerforensicsspecialistonyour
side, providing impeccable service and solving even your most
complicatedtechnologicalproblems.
Kessler International has been the global leader in the field of
computerforensicsformorethanadecade.Ourteamofexperts
combinesexperience,integrityandworldwidepresencetoprovide
our clients with the most professional service possible. From
electronicevidencegatheringtodatarecovery,fromNewYorkto
HongKong,ourstaffcanmeetyourneedsandconsistentlygive
youresultsthatareprecise,accurateandcomplete.
If youre in need of a computer forensics expert, dont settle for anyone but the best.
Kessler International is renowned throughout the world for unbeatable results and the
highest level of integrity, which is reflected in the quality of our work and the enduring
relationshipswithourclients.Ourglobalreachensuresthatnocaseistooremote,and
that no matter where you are, our team can be at your side helping you overcome the
hurdles of modern business. Kessler is simply the most respected, experienced and
professionalcomputerforensicsfirmintheworld,andnothingmeansmoretousthanthe
satisfactionofourclients.Thatsourpromise.ThatsTheKesslerDifference.
Experience, Integrity & Worldwide Presence
Phone: 212.286.9100
Toll Free: 800.932.2221
Fax: 212.730.2433
Email: mail@investigation.com
www.investigation.com
World Headquarters
45 Rockefeller Plaza
20th Floor
New York, NY 10111
Offices Worldwide
Copyright 2004 by Kessler International

You might also like