has become, at best, a double-edged sword. Unquestionably, advances in computer
technology and the explosion of the Internet have given today's business world incredible advantages, most notably an era of unprecedented globalization that has revolutionized the modern marketplace. At the same time, illegitimate and malicious computeractivityhasbecomeaseriousproblemthatshowsnosignsofslowingdown. Viruses, system hacking, unsolicited email and countless online frauds have become someofthemostcommoncrimesontheplanet,andduetotheanonymityandworldwide reachoftheInternet,thereisonlysomuchthatcanbedonetostemthetide. Fortunately, you don't have to be a victim. Even virtual crimes leave a trail, and no firmintheworldcantrackdowndigitalclueslikeKesslerInternational.Foryears,our computerforensicsstaffhasbeenbringinghigh-techthievestojusticeandprovidingour clientswithsmartsolutionstoeventheirmostcomplextechnologicaldilemmas.Armed withanin-depthknowledgeofcomputersystemsandthemostadvancedsoftwareinthe industry,Kessler'steamofexpertsisacutabovetherest,andthey'llworkdiligentlyto ensureyoursecurityasweblastthroughtheinformationage. Message from Michael G. Kessler "Just as the Internet has opened new doors of opportunity for business, it has opened the floodgate to crime and abuse. Studies show that more than 75% of computer systems used by Fortune 500 companies have recorded some form of unauthorized use, and the FBI estimates losses from cybercrimes at more than $10 billion per year. The individuals who commit computer crimes are very sophisticated, but we make it our business to stay several steps ahead of them." - Michael G. Kessler President & CEO, Kessler International Ashigh-techcrimecontinuestoproliferate,electronicevidenceisbecominganincreas- inglycrucialfactorinconvictingsuspectedlawbreakers.Asinglekilobyteofdatacanbe thedifferencebetweenfreedomandaprisoncell.Clearly,securingthissortofevidence isacriticalstepinmanymoderncases,butacquisitioncanoftenbeadifficultprocess. Data can be easily corrupted, and sometimes, simply turning a computer on or off can destroyvitalinformation. That's why the job of gathering this information should belefttoanexperiencedcomputerforensicsspecialist, andKesslerInternationalhasbeenattheforefrontofthe industry for years. Our team of computer forensics experts is specially trained to uncover and preserve delicate digital evidence that may make or break an entirecase,evendatathathasbeenpreviouslydeleted orhidden.Byutilizingadvancedsoftwareandavariety ofproveninvestigativetechniques,ourtechnicianscan safelyextractevidencefromalmostanysystem,bringit tolight,andhelpyouplanacourseofaction. Sometimes, the equipment that must undergo examination cannot be taken off-site and sent for analysis. Perhaps the hardware in question is central to your business operations, or maybe you don't want to arouse any suspicion in the workplace. That's why Kessler offers on-site acquisition. We can conduct evidence searches and perform recovery services on- site quickly and discreetly, so that your business doesnt miss a single step. Whether it's a hundred-page thesis, personal financial recordsorimportantbusinessdata,theinformationthat residesonyourcomputerornetworkmayverywellbe thecornerstoneofyourprofessionallife.Unfortunately, electronic disasters such as viruses, hackers and power surges can strike without warning, destroying or corrupting your precious data, and leaving you feelinghelpless. But there is good news the highly-trained staff at Kessler International can recover lost data from almost anystoragesystemandrestorecorruptedfilesbackto theiroriginalcondition.Andshouldyouneedassistance recovering from the calamity, Kessler will help you getyourbusinessoperationsbackontrackquicklyand efficiently. On-Site Acquisition I! "%e &i#le 'ie&, "&' b%eak-i!& a!d &ec(%i', b%eache& i!)"l)ed &"e &"%' "f #h,&ical ca#e%i!g, a!d a! effec'i)e ala% &,&'e *a& (&(all, e!"(gh '" kee# b(&i!e&& "*!e%& &a'i&fied. The&e da,&, h"*e)e%, b(%gla%ie& a%e "f'e! c"i''ed f%" %e"'e l"ca'i"!& i! c"#le'e &ile!ce, a& 'hie)e& a!d hacke%& #illage (!#%"'ec'edc"#('e%&,&'e&.Maki!ga''e%&*"%&ei& 'he &hee% diffic(l', i! fi!di!g 'he "ffe!de%&, ac$(i%i!g #e%'i!e!' e)ide!ce, a!d "f c"(%&e, #%e)e!'i!g f('(%e (!a('h"%i-edacce&&. Ke&&le%I!'e%!a'i"!al'&c"#('e%c%iee+#e%'&&#eciali-ei!de'ec'i!ghigh-'ech&ec(%i', b%eache&'ha'ca!daage"%de&'%",,"(%da'a.E#l",i!g'hela'e&''ech!"l"g,,"(% 'ea*ill(!c")e%all'hedi%',de'ail&,l"ca'e'h"&e%e&#"!&iblea!dga'he%'hee)ide!ce !eeded '" #%"&ec('e 'he '" 'he f(lle&' e+'e!' "f 'he la*. A!d if ,"( *a!' '" kee# ba!di'&a*a,f%","(%file&#e%a!e!'l,,"(%e+#e%ie!ced'eaca!hel#,"(#%e#a%ea 'a%ge'ed#%e)e!'i"!&'%a'eg,'ha'*ill&ec(%e,"(%&,&'e&a!dgi)e,"('hef%eed","( !eed'""#e%a'e,"(%b(&i!e&&effec'i)el,. Ma!, "%ga!i-a'i"!& ha)e &(&#ici"!& "f illici' i!'e%!al ac'i)i',, b(' fe* k!"* *he%e '" begi! l""ki!g f"% e)ide!ce, e&#eciall, i! '"da,'& &"#hi&'ica'ed b(&i!e&& e!)i%"!e!'. Th"%"(ghl, &ea%chi!g c"#('e% &,&'e& f"% e)ide!ce "f *%"!gd"i!g i& a g""d #lace '" &'a%', b(' a!,i!di)id(al&ha)e!"idea*ha''"l""kf"%,(chle&& *he%ea!dh"*'"fi!di'. The&killedi!)e&'iga'"%&a'Ke&&le%I!'e%!a'i"!al%"('i!el, #e%f"% elec'%"!ic d"c(e!' di&c")e%,, diggi!g (# #e%'i!e!' da'a 'h%"(gh ca%ef(l e+ai!a'i"! "f c"#('e% &,&'e&. I!c%ii!a'i!g file& 'ha' *e%e "!ce dele'ed ca! be %ec")e%ed a!d #%"d(ced a& e)ide!ce, a!d beca(&e *e adhe%e '" &'%ic' g(ideli!e&, ,"( ca! %e&' a&&(%ed 'ha' a!, i!f"%a'i"! *e #%")ide *ill be adi&&iblei!ac"(%'"fla*. Message from creepyuser101 creepyuser101: i know where u live, so dont even think about calling the cops NotThreatened23: Guess what? I hired an investigator to find out who you are and help put you behind bars! creepyuser101: >:( Up until the recent boom in technology, security was generally a matter of locking up the office, keeping valuables sealed in a safe, and perhaps hiring a guard towatchoverthebuildingatnight.Thesedays,however, complicated computer systems safeguard your assets, and access is almost always managed through complex passwords. While this method is usually fairly secure, passwordscanbelost,forgotten,changedorevenstolen, andyoumaynolongerbeabletoaccesscriticalsystems andinformation. But all is not lost Kessler's team of computer forensics specialists can recover passwords that you thought weregoneforgood,allowingyoutoregaincontrolofyour important data. In addition, we'll go the extra mile and assist you in devising password strategies and other security measures so that you'll never be faced with a similarsituation. One of the most alluring aspects of the Internet is the amazing level of anonymity it affords. Unfortunately, this also allows many potentially dangerous individuals to wreak havoc online without fear of being discovered. Cyberstalking, annoying or harassing emails, junk mail flooding, viruses and personal threats make many victims' lives miserable, and aside from filing a complaint with their Internet provider, there'susuallynotmuchtheycando. Fortunately,weknowhowtotrackdowncyber-terroristsandputanendtotheirhigh-tech harassment.Byutilizingadvancedemailtracingsoftwareandtechniques,ourcomputer forensicsteamcanfindoutwhoisresponsibleforthetormentandbringthemtojustice. Kessler International will help you obtain the evidence you need, using time-tested procedures to ensure the integrity of the information. Our expert witnesses can then takethestandincourtanddeliverstraightforward,compellingtestimonythatwillclarify theevidencepresentedandlendsubstantialcredibilitytoyourcase. While email and the Internet may provide your business with unprecedented levels of communication and market outreach, it can also leave your company wide open to modern risks. For instance, your company is legally liable for all electronic correspondence sent through your system, including email, instant messages, web postings and more. In addition, unchecked employees may distribute confidential or proprietary files through the Internet, or put your company in jeopardy by accessing illegalcontent. KesslerInternationalunderstandsthenumerousrisksthat corporations face, and our computer forensics experts canhelpyoucontrolyourlevelofsusceptibilityandavoid costly lawsuits. We'll help you develop procedures that will hold employees responsible for the information they transmit,reduceabuseofcompanysystems,andprevent thelossofintellectualpropertyandtradesecrets. Sometimes, piecing together a case can be extremely difficultacquiringevidence,presentinginformationintheright fashion and locating credible witnesses may turn out to be tougher tasks than you expect. And when computers are introduced to the mix, things often become considerably more challenging. Evidence obtained from computer systems can be easily corrupted, and must be gathered in an extremely precise, controlled fashion to be admissible in court. In addition, such evidence often needs to be supported by expert witnesses that can explain and demonstratecomplicatedtechnicalissues. Intodaystechnology-drivensociety,computersarethebackbone of almost every business. All over the world, companies rely on intricate computer systems to manage many of their day-to-day operations,andmostarefacedwithsecurityrisks,incessantjunk mail and seemingly irreparable technical issues. Thats why it paystohaveanexperiencedcomputerforensicsspecialistonyour side, providing impeccable service and solving even your most complicatedtechnologicalproblems. Kessler International has been the global leader in the field of computerforensicsformorethanadecade.Ourteamofexperts combinesexperience,integrityandworldwidepresencetoprovide our clients with the most professional service possible. From electronicevidencegatheringtodatarecovery,fromNewYorkto HongKong,ourstaffcanmeetyourneedsandconsistentlygive youresultsthatareprecise,accurateandcomplete. If youre in need of a computer forensics expert, dont settle for anyone but the best. Kessler International is renowned throughout the world for unbeatable results and the highest level of integrity, which is reflected in the quality of our work and the enduring relationshipswithourclients.Ourglobalreachensuresthatnocaseistooremote,and that no matter where you are, our team can be at your side helping you overcome the hurdles of modern business. Kessler is simply the most respected, experienced and professionalcomputerforensicsfirmintheworld,andnothingmeansmoretousthanthe satisfactionofourclients.Thatsourpromise.ThatsTheKesslerDifference. Experience, Integrity & Worldwide Presence Phone: 212.286.9100 Toll Free: 800.932.2221 Fax: 212.730.2433 Email: mail@investigation.com www.investigation.com World Headquarters 45 Rockefeller Plaza 20th Floor New York, NY 10111 Offices Worldwide Copyright 2004 by Kessler International