Forletta: How a Polygraph Works.

A polygraph, commonly referred to as a “lie detector,” is a device that is used to determine whether someone is telling the truth when asked a series of questions. Polygraphs are typically used in criminal investigations and when performing background checks, especially in the case of potential government employees. So, how exactly do these devices [...]

2019-04-20T10:33:12-05:00February 1st, 2017|Blog|0 Comments

FORLETTA: How to Do Due Diligence on a Business.

Before taking part in any interaction with a business, for example buying, merging, or partnering in any other way, you want to make sure you really know what you’re getting yourself into. Due diligence refers to reviewing all available information about the company—financial and legal—with a fine-tooth comb beforehand so that you’re not met with [...]

2016-12-09T23:17:45-05:00January 15th, 2017|Blog|0 Comments

FORLETTA: Protect Yourself From Credit Card Fraud.

Now that the craziness of the holiday season and gift exchanges is behind us, we probably are ready to keep our spending to a minimum, at least for the immediate foreseeable future. Perhaps one of your New Year’s resolutions is to save a little bit more. Regardless of how much you’re planning on spending these [...]

2016-12-09T23:06:02-05:00January 1st, 2017|Blog|0 Comments

FORLETTA: Digital Forensics: Finding Lost Files.

Many digital forensics investigations start with finding files that belong to the computer’s previous user. Allocated files refer to those that can be viewed through the file system and whose contents, under normal circumstances, are not inadvertently overwritten by the operating system. Many digital forensics tools allow investigators to see allocated files in a disk [...]

2019-04-20T10:33:12-05:00December 15th, 2016|Blog|0 Comments

FORLETTA: Finding and Preserving Digital Evidence.

Continuing with our digital forensics series, today we cover how to find and preserve digital evidence. One of the most important innovations in the field of digital forensics is the hash function. A hash function maps a sequence of characters (called a string) to a binary number of a specific size (i.e., a fixed number [...]

2019-04-20T10:33:12-05:00December 1st, 2016|Blog|0 Comments

FORLETTA: Digital Forensics Investigation Procedures, Part Two.

Our last blog was an introduction into the world of digital forensics and discussed the challenges associated with this growing field. Subsequent blogs will go into these challenges in greater detail. The tools and techniques used in digital forensics are to be applied to suspects, victims, and bystanders. Over the years, practitioners have tried to [...]

2019-04-20T10:33:15-05:00November 15th, 2016|Blog, Uncategorized|0 Comments

Protecting Confidential Information in the Workplace – Part II.

We recently wrote a blog piece about the importance of protecting confidential information in the workplace and provided steps to help you do so. However, with the increase in globalization, remote working, and digital technology, a whole new set of challenges arises when it comes to protecting confidential information. The prevalence of digital devices has [...]

2019-04-20T10:33:18-05:00October 15th, 2016|Blog|0 Comments

From the desk of Larry Forletta: The Realities of Private Investigation.

When people think about Private Investigators, they tend to think of dramatic scenes from old movies that they have seen, with witty and dry remarks and somewhat romantic and glorified scenes. A narrative in the background from the investigator. Black and white scenes with smoke in the background. It also may appear from these movies [...]