We specialize in technical enquiries… discovering clues in computers, performing detailed investigations, finding electronic eavesdropping devices and providing court testimony. Our Seattle/Tacoma area company was founded in 1987 by Dr. Gordon Mitchell. We serve clients ranging from Fortune 10 companies to individuals.
Our skills are honed by design of optical/electronic/mechanical/sensing systems, decades of investigating vulnerabilities, providing experiences from hair-on-fire emergency situations to being the long term corporate memory for clients.
Solving mysteries is our passion; we are eSleuths.
CPP certification study instructor
Personal cyber security
Computer forensic investigations
Predicting violence
Computer forensic and cell phone forensic tools
Investigators and computers
Catching corporate crooks
Wireless network vulnerabilities
Eavesdropping detection
Keylogger threats
Computer forensics
Computer security
Listening to keyboards
Toys and tools for forensics
Wire diagnostics
Cloaking with Metamaterials
The case of the dead client(s)
Chasing the mystery signal
Digital TV signals
Wireless mouse interception
Computer network security
Laser eavesdropping
Powerline Ethernet analysis
Use of ultraviolet LEDs
How to become a counterspy in 3 easy lessons
Violence assessment with computers and cell phones
Using metadata to detect fraud
Keeping your computer secure
Assessing risk using computer/phone resources
Digital cameras
Forensic investigations
Catching crooks with technology
Computer forensics and network security
Finding clues in cell phones
Investigating threats
Investigations with computers
Sweeps for bugs
Leakage of clues in murder and assault cases
Case studies in computer forensic investigations
Completing a risk assessment
Architecture of a murder
The stuff you didn’t know was on your network
Violence assessment by computer analysis
Modern technical threats
Seattle PD penetration test
Durall murder case
Investigation at the Redmond PD
Wireless security technology
Predicting violence
Wireless network honeypot
Catching an embezzler
Cyber extortion at a bank
Incident handling
Risks of violence
How to be a counterspy in 3 easy lessons
Evidence photography
Powershell
Documentation
The Bob Druall murder case
Email analysis
Investigating servers
Electronic eavesdropping
Video forensics
Network attack at Viewsonic
Proactive eDiscovery
Forensic software
Crazy clients
A real world bot problem
What’s on your network?
Forensics without a hard drive
DVR forensics
Edit programs
HB Gary story
Live forensics
Decoding Base64
Human readable registry
Redaction of data from documents
Business school classes on network security, forensics, sweeps
Program management
Systems analysis
Sweeps for bugs
Presentations as adjunct Electrical Engineering Professor
Computer forensics … the antidote to cluelessness
Intro to forensic investigation
Private investigator course lecturer
Forensic investigations for lawyers