Computer Forensic Services:

Coyote Blue Enterprises can perform forensic examinations on computers (both PC and Mac), portable storage devices, cell phones, tablets and most gaming systems.  We will provide you with a comprehensive, forensically sound report so that you can move forward with your case or dicplineary actions.  We are also avaible to give Expert Witness Testimony in regards to our findings.  Please contact us to discuss you Computer Forensic needs.


The following are just a few of the reasons our clients have contacted us:

·  Deletion of corporate files                                  ·  Harassment      

·  Corporate espionage                                           ·  Divorce

·  Embezzlement                                                      ·  Bankruptcy

·  Theft and misuse of intellectual property         ·  Commercial litigation

·  Inappropriate employee conduct                       ·  Internet investigations


These are a few of the types of data we can forensically recover:

• Recover Emails (including Outlook PST and OST files)
• Databases, including proprietary customer information
• Documents, even those erased, sometimes shredded, or overwritten
• Keyword searches to find otherwise unrecoverable data
• Extract files to show previous authors, revisions and other information embedded
• Produce gallery of all or a select set of images found on the media
• Manual carving of otherwise inaccessible data
• History files - Internet history, data copied from networks, USB and Flash drives
• Analysis of URL or web addresses manually typed by the user
• All email addresses and users
• Timeline rebuilding - chronological reconstruction of events on the device
• Produce and analyze instant message and other log files
• Images that have been hidden via steganography or encryption
• Spyware, Trojan and other malware analysis
• Log files of instant message and chat sessions
• Analysis of specific users’ activities including login dates and times
• Password cracking
• Analysis showing all software ever installed on the computer
• Analysis showing all external devices attached to the computer




johnf@coyoteblue.us © Coyote Blue Ent. 2016