Friday, 28 December 2018

Computer Forensics and Digital Forensics Expert witness Services

The world is continually becoming more dependent on the use of computers. Computer forensics deals with data, and specifically digital data. With the onslaught of social networking sites, email/internet abuse and criminal cases involving computer files, almost everyone has a use for a computer forensics expert. It covers a wide area of data investigation and retrieval. Police, prosecutors, lawyers, the insurance industry, and many corporations use computer forensics experts to discover digital evidence of the crime. Not merely confined to computer data recovery alone, computer forensics is a fast-growing investigative technique used by a forensic specialist for retrieving data that has been electronically stored or encrypted on digital media such as a personal or work computer. Law enforcement agencies use computer forensics to gather evidence about a suspect or known criminal.

Digital Forensics Expert

Digital Forensics Expert Witness

1.    An impartial Examination of your Case

Computer forensics experts have deep knowledge and experience in dealing the cases. They can recover deleted files; analyze Internet data to determine the web pages that were visited from a certain computer even in when the browser history and cache may have been deleted. Digital Forensics Expert will deal your case with an open mind, drawing results and conclusions based on evidence instead of preconceived notions.

2. Correct Acquisition of Electronic Evidence

Computer forensics involves the retrieval of the data using special software tools and techniques. It is used to identify valuable data from computers or other electronic data storage devices. It is also used to identify the leakage of sensitive data from the computer or any inherent weaknesses in the system. Computer forensic expert witnesses have the necessary software and hardware tools to maintain the evidence’s integrity. The forensic expert creates a digital fingerprint of the original hard drive to ensure that it is not tampered with while retrieving data.
Cell Phone Forensic Services

3. Analyzing the Evidence and Creating the Report

The eDiscovery process involves collecting, processing and reviewing electronically stored information.  The specialists make use of particular computer forensics software and other tools to retrieve information. As the specialist works with evidence involved in a criminal case, he/she takes particular care to properly file all the work done to the computer and information found from it. The retrieved information can be converted into any required format. A report is generated to properly explain what information was found and how it is pertinent to that specific case. They are good at analyzing and evaluating the information.

4. Value your Time and Money

A digital forensics expert witness can complete the task quickly and efficiently, delivering reliable and trustworthy results. All of these services are important aspects of the computer forensics realm. Each area is carried out in a very specific and careful way so no evidence is ever tampered with or mishandled. Each step of the process is just as important as the first which is why it takes many years of experience to be considered an expert in this field. They consider each project as a challenging one.

Computer Forensics

At ICFECI, we the certified digital forensic expert, able to handle cases related to Civil fraud and criminal litigation, white-collar frauds, bank frauds, Ponzi schemes, Sex crimes, assault, murder, child pornography, violence, and assault. Feel free to contact us.

Thursday, 27 December 2018

Health Care Fraud Investigation - icfeci

Health Care Fraud Investigation

Health care fraud is the intentional deception which mainly involves submitting misrepresentations to acquire claims repayment from payers for which no privilege exists. Often Medicare/Medicaid patients are unaware that their identity, insurance information and treatment is being used in a scheme to defraud.

Read more : https://icfeci.com/

Monday, 24 December 2018

How to Become a Professional Private Investigator?


Private Investigation is a highly interesting career that requires a multiplicity of skills and experience that most people never get the opportunity to realize or utilize. Starting from gathering evidence for a divorce case to investigating commercial piracy, private investigators are becoming an increasingly popular option for businesses and people from all walks of life. Most of them are working for insurance companies, lawyers, and businesses. They specialize in many different areas such as accident investigation, asset search/recovery, civil litigation support, criminal defense investigations, locating missing persons, loss prevention, skip tracing, tenant screening, and many more.

Private Investigator

Career path and Duties

Today a certified private investigator can have access to a variety of personal information such as social security numbers, criminal records checks, locating databases. They may conduct surveillance and background investigations on individuals. Many companies hire them to conduct background checks and pre-employment verification. With the help of advanced technology, they recover deleted emails and files and to conduct searches of databases for information about an individual. There are all manner of investigative experts available for hire and following in this career path can be incredibly lucrative for any person with the skills and training to help them achieve success. They often work for long hours, keeping detailed notes and video for reports to supply to the clients and often spend most of the time in the field conducting surveillance related work.

Steps to becoming a Private Investigator

Private investigators are usually competent individuals who provide their investigative services to individuals, law firms, corporations, and insurance companies to help them find answers and/or address concerns relevant to their interests. There are currently no entry level requirements to become a private investigator. Aspiring candidate must be at least 18 years old (21 in select jurisdictions) and generally must have no criminal record.

The basic areas on which you need to focus on are:

1. State licensing requirements
2. Education and Training
3. Integrity investigations
4. Getting started tomorrow

First, you have to learn your state licensing requirements. Some states require a test, some don't. Some states require a degree in criminal justice, some do not. Each state is different and you can either use Google to find online state by state licensing requirements for private investigators or contact your sates dept of licensing.

Private Investigation

Second is education. If your state requires a degree in criminal justice you'll need to go to a good school or online college. Even if your state does not require a degree your potential employer may. So you'll want to get some kinds of degree or certificate. There are many online schools that offer a Private Investigator certificate. This may not help with your state licensing board but a potential employer will be impressed that you are taking your new career choice seriously by getting some education under your belt.

You'll learn the investigation procedure of a person's past in order to determine their education level, criminal and financial records, employment history, income level and their general reputation for honesty and good citizenship.

The third is Integrity Investigations. These companies will hire inexperienced private investigator trainees to visit local businesses in their area to conduct undercover visits and see if the employees are following the store's corporate policies. Sometimes you'll visit a major dept store and take covert video. Last is getting started tomorrow. Do some investigation and find out your states licensing requirements.

Private Investigator

Other helpful skills

You have to polish and prepare more on your writing skills. Having an excellent presenting skill will ensure you a bright future on private investigating. This is because, in this field, you will have to frequently write reports in an understandable format. You also have to maintain the quality of the reports. Impressing your clients will extremely help you because they will recommend you to others. Aspiring candidates with previous law enforcement experience may find that experience beneficial when looking for employment.


Wednesday, 19 December 2018

How can a Computer Forensics Service help find Evidence?


As crime rates increase, it doesn't only occur in your neighborhood but in the cyber world too. Computer crime has been the ugly side of the Internet revolution and its rise cannot, unfortunately, be seen as a surprise. As digital data gets lost, corrupted, protected and tampered with, it is important to have computer forensics around to work the job and help solve problems. Helping companies to identify computer and mobile phone abuse in the workplace is essential in combating the accessing of inappropriate websites, computer fraud. The industry of computer crime investigation, as a result, has continued to grow, and many clients are turning to investigations specialists to provide expert guidance in identifying whether any misuse has occurred. So the digital forensics provides one of the best routes to investigate digital misconduct.

cyber forensic services

Computer forensics can also be used to prove innocence as well as convict the guilty. A typical computer forensic investigation can involve recovering data that was thought to be lost from hard drives and networks. Recovering data that has thought to have been deleted, decrypting data using advanced algorithms and building usage profiles can all be used when put together to build a case against someone accused of a digital crime. Computer investigation is a relatively new tool in our arsenal of investigative assets and it's quickly proving to be an extremely valuable source of information. A computer forensics service is the recovery and analysis of any type of digital storage media searching to find potential legally admissible evidence. The type of evidence relevant to the theft of trade secrets, theft of or destruction of intellectual property, wrongful termination, domestic cases, embezzlement, fraud, and tragic child pornography investigations.

Some of the common forms of data that experts can recover from a laptop or desktop hard drive include the following:
  •       Various types of files and documents that have been deleted from the hard drive of the computer
  •     Emails that have been erased from the inbox
  •     Deleted chat logs that contain instant messages the individual has had on messengers that include MSN, Yahoo, AOL, Skype, and various others
  •     Graphics or photographs that the computer user has erased
       computer forensic services

The computer forensics service is one of the most reliable sources of information with advanced technology and tools. These are designed to provide you with detailed reports of all the evidence and facts retrieved and preserve them in an organized manner in order to help you find a successful resolution to the case and make informed decisions based on it. A computer forensic examination consists of the preservation, identification, extraction, and interpretation of documents that have been at one point stored on a computer. By using the proper authority/licensing, fully documenting the chain of custody of evidence, and using tool validation methods to ensure actions have been properly vetted, digital forensics ensures valid results.

At ICFECI, we strive to provide the best and most ethical digital forensic services with the help of experts. We mainly focus on retrieving data, emails, documents, and digitally stored information, and convert them to evidence acceptable in a court of law. We help real people make conscious and sensible decisions by delivering documentation.





Friday, 14 December 2018

What is involved in a Healthcare Fraud Investigation?


Now-a-days Medicare fraud is becoming a headache for the government, and society also. Yet the goal is always the same - to rook money from the Medicare program. It occurs when physicians or suppliers fail to follow best medical practices, resulting in unnecessary costs to Medicare such as improper payments, or medically irrelevant services. In fact, Medicare fraud - estimated now to total about $60 billion a year - has become one of, if not the most profitable, crimes in America. Health care fraud is a crime which is not roaming around only to the health care provider level but there are other major contributors like patients, health care taxpayers, employers, insurance plan sponsors, and health care vendors also.

Health Care Fraud Investigation


The individuals and organizations who are committing healthcare fraud either directly or indirectly can be punished with civil and/or criminal penalties.  Examples which indicate health care frauds are:

    A health care program caused either directly or indirectly which involves the unnecessary cost
    Reselling the medicines
    Paying the bill in an inappropriate way
    Illegally receiving Medicaid services
    Allowing others to use your medical card
    Obtaining duplicate prescriptions
    Using more than one medical card
Some important factors related to Icfeci health care fraud investigation are:
This type of fraud can be charged as both a civil and a criminal offense. Identification of health care fraud is conducted through many private, local, state and/or federal agencies.

How the Investigation Starts

    It will be an analyst who uncovers a claim that he or she regards as doubtful.
    An insider can file a report to the authorities.
    A dissatisfied patient can file a complaint.


Health Care Fraud Investigation


After Receiving the Letter from a fraud Investigator: what is the next step?

The Inspector General employs a host of investigators and auditors who are expert at spotting inconsistencies and unusual patterns in purchasing and billing. The investigator starts the investigation process by evaluating the information in the complaint to determine the truth of actual misconduct, and then to classify what exact laws, rules, and/or policy may have been violated. Important areas to be addressed may include:

Documentation- was the medical treatment documents as medically necessary or not? Is this completely and correctly documented in the patient's health care record?

Dictatorial Laws and Rules- The administrative law for the State, with the scope of practice, training, supervision, and delegation are checked by them to spot whether the service provider is involved or not?

What can I do if I am being Investigated?

    You can bring a lawyer to the interview.
    You can consult with a lawyer
    You may remain silent.

  Health Care Fraud Investigation Plan:

To reach the root level of fraud the investigator will identify potential witnesses. They will require other helpful information, such as patient and files of insurance claim that may possess proof of the misconduct. After the successful investigation they will collect all relevant proof which indicates the laws, rules and/or system governing health care have been violated.

Fraud Investigations

Dan James is a renowned expert on health care fraud issues and can investigate cases relating to false billing, offering health care services without a license, false insurance claims, false diagnoses, and unauthorized surgery, forcing patients to undergo tests or surgery solely for pecuniary gains, staged accidents, kickbacks in patient referrals, and Medicare/Medicaid billing schemes.

Monday, 3 December 2018

Computer & Cell Phone Forensic Services Analyst in 2018



ICFECI is dedicated to offering civil and criminal litigation investigative assistance services. Our mobile forensics lab and certified cell phone examiner can extract data, analyze it and interpret it in an understandable report.

Read more : https://icfeci.com/

Saturday, 1 December 2018

Certified Fraud Examiner at Dallas | ICFECI


Frauds are classified as white Collar Crimes that may be subject to civil and criminal litigation. An individual may knowingly or unknowingly misrepresent or conceal facts resulting in an unfair advantage to him or his organization but in decided loss or harm to the victim.

Read more : https://icfeci.com/

Friday, 30 November 2018

What Can a Computer Forensics Expert do for you?


In this tech-savvy world, no one can live without the smartest technology of mobile and computers. These are like two sides of a coin. We cannot exist without computer technology. With the progress of the Internet, you can connect with any corner of the world through cyberspace. The Internet has become the bond of communication because it is convenient, accurate, and hassle-free. The misuse of the internet can results in the fraud, hacking, cyber stalking, financial tampering etc. Are you facing the same problem? You need someone who can follow the digital trail to find the legal evidence you need.

Cell Phone Forensic Services

Computer forensics experts are a new addition to the crime control of the world but the fact is that they can help solve crimes and protect corporate security. And they do this in a way never before thought possible. These forensic experts are even called into battle child pornography, organized crime, and sex crimes. Without the expertise of these types of teams, a lot of modern crimes could go unnoticed and unsolved.

Computer forensics teams use scientific methodology to discover legally admissible evidence on computers, hard drives, and other digital media such as mobile phones and digital cameras. During the investigation process, they may include storage hardware, individual computer systems, and larger networks. Computer forensics experts first protect the information on the drive from intentional or accidental harm (usually from the person guilty of the crime), and then assess the information, cracking passwords, encryption, and other security, if necessary. Their main goal is to help the clients.

Computer Forensics

Finally, the forensics expert assesses the information and prepares it for presentation in either a private setting or a court of law - trusting on whom they're working for. Computer forensics has many applications in tracing hackers, recovering data, gathering evidence etc. Law enforcement agencies use this type of forensics more and more, as more crime is planned and organized or even occur within the digital space.

They can collect different pieces of evidence like files, emails, photographs, and more to be assessed and presented in court. One of the major branches of this type of forensics is to deal with the information held on cell phones - used by most criminal gangs. The watchful scientific work of these computer forensics experts can help police solve crimes, and justice is served. They can securely store and handle all the recovered data. There are many cases where the crimes have been solved by the experts and the victim is punished legally with the forensic evidence. The secret information in the police department, government offices, corporate office, and other fields are kept safe to avoid hackers. The hacking of confidential details is legally punishable. They can prove these types of crime.

At ICFECI, we solve different types of cases related to Criminal Justice Act Services (other than counsel) including investigative, expert or other services necessary for adequate representation, sex crimes, assault, murder, child pornography, violence, assault.


Blog Source : https://icfeci.wordpress.com/2018/11/29/what-can-a-computer-forensics-expert-do-for-you/

Thursday, 22 November 2018

Cell Phone Forensic Services help you to catch cheater without knowing


Mobile applications have wrapped the entire phenomenon of mobile technologies with added advantages and utilities. As a source of potential evidence, cell phones/tablets are a very important aspect of investigative procedures. Since cell phones carry an imprint of almost every aspect of one's personal and professional life, gaining access to the information is critical to an investigation in order to secure evidence. Cell Phone Forensics is a branch of digital forensics which is used in extracting data/information from mobile phones with the help of forensic techniques and types of equipment. Many cheaters take advantages of technology to help them hide their wrong activity. Through this mobile technology, they hide their activities.
Cell Phone Forensic Services

It can be an extremely devastating situation when a person finds out that their spouse or partner of many years has been hiding the involvement they have had with another person. The sad part about it is there are many times that the infidelity that is occurring in a relationship can go on for a number of weeks, months, or even years before the innocent partner finds out about the unfaithful behavior. Cell phone forensics service is a beneficial service that can help a great deal in situations where an individual believes that their partner is engaging in an affair behind their back, and more specifically if they have been sending or receiving SMS text messages and pictures on their cell phone with their secret lover. Being able to recover deleted text messages with this unique service has the ability to help an endless amount of innocent individuals involved in a serious relationship.
Digital Forensics Expert

How cell phone forensic expert can help you?

When you hire a professional who has the expert knowledge that is required to perform a thorough forensic investigation on your cellular device, they can quickly and easily retrieve deleted text messages and several other pieces of important information. Some of the other important data that they can recover would include deleted pictures, SMS texts, caller ID information, address book, calls that have been made or received, the length of the calls, and the date and the time that the calls were made or received. They will give you a detailed report of cell phone forensic investigation in the form of a disc that you will have to use as evidence. There are many times that couples end up being able to salvage their relationship after the guilty party has been confronted and the differences that they were having are able to be worked out. So, if you have any suspicions that your partner is cheating on you and you would really like to put an end to the problems so that each of you can move forward, you will want to consider the use of a cell phone forensics expert.
Cyber Forensic Services


There are also other reasons why many people take advantage of the benefits to be had when they have a professional retrieve deleted text message, photos, videos, and other data. Some individuals would like to check up on their teenager’s activities. In an accused partners defense, there are also many times that they can actually prove their innocence when a professional is hired to recover deleted text and photos from their cell phone.

Why ICFECI is the best in cell phone forensic services?

At ICFECI, Our certified cell phone examiner can extract data pertaining to:
    Call history and call records

    Contact books and list recovery

    Extract data even if it is encrypted or contained inside an app

    Extract contents of chat, email and SMS/MMS/instant messaging

    Social media activities data extracted

•  Access cell phones and data within even when they are password protected and encrypted.

Contact us for the cell phone forensic services and we will be happy to help you.

Friday, 2 November 2018

Reasons Why A Criminal Investigator Is Crucial For Your Case - ICFECI



Criminal Investigations are our forte. Our focus is on providing top-flight investigative assistance that will result in the best possible representation of defendants, which also includes services under Title 18, United States Code, Section 3006A pertaining to Adequate Representation of Defendants.


Read more : https://icfeci.com/

Wednesday, 31 October 2018

Improving Awareness of Computer Forensics Services in 2018

Computer forensics refers to the process of collecting and analyzing latent evidence generated by computers and other digital devices. A digital forensics investigator has knowledge of the law and computer science in addition to data collection techniques to provide expert services.

digital forensic services

As the digital evidence is extremely volatile, it needs to be preserved and handled in a forensically sound manner. Forensic investigations will also include preserving and analyzing data from computer networks, electronic storage devices, wireless networks, and other electronic devices and preparing collected evidence to be presented in courts. Electronic devices may leave invisible trails. Exploring those trails, by mining data to expose who, what, when, where, why and how is a primary purpose of computer forensics.

Computer forensics service falls within the broader legal concept of electronic or e-discovery. The process includes gathering data, documents or email in preparation for legal action that may lead to trial. With the increase in the use of the internet, the instance of Cybercrime has increased in parallel and so has the need for Computer Forensics experts. At ICFECI, Dan James, experienced computer forensics Service, will be able to provide e-discovery services that will help you litigate in the most effective way possible. He handles computer/cell phone forensics and criminal investigations.  His clients are accused of crimes and or they are defendants. Some companies that offer these technological services may just host and process your data and step away. It is important to work with him so that he can locate, analyze, and produce the information that you need to make the most educated decisions possible.

Computer Forensics Expert

Courts appoint Dan James to investigate indictments of criminal defendants because he has the tools and expertise necessary to evaluate large data sets like emails and documents. He has the able to apply the forensics necessary to take a deeper look into an individual's activities. Those skills can be used to extract important data from phone records as well as from computers.  The extracted data my reveal exculpatory evidence.

The need for computer forensics expert becomes all the more important when one considers the facts that documents may be the only data that matters.  That evidence is in electronic form and it may not be limited only to one computer system or a mobile device. Data may have been stored in the cloud, in other servers or simply deleted. An expert computer forensic investigator has a tough task. He looks for data without knowing what it is. Along with some useful information and algorithms he may uncover gigabytes of other information. It is for him to resurrect and reconstruct data and extract only the meaningful parts, all done using a forensically sound method that does not change or alter the original data in the system in any way. This calls for specialized techniques, forensic tools and use of a well-equipped lab.

criminal defense investigator

Algorithmic extraction of meaningful data is, of course, a prime consideration but what is more important is that the computer forensic professional must also have full knowledge of the law and be able to present forensically sound evidence in a way that is acceptable in court.

Cybercrime today is not limited to one geographic location. It is also not restricted to use of only one device to store data.  Data may be spread across various devices and may have been encrypted or deleted. It is for the expert to follow the trails, mining data, and use his expertise as well as experience to retrieve valid evidence that withstands legal scrutiny.

At ICFECI, we understand that finding the right representation can be difficult. ICFECI has, without question, earned a reputation by delivering what it promises.

Blog Source : https://icfeci.wordpress.com/2018/10/29/improving-awareness-of-computer-forensics-services-in-2018/

Monday, 15 October 2018

Cell Phone Forensic Services - Using Forensics to find Exculpatory Evidence


Today cell phone is undoubtedly one of the most used devices on the planet. It isn't just an origin of communication but this high-tech trendy gadget has manifold functionalities. As of 2013, it has been recorded that 91 % of adult Americans are avid cell phone users, a major 63 % being smartphone users which brings Mobile Phones/ Smartphones to the forefront of the most widely adopted consumer technology. 
Cell Phone Forensic Services

This trend has made cell phones/tablets a very important aspect of investigative procedures and a source of potential evidence. Since cell phones carry an imprint of almost every aspect of one's personal and professional life, gaining access to the information is critical to an investigation in order to secure evidence. Cell Phone Forensics is a branch of digital forensics which is used in extracting data/information from mobile phones with the help of forensic techniques and equipment.

Cell phone Forensics Services primarily involve extracting evidence/information in the form of phonebook contacts, SMS, Text Messages, MMS, calendars, appointment records, call records, photos, videos, voice messages, web history information, social media contacts and messages stored in third-party applications. Apart from these, one of the most interesting aspects of this science is, it can easily establish a definite trail to your current location simply by tapping into the GPS system of your smartphone.

It finds application in fields like law enforcement investigations, private investigations, corporate crime investigations, military intelligence, civil and criminal defense, and electronic intelligence discovery.
criminal defense investigator

Cell phone Forensics Services can recover the data on a cell phone, even if that data appears to have been deleted or removed. At ICFECI, as a certified cell phone examiner, we extract data pertaining to:
    Call history and call records
    Contact books and list recovery
    Extract data even if it is encrypted or contained inside an app
    Extract contents of chat, email and SMS/MMS/instant messaging
    Social media activities data extracted
 Access cell phones and data within even when they are password protected and encrypted
Any of this data could be of vital importance and could be a determining piece of evidence that influences the outcome of trial proceedings. It is our unique capabilities that can make all the difference.

At ICFECI, Dan James handles computer/cell phone forensics Services and criminal investigations. His clients are accused of crimes and or they are defendants.  Also, courts appoint him to investigate indictments of criminal defendants. Gain satisfactory answers to your queries from him. He will be happy to help you.
digital forensic services

ICFECI has, without question, earned a reputation by delivering what it promises. In conformity with Title 18, USC, Sec 3006A, ICFECI goes above and beyond the requirements for defending the rights of the accused. We are the solution you are looking for. The results of forensic science are likely the number one factor in solving cold cases.
Discover the solution for your next case with us.

Wednesday, 3 October 2018

Increase in Digital Crime and Rise in Security Concerns Shall Pace the Computer Forensics Market


In the tech savvy world, the digital forensics market is expected to experience an upsurge on account of the increase in sophisticated digital crime and economic growth in developing countries.  The detail analysis and reporting of digital data for a legal purpose is the most prominent market within the overall digital forensic market, which is referred to as computer forensics. Computer forensics has become much active in the field of cyber-crime, to perform a structured investigation, in order to detect hidden facts for accurate investigation results.

Computer Forensics Market


Many people think that just because you delete something off of your computer, or other device, that it's gone forever. This is not true and more people are finding this out the hard way. Minor cases that require the help of ICFECI computer forensics analyst include civil cases where an employer may want to monitor the daily activities of their employees to see how much company time is being wasted. Email was the first thing introduced into office life that was later found to be a huge waste of time, while people are on the clock. It is still an extremely efficient and easy way to communicate in the work place but as more people own Blackberry's and iPhone's it has become a large scale issue among employers. Up to 50%, or more, of a work day can easily be wasted by emailing friends.

Computer forensics have gained wide-popularity in developed countries such as North America and Europe owing to technological advancements and increased cyber-crime rates. Rise in corporate fraud has increased the demand for computer forensics services. As analyst's gain more experience they typically move on to providing their services to law enforcement agencies. During litigation a good computer forensics analyst will be able to give a thorough report on their findings and able to point out the relevance to the case. All pertinent information will be accessed and fully analyzed and when it's time for their testimony they must be concise, clear and provide all information that will benefit the case. For this reason it is unlikely for the police, or any other agency, will hire an analyst without several years of experience in this realm.
criminal investigations
At ICFECI, we understand that finding the right representation can be difficult. It has, without question, earned a reputation by delivering what it promises. In conformity with Title 18, USC, Sec 3006A, It goes above and beyond the requirements for defending the rights of the accused. We are the solution you are looking for. We have an eye for detail and a large amount of patience. The result of forensic science is likely the number one factor in solving cold cases. Image for over 30 years, having an unsolved criminal case hanging over your head. One of the largest serial crimes was solved by the use of computer forensic services. It took law officials thousands of man hours only to come up empty handed in efforts to solve the BTK killer case, however, computer forensics solved the case in just hours. Dennis Rader was finally named in the murder of ten people.