English Polish


Glascott Dot Com has extensive knowledge of cybercrime investigations to offer a wide range of effective solutions for detecting and investigating computer-related incidents especially occurrences associated with the Darknet.

The investigation and consulting services offered are specifically designed and tailored to assist legal professionals, corporations, small businesses and occasionally individuals.

 Investigation and consulting services encompass:

  • Cybercrime investigations
  • Email tracing
  • Password cracking
  • Data recovery
  • Expert witness
  • Online fraud investigations
  • Online Identity theft investigations 
  • Advanced Internet investigations 
  • Data theft investigations 
  • Internet-related harassment investigations
  • Retrieving data from an emptied recycling bin
  • Installation of spying software

Glascott Dot Com helps employers and legal professionals uncover computer-based evidence that is incontestable during litigation, such as helping many employers find the evidence they need to expose computer crime including theft of company confidential data, fraud, harassment, breach of trust and inappropriate computer use in the workplace. 

Recent high profile cases have shown how e-mails or deleted files found as evidence can be the deciding factor in a trial. It can also make the difference in an internal situation where lack of hard evidence prevents an employer from acting, even when he knows an employee is up to no good.

Every action on a computer leaves a trace. The objective of the cybercrime investigation is to dig deep into the lowest level of a computer disk, revealing detailed information of computer activities including deleted work files and emails.


Cybercrime investigations involves the collection, preservation, analysis and presentation of computer-related evidence utilising secure, controlled methodologies and auditable procedures.

A vital aspect of the science of cybercrime investigations is the fact that any use of a PC almost invariably causes information to be saved to the hard disk relating to every user session carried out.

In forensic terms, for every user interaction with a PC there will always be data left behind on that PC relating to the actions carried out.

It should be noted that data is rarely completely eliminated from a hard disk, even after processes involving deletion, defragging, disk formatting or operating system installation. This has important implications during the discovery phase of litigation.

Such evidence is compiled on the assumption that skilled professionals will contest it in court, although solutions outside the Court might ultimately occur.

The object of any computer forensic investigation is to obtain incontestable, factual evidence.

How we help legal professionals:

Cybercrime Investigations apply information technology-based knowledge and skills, particularly those of data recovery, to the task of obtaining PC-based evidence. 

  • Safe evidential acquisition, preservation and analysis of computer systems and files whilst avoiding alteration of critical data, consistent with the principles of the law of evidence.
  • Investigation and analysis of data (both visible and deleted) associated with Civil Litigation.
  • Electronic media discovery
  • Intellectual Property theft analysis including company confidential files, sales/marketing and financial software use.
Common scenarios include...
  • Fraud and embezzlement by employees
  • Deliberately deleted data
  • Database stolen by an employee leaving to set up in competition
  • Inappropriate use of PC by an employee, including pornography


 Client Profile



Private Investigators

Today more than ever, private investigators are faced with the significant challenge of detecting and investigating computer crimes as their expertise is usually in law as opposed to computers. Glascott Dot Com offers extensive computer related investigations and consulting services to Private Investigation agencies nationwide.

The following list of services offered to private investigation agencies is not all inclusive-

  Services Include:
  •   Case review  
  •   Technical assistance  
  •   Aiding the process of any digital crime scene or case  
  •   Assistance with investigations 
Legal Professionals

Often, cases become tangled with technical jargon, hardware discussions, and arguments made to cloud the water with alleged ‘techy’ talk and issues of proper discovery. 

  Services Include:
  •   E-mail tracing,
  •   online fraud
  •   Case review  
  •   Expert witness review and background checks on case by case basis  
  •   Review and translation of computer forensic reports  
  •   Technical question preparation and review for cases
  •   Technical assistance  
  •   Aiding the process of any digital crime scene or case  
  •   Assistance with investigations 
Corporations / Small Businesses

Businesses are increasingly more vulnerable to financial losses as a direct result of computer-related issues involving employees. Did you know that “cyber-slacking” can account for 50% of an employee’s day? In addition, the courts are finding companies responsible for what their employees do on-line.

Common issues include sexual harassment, pornography, abuse of company internet policies, and personal gain being conducted from company computers. In 2014:

  • 80% of companies reported financial losses due to computer breaches  
  • 71% of companies have detected unauthorized access to systems by insiders  
  • 79% had detected employee abuse of internet privileges
Services Include:
  •   Theft of intellectual property
  •   Identifying the perpetrator of website defacement  
  •   Sexual harassment  
  •   Verification of system administrators and their actions  
  •   Establishing electronic policy for day to day operations (such as email and web usage)  
  •   Workplace identity theft  
  •   Monitoring internet usage  
  •   Network intrusion detection  
  •   Surveillance software  
  •   Workplace pornography issues  
  •   Tracing e-mails  
  •   Verification of employees sending trade secrets by email  
  •   Monitoring of illegal internet downloads and uploads  
  •   Monitoring the day to day work of employees on corporate computers  
  •   Encryption and steganography detection in the workplace 


What is involved in cybercrime investigations?
Cybercrime investigations includes the identification, acquisition, examination, analysis and interpretation of electronic data commonly created and used by computers.

What is the purpose of cybercrime investigations?
Cybercrime investigations may be used to support both civil and criminal litigation as well as to enhance overall corporate information technology security. In general, cybercrime investigations provides digital evidence to support allegations of certain activity in which computers are involved.

When might cybercrime investigations be used?
Cybercrime investigations may be used in cases of: unauthorised disclosure or copying of sensitive business data, such as customer databases, price lists and employee payrolls, whether by accident or by intent; fraud and deception; internet abuse by employees including downloading of pornography; industrial espionage by "crackers" and subsequent damage assessment; recovery of data thought to be deleted; revelation of data hidden or included in temporary or swap files; access to encrypted, password-protected data.

Can you recover deleted data from a computer?
Many instances of deleted data can be recovered. The probability of success depends upon the specific circumstances. This includes the type of data, the length of time since its deletion and the activity on the computer since its deletion, among other factors.

In general, full or partial recovery of text data is easier than binary data, such as images. Data deleted in the past few days is easier to recover than data deleted many months ago. Data from a relatively inactive computer which stores little information is easier to recover than data from an actively used system that's approaching its full capacity.

What is the cost of a cybercrime investigation?

The cost of a cybercrime investigation is based upon an hourly rate plus expenses incurred. The total cost will depend upon the complexity of the issues and the time involved. More time is usually required in the analysis and interpretation phase than in the initial acquisition of the data.

You can avail of an initial telephone consultation of up to 15 minutes at no charge. To request this complimentary consultation, please use the contact form.