Computer Forensics Proves “Balloon Boy” a Hoax

The Heene family’s e-mails secured by computer forensic engineers have proven the “Balloon Boy” stunt a hoax. The e-mails sent months before the event show Richard Heene and an associate discussing a media stunt similar to the balloon incident. Now, the same engineers are looking into whether conspirators were involved by further examination of the Heene hard drive.Computer Forensics allows engineers to retrieve information from a computer’s hard drive; including word documents, e-mails and correspondence, pictures and Internet browsing history, even if they have been deleted. Michael G. Kessler, president and founder of Kessler International, a computer forensics firm, stated that “Computer Forensics has become a standard protocol in criminal and civil investigations. A digital trail can usually be recovered and provide undisputed proof of an event. “

For over 20 years, Kessler International has been the world leader specializing in computer forensics, international corporate investigations, forensic accounting, and brand protection. Established in 1988, Kessler International’s satisfied clients are comprised of an extensive and distinguished list of Fortune 500 companies, government agencies, and prestigious law firms worldwide. Its diverse staff includes former prosecutors, former law enforcement agents, attorneys, certified forensic computer examiners, certified forensic accountants, certified fraud examiners, CPAs, certified internal controls auditors, licensed investigators and researchers.

For more information on computer forensics visit Kessler International’s website at www.investigation.com or call (212) 286-9100.

Leave a Comment

Latest Videos

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Forensic Focus 22nd June 2022 5:00 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles

Share to...