About Us Services Press Contact Us


About Us

 

Our Mission

Accurate Computer Consulting (ACC) has provided computer-related security investigation and programming services to companies throughout Southern California since 1995.  ACC has gathered and analyzed Internet-related and other digital information in a wide variety of investigations. Some of the investigations have required creation of custom Encase enscripts by ACC's EnCE-certified examiner and programming of external analysis utilities and user interfaces for analysis, extraction and presentation of investigation information to counsel.

In addition, ACC has developed hundreds of large and small software applications including client-server systems for management of business information such as talent contracts, real estate properties, corporate threats, etc.; analysis programs to produce information for use in investigations, resource management, formulation of policy, etc.; integration gateways to connect disparate systems into a seamless whole; and other programs and utilities.

It is our mission to help you meet your investigation, analysis and programming needs with the finest solutions available — within your stringent time limitations and within your budget as well.

We are dedicated to your success. Call us today for a consultation. We’ll look at your challenge and let you know if it falls within our area of expertise, and if so, how we can help you solve it.

What Our Clients Say About Us

"There are very few people that can deliver out-of-the-box solutions to complex data analysis. Mike O'Brien is one of them. I have worked with Mike for over 15 years and from day one he has been able to conceptualize and design complex relational databases that have solved crimes and provided critical data analysis that I used at the studios to make important executive decisions. Two of the cases he worked on led to the filing and prosecution of two criminal cases of first impression before federal courts. His stalker database is used by the studios and LAPD to track troubling predators. He recovered over 3 million dollars from corrupted accounting files after the studio wrote it off as lost revenue. Mike is always ahead of the curve and finds the answers. He is truly an ‘expert’ in his field and I highly recommend you give him a call when your IT guy says, ‘that can’t be done.’ Mike will find a solution." 
CH, Senior Manager of Security Operations for a major Hollywood studio

"Mike has worked for me on a variety of computer forensic engagements over the past 8 years. He is sensitive to budget constraints, demonstrates a thorough understanding of the tools of the trade, and possesses problem solving skills to dig through large volumes of information. His biggest contribution on several of my projects has been his instinct for establishing project priorities. Mike is resourceful about finding answers to questions others may give up on. If Mike is satisfied with the results, you can count on them being defensible. Mike is a team player."
RK, Precedent-Setting Forensic Examiner

"I have worked with Mike for over ten years, without doubt, he is the most creative and knowledgeable IT person I have had the pleasure to work with. No problem has ever been too big or complicated for him to tackle. He once told me that the limits of the security function in relation to the IT world was only restricted by my imagination, I tested him on this statement on a daily basis and I could never prove him wrong. I would recommend Mikes services to anyone."
PB, VP Corporate Security for a Hollywood entertainment conglomerate

Contact information for references will be provided on request.

Past Speaking Engagements

Threat Management Conference, Association of Threat Assessment Professionals, August 29, 2001, “Managing a Stalker Investigation in the Information Age”

Law Enforcement and Private Security (LEAPS) Conference, May 14, 2003, “Utilizing the Internet and Computers For Information, Research And Security Management”

Los Angeles Electronic Crimes Task Force Quarterly Meeting, August 19, 2004, “Pirated WaReZ, A Case Study”

 

 

 

go to top

Copyright © 2009 by ACC, All Rights Reserved