Our Mission
Accurate Computer Consulting (ACC) has provided computer-related security
investigation and programming services to companies throughout Southern
California since 1995. ACC has gathered and analyzed Internet-related and other digital information in
a wide variety of
investigations. Some of the investigations have required creation
of custom Encase enscripts by ACC's EnCE-certified examiner and programming of external analysis utilities
and user interfaces for analysis, extraction and presentation of
investigation information to counsel.
In addition, ACC has developed hundreds of large and small software
applications including client-server systems for management of business
information such as talent contracts, real estate properties, corporate
threats, etc.; analysis programs to produce information for use in
investigations, resource management, formulation of policy, etc.;
integration gateways to connect disparate systems into a seamless whole; and
other programs and utilities.
It is our mission to help you meet
your investigation, analysis and programming needs with the finest solutions available
— within your stringent time limitations and within your budget as well.
We are dedicated to your success.
Call us today for a consultation. We’ll look at your challenge and let you know if it falls within our area of expertise, and if
so, how we can help you solve it.
What Our Clients Say About Us
"There are very few
people that can deliver out-of-the-box solutions to complex data analysis.
Mike O'Brien is one of them. I have worked with Mike for over 15 years and
from day one he has been able to conceptualize and design complex relational
databases that have solved crimes and provided critical data analysis that I
used at the studios to make important executive decisions. Two of the cases
he worked on led to the filing and prosecution of two criminal cases of
first impression before federal courts. His stalker database is used by the
studios and LAPD to track troubling predators. He recovered over 3 million
dollars from corrupted accounting files after the studio wrote it off as
lost revenue. Mike is always ahead of the curve and finds the answers. He is
truly an ‘expert’ in his field and I highly recommend you give him a call
when your IT guy says, ‘that can’t be done.’ Mike will find a solution."
CH, Senior Manager of Security Operations for a major Hollywood studio
"Mike has worked for me on a variety
of computer forensic engagements over the past 8 years. He is sensitive to
budget constraints, demonstrates a thorough understanding of the tools of
the trade, and possesses problem solving skills to dig through large volumes
of information. His biggest contribution on several of my projects has been
his instinct for establishing project priorities. Mike is resourceful about
finding answers to questions others may give up on. If Mike is satisfied
with the results, you can count on them being defensible. Mike is a team
player."
RK, Precedent-Setting Forensic Examiner
"I have worked with Mike for over
ten years, without doubt, he is the most creative and knowledgeable IT
person I have had the pleasure to work with. No problem has ever been too
big or complicated for him to tackle. He once told me that the limits of the
security function in relation to the IT world was only restricted by my
imagination, I tested him on this statement on a daily basis and I could
never prove him wrong. I would recommend Mikes services to anyone."
PB, VP Corporate Security for a Hollywood entertainment conglomerate
Contact information for
references will be provided on request.
Past Speaking Engagements
Threat Management Conference,
Association of Threat Assessment Professionals, August 29, 2001, “Managing a
Stalker Investigation in the Information Age”
Law Enforcement and Private Security
(LEAPS) Conference, May 14, 2003, “Utilizing the Internet and Computers For
Information, Research And Security Management”
Los Angeles Electronic Crimes Task
Force Quarterly Meeting, August 19, 2004, “Pirated WaReZ, A Case Study”
go to top
|