aCQUISITION & pRESERVATION

  • Live data acquisition (on- and off-site)
  • Remote data acquisition
  • Forensic imaging
  • De-duplication Electronically Stored Information (ESI) for discovery
  • Interact with government forensic examiners for clients adverse to the government in litigation
  • Interviews with key individuals to identify relevant data sources


 

Answer your questions about

  • What USB devices were connected to a computer
  • What deleted data may be recovered from a device
  • What cloud based storage and data transfer sites have been accessed (Dropbox, Onedrive, etc)
  • Which users accessed particular data
  • Who leaked confidential information to outside parties
  • Whether an attack compromised private data (including credit card numbers), and to what extent
  • Whether an email has been opened, modified, or deleted
  • Whether a user has tampered with or erased data
  • Whether an employee has used company resources to browse contraband
  • Where a data security breach originated


 

MATTER SIZE

  • Single file to complex corporate IT environments with 20+TB of data
  • Single witness interviews to 50+
  • Single custodian collection to 200+
  • Single search term to 5,000+


 

GEOGRAPHIC

  • Client’s site and remote work in all 50 states and the US Virgin Islands
  • International resources to assist with special projects


 

EVIDENCE SOURCES

  • End User - laptops, desktops, tablets, USB drives, cellular devices
  • Network - email servers, file servers, print servers, voicemail server, tape backups
  • Cloud - cloud storage, cloud emails, social media, website
  • Media - pole camera, cellular phones, video camera, photographic camera, digital voice recordings

 

 

CASE TYPES

Intellectual Property Theft

Breach of Contract

Breach of Fiduciary Duty

Wrongful Termination

Regulatory Compliance

Embezzlement

Data Breach

Insider Trading

M&A Due Diligence

Receivership

Professional Malpractice

Criminal Matters

Money Laundering

HIPAA

ITAR

FCPA

Extortion

Terrorism

Probate Fraud

SCA

CFAA