Computer Forensics

Since we began offering computer forensics services we have invested in tools with enhanced, powerful capabilities.  They have changed the game in settlement conferences and the courtroom for attorneys like you.

Computer Forensics Breakthroughs

Most important of the many technological breakthroughs has been the integration of computers, phones, and cloud evidence together in the same digital forensic data set or container. Combining the evidence sources into one corpus has enabled qualitatively new forms of integrated and probative analysis. We map out digital connections to show movement of key documents and files between computers, phones, and the cloud. This evidence helps to prove up theft of intellectual property or proprietary data cases. We build a connection graph and a timeline for your adversary’s misappropriated document to show its journey. And how and when it changed along the way. These demonstrative exhibits enable visually persuasive ways of showing and telling your client’s story.

Email, Documents, and iPhone Backups

Our powerful computer forensics tools recover deleted email, documents, and iPhone backups from laptop and desktop computer drives. iPhone backups are time capsules the computer’s user may be unaware of or ignore. But when examined in our lab we can reveal all the recoverable mobile evidence from that iPhone backup from the past. It may include live and deleted text messages, calls, contacts, and mobile app evidence.

Artificial Intelligence for Smart Computer Forensics

We employ the latest artificial intelligence and machine learning tools to categorize automatically your client’s computer forensics evidence. AI spots photographs that show smart phone or laptop screen grabs of text messages, documents, or ID cards ordinarily unsearchable. AI also analyzes and classifies chat and text messages for sexual harassment in employment investigations. It makes evidence reviews and reports showing material evidence easy and cost-effective.

Web Browsing and Google Search Evidence

Regularly we find Internet and web browsing evidence on Windows and Mac computers which reveals Google or Bing searches that often go to the user’s intent and motives. Our computer forensics tools also provide useful clues from the computer’s browser sessions about the user’s foreseeable cloud storage accounts like Dropbox, Google Drive, and OneDrive. Often we can recover their contents from documents and files in the cloud. Our computer forensics tools also identify anti-forensic software installed on the computer for wiping and erasing data which may signal the intentional destruction of evidence. As a result we have become experts in spoliation cases.

Computer Forensics FAQs

What is computer forensics?

Computer forensics involves identifying, preserving, collecting, processing, analyzing, and reporting on digital evidence using highly sophisticated software and hardware tools and scientific methods acceptable in courts of law. Computer forensics when done properly changes no evidence on a computer, its hard drive, or other storage device.

Do you perform acquisitions of computer evidence on site at a client’s business?

Yes, we will collect on site, often after hours or on weekends, at the convenience of the client. We prefer to do the analysis our lab which is more cost effective.

How much does a computer forensic acquisition and analysis cost?

It’s difficult to accurately estimate total costs upfront. There are many unknown factors and analysis opportunities to consider before evidence collection and preliminary analysis. Carney Forensics strives to provide the best service in the most cost-effective manner. From the initial call through final reports or courtroom testimony, our experts work closely with each client to ensure they have the information they need to make good decisions and prioritize analysis opportunities and weigh costs against benefits throughout the investigation or matter.

What are examples of digital evidence?

Digital evidence has been critical to our clients’ cases including operating system and app artifacts which establish or support claims of theft of intellectual property, document forgery, evidence spoliation, text message deletion, and existence of an alternate perpetrator. For more specific examples of digital evidence, please see the Carney Forensics case studies.

What do you charge for storage of evidence?

Carney Forensics will store client’s data for three months at no charge. If you would like us continue to store your data, we charge $50 per month.

How long do computer forensic examinations take?

The answer depends on numerous factors. This is why it’s important to call us and talk to our project manager about the evidence to be recovered. Once we understand your case and the evidence you need, we can give you a ballpark estimate. The volume of data on the devices, how much searching and filtering is needed, and what other analyses are required will influence the time required.