Computer Forensics

Since we began offering computer forensics services we have invested in tools with enhanced, powerful capabilities.  They have changed the game in settlement conferences and the courtroom for attorneys like you.

Computer Forensics Breakthroughs

Most important of the many technological breakthroughs has been the integration of computers, phones, and cloud evidence together in the same digital forensic data set or container. Combining the evidence sources into one corpus has enabled qualitatively new forms of integrated and probative analysis. We map out digital connections to show movement of key documents and files between computers, phones, and the cloud. This evidence helps to prove up theft of intellectual property or proprietary data cases. We build a connection graph and a timeline for your adversary’s misappropriated document to show its journey. And how and when it changed along the way. These demonstrative exhibits enable visually persuasive ways of showing and telling your client’s story.

Email, Documents, and iPhone Backups

Our powerful computer forensics tools recover deleted email, documents, and iPhone backups from laptop and desktop computer drives. iPhone backups are time capsules the computer’s user may be unaware of or ignore. But when examined in our lab we can reveal all the recoverable mobile evidence from that iPhone backup from the past. It may include live and deleted text messages, calls, contacts, and mobile app evidence.

Artificial Intelligence for Smart Computer Forensics

We employ the latest artificial intelligence and machine learning tools to categorize automatically your client’s computer forensics evidence. AI spots photographs that show smart phone or laptop screen grabs of text messages, documents, or ID cards ordinarily unsearchable. AI also analyzes and classifies chat and text messages for sexual harassment in employment investigations. It makes evidence reviews and reports showing material evidence easy and cost-effective.

Web Browsing and Google Search Evidence

Regularly we find Internet and web browsing evidence on Windows and Mac computers which reveals Google or Bing searches that often go to the user’s intent and motives. Our computer forensics tools also provide useful clues from the computer’s browser sessions about the user’s foreseeable cloud storage accounts like Dropbox, Google Drive, and OneDrive. Often we can recover their contents from documents and files in the cloud. Our computer forensics tools also identify anti-forensic software installed on the computer for wiping and erasing data which may signal the intentional destruction of evidence. As a result we have become experts in spoliation cases.