We began collecting evidence from web-based online, or “cloud” accounts, for clients like yours as a plan “B” for challenging litigation and investigations. Often smart phones, tablets, and laptops are destroyed, damaged, lost, or encrypted with a forgotten password. Backups of device data from the cloud, when forensically recovered, have the power to save your case. Today we see cloud forensics playing an important role in litigation and investigations equal to data recovered from digital devices. Cloud evidence is rapidly becoming “best evidence” for civil and criminal cases like yours.
We use world-class cloud forensics tools to collect your digital evidence from private cloud accounts subscribed to by individuals, groups, or institutions. We always obtain legal authorization conferred by a subpoena, court order, or party consent before undertaking cloud forensics collections. We also use these tools to collect public evidence from social media accounts like Facebook, Twitter, and Instagram to support your investigations with new facts and insights. Legal authority is unnecessary for public investigations.
Whatever digital online evidence your client or opposing party may possess or control in the cloud, we have the tools to collect it forensically. We recover cloud evidence from massive, global Internet Service Providers (ISPs) like Google, Apple, Microsoft, Amazon, and Samsung. We forensically collect documents and other digital content from major cloud storage accounts from Dropbox, Google Drive, iCloud Drive, Microsoft OneDrive, and Box. And we recover messages from cloud-based apps like WhatsApp, Snapchat, Hangouts, Slack, Skype, Telegram, Viber, Twitter, Instagram, Pinterest, and multiplayer online gaming environments.
We support electronic discovery for civil litigators by collecting traditional document and email evidence from your client or opposing party. We collect the most popular corporate cloud providers including Google’s G Suite, Microsoft’s Office 365 and SharePoint, and Box which serves business and governments. We also recover critical audit logs from G Suite and Office 365 which verify when and by whom documents were created, modified, and downloaded. This critical information often lays foundation for the cloud evidence upon which your case may turn in summary judgment motions and trials.