Computer Forensics

Since we began offering computer forensics services our tools have been enhanced with new, powerful capabilities.  They have changed the game in settlement conferences and the courtroom for attorneys like you.

Most important of the many technological breakthroughs has been the integration of computers, phones, and cloud evidence altogether in the same digital forensic data set or container. Combining the evidence sources into one corpus has enabled qualitatively new forms of integrated and probative analysis. We map out digital connections to show the movement of key documents, files, and data between computers, phones, and the cloud. This evidence helps to prove up theft of intellectual property or proprietary data cases. We build a connection graph and a timeline for your adversary’s misappropriated document to show its journey and how and when it changed along the way. These demonstrative exhibits enable visually persuasive ways of showing and telling your client’s story.

Our powerful computer forensics tools recover deleted email, documents, and iPhone backups from computer drives, both Windows and Mac. iPhone backups are time capsules the computer’s user may be unaware of or ignore. But when examined in our lab we can reveal all the recoverable mobile evidence from that iPhone in the past for you including live and deleted text messages, calls, contacts, and other mobile app evidence.

We also employ the latest artificial intelligence and machine learning tools to categorize automatically your client’s computer forensics evidence. We can spot photographs that show smart phone or laptop screen grabs of text messages, documents, or ID cards ordinarily unsearchable. We can also analyze and classify chat and text messages for sexual harassment in employment investigations. AI makes evidence reviews and reports showing material evidence easy and cost-effective.

Regularly we find Internet and web browsing evidence on Windows and Mac computers which reveals Google or Bing searches that often go to the user’s intent and motives. Our computer forensics tools also provide useful clues from the computer’s browser sessions about the user’s foreseeable cloud storage accounts like Dropbox, Google Drive, and OneDrive. Sometimes we can recover their contents from documents and files in the cloud. Our computer forensics tools also identify anti-forensic software installed on the computer for wiping and erasing data which may signal spoliation. We are experts in spoliation cases.

Please subscribe to our newsletter to receive news, events, and other updates: