- Forensic imaging (preservation of evidence)
- Live acquisition/incident response
- Volatile memory analysis
- Hidden data recovery, deleted files, folders, e-mails, HPA/DCO
- Steganography/encryption/ADS challenges
- Registry, eventlog & UserAssist key analysis
- Malware analysis & breach investigation
- Timeline analysis
- Expert witness testimony
Cell phones and tablets are present in most cases. We have the tools and expertise to present timeline analysis, geolocation data, cell tower reconstruction, malware analysis and system/event reconstruction.
Working with some of the most noted and well respected attorneys in the nation, any questions or legal issues are checked with a number of in-house lawyers with a broad range of expertise.