Digital Forensics

Discerning Truth in Data

Specializing in electronic evidence, audio/video recovery and enhancement, employment litigation, theft and exfiltration of intellectual property, marital dissolution, eDiscovery, incident response, breach investigations and fraud.

Contact Us

Evidentiary Precision

No evidence is left behind. All potential evidence in our cases are analyzed using precision equipment, software and tested, proven, forensically sound practices. Exhaustive measures are taken against corrupted media, deleted files, hidden evidence and encrypted drives.

The extent of the evidence is determined by a willingness to examine and reconstruct the root cause of an artifact. Computer forensics is a rapidly changing field; to ensure a full capture and analysis of all evidence, not only must the latest tools be used, but also a wealth of experience to accompany them.

For example, in every version of Windows, system logs often change in subtle ways that can obfuscate critical information. Likewise, different versions of programs present nuanced challenges in locating key data files. In mobile forensics, the field is even more diverse — absent a very fresh understanding of the latest mobile operating systems, even the most seasoned examiner will miss important evidence.

macOS Forensics Timeline

Our Services

iPhone iOS System Forensic Imaging

Expert Witness Services

Experienced, forensically sound practices on state and federal, civil and criminal matters. Working with some of the most noted and well respected attorneys in the nation.

Computer Forensics

Expertise in hidden data, corrupted media and system log analysis; evidence reconstruction. Complete timeline analysis and artifact recovery.

Mobile Forensics

Extensive timeline analysis, geolocation data, system logs and cell phone examinations. Cell tower reconstruction and malware analysis.

Forensic Services

Forensic imaging (preservation of evidence)
Live acquisition/incident response
Volatile memory analysis
Hidden data recovery, deleted files, folders, e-mails, HPA/DCO
Steganography/encryption/ADS challenges
Registry, eventlog & UserAssist key analysis
Malware analysis & breach investigation
Timeline analysis
Expert witness testimony (state and federal)

Contact

Available 7:30am - 11:30pm (7 days a week)