Forensically sound data analysis and investigation of digital devices in order to produce evidence admited at a court of law or used as intelligence and leverage on internal negotiations.
No matter where your evidence is (computers, cell phones, smartphones, PDAs, servers, ...), our experts are capable of retrieving it for you. This service provides answers to your what, who, when, where and how questions related to any given conflict situation through the analysis of available electronic evidence.
Our forensic experts identify digital traces of activity on suspect devices building the digital puzzle of evidence one piece at a time. When enough evidence has been retrieved to build a clear picture at the lab all, of this information is wrapped-up in a forensic report for internal use or as evidence at a court of law.
Due to the way in which modern operating systems are designed, where performance usually prevails over information security, a forensic expert is capable of recovering deleted files or fragments of data which were previously deleted. The exponential growth of storage devices enables our experts to recover data deleted months or even years ago. Most modern operating systems generate a wealth of data related to the users' activity in a transparent way which users are not aware of. With the tools and knowledge required, forensic experts are capable of analyzing those traces to reconstruct every aspect of user activity on the system.
DATA BREACH, AERONAUTIC SECTOR
Several employees present voluntary resignations at the same time. Management suspects that confidential information and in-house developed tools might end up on a direct competitor.
Our team of experts began the investigation on computers assigned to the twenty six ex employees. Data revealed by those computer forensics prove that strategic corporate information has been stolen. On the resulting forensic report specifics on data theft where provided: patent related intellectual property, source code and a partial dump of the corporate CRM had been retrieved from corporate systems.
We were able to go a step further on the investigation by proving that stolen source code had been slightly altered and was being used and sold by a competitor months after.
Our forensic report became an essential piece of evidence at court allowing quick and successful prosecution.