Loading... Please Wait!

Digital Forensics

Theft of intellectual property, recovery of deleted information, suspicious events, and computer security breaches – each of these topics are critical components of litigation and incident response. Application of forensically sound methodologies in evidence collection, handling, and analysis for each of these activities requires experience and attention to detail. The iDS team has a wealth of expertise in assisting our clients with the collection and analysis of forensic evidence on cases both large and small. We are regularly called upon to author expert reports and provide trial testimony on the most complex forensic issues. Further, our team members are experienced authors, having published articles and blogs on computer forensics and electronic discovery.

Best Practices. Corporations and legal teams are often faced with the inability to identify the basic details that are critical in supporting investigations, government inquiries, and lawsuits. While some companies have developed their own internal security and computer forensic teams, many have not – and need to engage outside experts. iDS’ team of former corporate and litigation discovery investigators offers a complete suite of digital forensic solutions, ranging from evidence preservation and collection to expert reporting. Throughout an investigation, iDS offers:

  • Development of a defensible plan for identification and preservation of key evidence
  • Forensically sound (bit-by-bit or logical) acquisition of hard drives, mobile devices, external media, and storage areas
  • Analysis of system settings to identify potential sources of computer manipulation
  • Recovery of deleted and/or overwritten files, folders, and email messages
  • Preservation and analysis of internet activity (including web sites visited), webmail activity, or downloaded materials
  • Email conversation index and histogram analysis
  • Data authentication, including date and time verification for “create,” “modified,” or “accessed” metadata
  • Identification of any prior connected devices as possible sources of relevant evidence
  • Ability to recover password-protected files and uncover previously unavailable information
  • Detailed system and file metadata analysis
  • Recovery of financial records and associated transactions
  • Identification and analysis of instant messaging and chat sessions

The Benefits of Forensic Analysis. We have assisted our clients with a number of different types of cases including: employment, theft of intellectual property, embezzlement, insider trading, and securities matters. iDS will work with your team to identify deleted or seemingly missing information, real or suspected adverse events, potential nefarious data transmissions, and actual event timing.

Have a code from iDS? Click the button to enter your code.