Cell Phone and PDA Collections:
Retrieved data from a cell phone to determine location of the user at the time of a crime. Retrieved data placed individual at a different location exonerating him from the accusation of murder initially made by the District Attorney.
Identity Theft and Computer Espionage:
Client contacted Forensic & Security Services when confidential information appeared in the hands of a competitor. Our investigation revealed that remote control software had been placed on a PC within the organization. After identifying the source of the leak and the recipient of information, the case was referred to the District Attorney for prosecution.
Family law, child abuse & distribution of pornographic images:
An individual contacted an attorney specializing in family law after seeing pornography for a moment on a home computer screen. The individual’s attorney contacted Forensic & Security Services. Our examination revealed that photographs were taken of a minor and posted to internet forums for profit. The individual was also trafficking in contraband. This matter was promptly reported to law enforcement for prosecution. Meanwhile, our examiner prepared a report of findings in support of a protective order of the minor.
Family law, spousal abuse, & physical battering:
An individual, under pretext of religious guidance, physically abused partner and took photographs with hidden camera for internet posting. Our examination revealed extensive abnormal behavior, supporting the need for a protective order. A protective order was issued. Long term TRO was issued and full child custody was awarded to the victim.
Human resources, Executive’s violation of organization policies:
A senior executive was accused of downloading prohibited content and pornography from the internet. The executive was placed on suspension pending investigation of computer evidence. Our forensic review revealed that multiple users had accessed the executive’s computer, including IT personnel. Forensic review also proved content origin was not downloaded by suspect, but an IT employee, for purposes of having superior terminated. The executive was reinstated without public humiliation and negative exposure to the organization. Perpetrator was referred to law enforcement for prosecution.
Evidence review, due diligence of evidence collected against accused:
Accused, prosecuted for contraband trafficking, conducted review of evidence presented by the Attorney General. Forensic & Security Services prepared Expert Witness Report for defense counsel and provided testimony as to the findings. The accused was convicted of offense after there were no findings of improper handling of the evidence by prosecution.
Computer Fraud Investigation:
Suspect engaged in financial transaction to transfer funds to a foreign bank account. After concluding fraudulent activity, suspect proceeded to erase all personal computer activity using public domain erasure software. All compromising evidence was recovered, including chats, e-mails, pictures, and bank account activity. Case was resolved via plea bargain.
International Data Collection:
International corporation requested data collection prior to sale of subsidiary to a competitor. Collected images for 154 workstations and 27 servers located in the US and Mexico. Delivered all data collected within 96 hours of the clients request and 12 hours before closing of the sale transaction.
Electronic Data Collection:
Fortune 500 client requested data collection from SAN, Databases, Mail Servers and User Server Shares, with over 3 TB of raw files collected. Conducted deduplication, by custodian and delivered in native files for input into review platform.
Expert Witness Testimony:
Cases range from Internet hacking, intellectual property theft, fraud, criminal matters, contract disputes and other civil matters.
Conducted overall information system security assessment for major law enforcement agency. The assessment revealed serious shortcomings in the security posture requiring major organizational changes.
Internal Attack on Medical Records:
Conducted an analysis of internal computers that began exhibiting unusual behavior via an unknown batch file. Investigation yielded not only proof of hacking by a contractor employee but also the name of the hacker once one of the compromised PC’s was analyzed for usage information from the Windows Registry. The investigation led us to the perpetrator’s personal web site where he was planning to provide access to the records in exchange for payment.