Computer Forensics

Computer forensics requires specialized expertise that goes beyond normal data collection and preservation techniques available to end-users or system support personnel.

This process often involves investigating computer systems to determine whether they are or have been used for illegal or unauthorized activities.

Computer Forensics and Electronic Discovery Services

Whether your organization needs computer forensic analysis of a single data element or comprehensive data collections from across multiple integrated business information systems, FSI will work with you to ensure sound and admissible forensic results at the most reasonable price point in the industry.

Computer Forensics

  • Acquisition and preservation of electronically stored information (ESI) wherever it exists
  • Investigation and detailed analysis of ESI
  • Search for deleted information
  • Fraud investigations
  • Evaluation of metadata to recreate time critical events
  • Expert reports and testimony
  • Recreation of device users’ Internet activity

Electronic Discovery

  • Gather, search, filter and produce large volumes of relevant ESI for legal review
  • Balance thorough document collection and review efforts with corresponding costs
  • Efficiently identify documents potentially relevant to litigation
  • Removal of non-relevant data through data filtering, identification and elimination of duplicate ESI, metadata analysis and keyword searching
When retrieving key electronic information is integral to your case, our computer forensics professionals are certified to testify as expert witnesses in fact or opinion.

FSI principals offer their clients a variety of solutions

Verification of Digital Evidence to determine integrity of the computer’s image
Recovery, extraction, and processing of files deleted by a computer’s user to hide evidence

Deleted Email Data
Deleted User Data

Verification of Time Zone Settings
Verification of File Signatures to determine changes in file extensions
Other Pre-Processing items, including execution of queries and scripts to identify additional items in need of analysis
Partition Finder Recovery and analysis to determine spoliation of evidence
Extraction and analysis of web browser history
Decryption of password-protected and encrypted items
Analysis of graphic and picture files
Notable File Identification to classify and segregate the image files whose unique electronic identifier matches the National Institute of Standards Technology list of “known files”
Review of program files for unusual programs or programs of interest (i.e. malware, viruses, disk wiping tools)
Deletion Analysis:

INFO2 Record Review
Deletion Search Terms
Timeline Analysis of deletion habits prior to computer imaging

Request Computer Forensics Information Sheet

Please enter your email address: