Computer Forensics
Computer forensics requires specialized expertise that goes beyond normal data collection and preservation techniques available to end-users or system support personnel. This process often involves investigating computer systems to determine whether they are or have been used for illegal or unauthorized activities. Whether your organization needs computer forensic analysis of a single data element or comprehensive data collections from across multiple integrated business information systems, FSI will work with you to ensure sound and admissible forensic results at the most reasonable price point in the industry.
Computer Forensics
Acquisition and preservation of electronically stored information (ESI) wherever it exists
Investigation and detailed analysis of ESI
Search for deleted information
Fraud investigations
Evaluation of metadata to recreate time critical events
Expert reports and testimony
Recreation of device users’ Internet activity
Electronic Discovery
Gather, search, filter and produce large volumes of relevant ESI for legal review
Balance thorough document collection and review efforts with corresponding costs
Efficiently identify documents potentially relevant to litigation
Removal of non-relevant data through data filtering, identification and elimination of duplicate ESI, metadata analysis and keyword searching
When retrieving key electronic information is integral to your case,
our computer forensics professionals are certified to testify as expert witnesses in fact or opinion.
FSI principals offer their clients a variety of solutions
Verification of Digital Evidence to determine integrity of the computer’s image
Recovery, extraction, and processing of files deleted by a computer’s user to hide evidence
Deleted Email Data
Deleted User DataVerification of Time Zone Settings
Verification of File Signatures to determine changes in file extensions
Other Pre-Processing items, including execution of queries and scripts to identify additional items in need of analysis
Partition Finder Recovery and analysis to determine spoliation of evidence
Extraction and analysis of web browser history
Decryption of password-protected and encrypted items
Analysis of graphic and picture files
Notable File Identification to classify and segregate the image files whose unique electronic identifier matches the National Institute of Standards Technology list of “known files”
Review of program files for unusual programs or programs of interest (i.e. malware, viruses, disk wiping tools)
Deletion Analysis:
INFO2 Record Review
Deletion Search Terms
Timeline Analysis of deletion habits prior to computer imaging