Stay Ahead of Data That’s a Moving Target

Even with data volumes exploding—across a whole new range of mobile and IoT (Internet of Things) platforms and devices—you still need answers now. There isn’t time for your legal team to get up to speed on complex and ever-evolving data platforms or your IT team to do the same on defensible forensic practices across multiple jurisdictions.

Our expert forensics advisors assist you with preservation of evidence, forensic acquisition of virtually any data source, data recovery and analysis, and expert witness testimony. We specialize in providing support and assistance in managing investigations, whether initiated internally or by U.S. Federal, State or European agencies, and we also offer tailored assistance with non-forensic collection of both ESI and paper.

About Our Expert Forensic Advisors

Advanced Discovery maintains a full-time staff of Certified Data Forensics Examiners throughout the US and in the UK who are experienced in courtroom preparation and testimony and deliver, in every case, trial-proven, comprehensive yet understandable reports of all findings. We also have access to global experts on-demand based on the jurisdiction and matter.

Our experts:

  • Have worked extensively with corporate attorneys, outside counsel, internal investigative staff, and law enforcement in hundreds of jurisdictions around the world. Some also hold government clearances.
  • Represent a unique blend of experience and skill in information security, investigative techniques, forensic data analysis, jurisprudence and litigation support.
  • Are recognized as leaders in their field, helping uncover data that can make or break cases.
  • Use our state-of-the-art, forensically sound and verifiable technology and techniques to identify, capture and preserve information via a range of methods:
    • Physical or logical forensic imaging
    • Targeted, remote collection
    • Mobile device and social media source collection
    • Forensic recovery and analysis
  • Provide well-rounded perspectives on requirements and limitations surrounding computer forensics and Federal Rules of Civil Procedure (FRCP) in the US and Civil Procedure Rules (CPR) in the UK.
We forensically and defensibly capture data from any source, including
  • Laptops
  • Desktops
  • Workstations
  • Network servers and sources
  • Email servers and sources
  • Social media
  • Cloud-based environments
  • RDBMS
  • RAID arrays
  • Live systems
  • Backup tapes
  • Cell phones
  • Apple systems
  • Phones
  • CDs/DVDs
  • Third party storage sources such as Dropbox and Box.net
  • Webmail and web services such as Gmail and Google Drive
  • Online collaboration services such as Slack and BaseCamp
  • Sharepoint servers
We uncover, collect and analyze:
  • Standard directory files
  • Hidden files
  • Deleted files and file fragments
  • Internet history
  • File access history
  • E-mails and deleted e-mails
  • USB device activity
  • Passwords, Logs and Login IDs
  • Password-protected files
  • Temporary files
  • Encrypted files
  • Stegged files
  • Searches performed
  • Cookies
  • Network traces
  • Time stamp information
 
Get in Touch