Uncover Hard to Find Data to Improve Outcomes

Advanced Discovery’s team of full-time, certified forensics advisors and investigators are experts in data acquisition, analysis and recovery, as well as collection and preservation of evidence—across all of the most widely used data types, sources, platforms and devices.

Our Data Forensics Experts

Our Certified Data Forensics Examiners, throughout the U.S. and in the U.K., help clients around the world uncover data that can make or break cases, utilizing state-of-the-art technology and forensically sound procedures and tools. They are experienced in courtroom preparation and testimony and deliver trial-proven, comprehensive reports of all findings.

Advanced Discovery’s forensic data experts are recognized as leaders in their field – and considered critical assets by our clients because they:

  • Have worked extensively with corporate attorneys, outside counsel, internal investigative staff, and law enforcement in hundreds of jurisdictions around the world. Some also hold government clearances.
  • Represent a unique blend of experience and skill in information security, investigative techniques, forensic data analysis, jurisprudence and litigation support.
  • Use our state-of-the-art, forensically sound and verifiable technology and techniques to identify, capture and preserve information via a range of methods:
    • Physical or logical forensic imaging
    • Targeted, remote collection
    • Cross-verified collection of mobile devices and data from social media
    • Forensic recovery and analysis
  • Provide well-rounded perspectives on requirements and limitations surrounding computer forensics and Federal Rules of Civil Procedure (FRCP) in the U.S. and Civil Procedure Rules (CPR) in the U.K.

Where We Are

Mobile Device Data Review

Advanced Message ReviewSM converts mobile device images into a format that can be easily understood, searched, analyzed and reviewed.

This patent-pending innovation optimizes your review of mobile data by:

  • Normalizes mobile data, like texts and chats, from multiple sources
  • Threads, formats and displays individual messages with known visual messaging cues for faster and higher quality review and coding
  • Facilitates the usage of analytics features to reduce and prioritize documents for review
  • Compatible with all major review platforms, including Relativity®

Non-Standard Data Sources

Our forensic examiners are also well versed in complex data acquisition methods and have succeeded in fast-paced litigation involving a variety of non-standard and proprietary data sources and scenarios.

We employ cross-validation methodology on phone acquisitions—relying on a variety of platforms and techniques to fully explore each data source–to ensure you get all possible evidence, including:

  • Various types of Apple hardware including iOS devices, MacBooks and legacy desktop systems
  • New-to-market smart phones and tablets
  • Legacy and unsupported dumb phones
  • Proprietary corporate databases
  • Cloud storage environments to include iOS backups of iPhones and iPads synced automatically or arbitrarily by end-users
  • SharePoint servers

Expert Testimony

Our forensic examiners have testified in numerous criminal and civil proceedings, in jurisdictions around the world. They bring decades of combined experience in law enforcement, information security, data forensics and investigations to every engagement.

Testimonial Highlights:

  • Expert for AMD on the AMD versus Intel antitrust litigation
  • Served as the Expert for Continental and Cirrus Aircraft
  • Testified as a Computer Forensic Expert for the U.S. Securities and Exchange Commission (SEC) in the SEC vs. vFinance Investment Inc. matter
  • Named as Independent Expert for an International Arbitrator
  • Named Independent Court Expert in the NetJapan, Inc., et al. v. StorageCraft Technology Corporation matter

For additional Testimonial Highlights, please click to expand  


In today’s hyper-fast and reactive information environment, investigations are occurring more frequently and quickly than ever.

  • For outside investigations, like Dawn Raids — often coming with no advance warning– organizations must be prepared to act in the most effective manner.
  • For internal investigations, being equipped to move quickly helps companies “get out in front” of situations and reduce risk.

Our experts guide you through the entire investigation, preparation and litigation process as necessary, while ensuring that the chain of custody for evidence is properly maintained. We use state-of-the art tools and proven processes to reduce risk and control costs by establishing a defensible, end-to-end discovery workflow strategy for the investigation.

Whether your organization is engaged in an internal investigation or responding to inquiries from outside agencies or parties, it is always recommended that you use highly qualified forensic investigators. In fact, these services are increasingly viewed as a critical component of effective Governance, Risk and Compliance (GRC) programs and risk reduction strategies.

MEET: Warren Kruse II, CISSP, DFCP, EnCE, MSc

Vice President, Data Forensics

A former law enforcement officer, investigator and author Warren G. Kruse II, is a leader in the cyber security community and co-author of Computer Forensics: Incident Response Essentials. He has been deeply involved in a diverse range of cyber security matters, including theft of trade secrets and intellectual property, Wikileaks investigations, misappropriation of intellectual property, employment disputes and fraud investigations, among others.

MEET: Timothy LaTulippe, CCE, EnCE, MiCFE, NECS, DFCP

Director, Data Forensics

With a Masters in Data Forensics Management, Timothy LaTulippe has assisted in complex investigations in both the public and private sectors, working with government agencies, Fortune 100 corporations and Am Law 100 firms. He is the author of “Working Inside the Box: Real Life Example of GDS in a Forensic Examination,” which was published in The Journal of Data Forensics Security & Law, and “The Need for Targeted Collections in a Diminished Economy.”



SPOTLIGHT: Bring Your Own Device (BYOD) Strategy

With Gartner Research predicting half of employers will soon require employees to supply their own device at work, BYOD is a growing challenge governance and security challenge. Advanced Discovery can help you understand and mitigate these risks, which include:

  • Introduction of viruses, malware and other elements of risk into the organization’s network, file servers, email systems and mission critical infrastructure.
  • The increased likelihood of data breaches, theft of proprietary information and trade secrets and loss of intellectual property.

Our Forensic Examiners and Solutions Engineers address BYOD challenges by:

  • Assessing your existing technical infrastructure and security measures
  • Helping you identify a Mobile Device Management system that’s appropriate for your organization’s needs
  • Identifying known weaknesses in proposed / desirable personal devices and recommending appropriate remediation
  • Assisting in the development of a comprehensive BYOD policy
  • Assisting in the development of Incident Response plans and remediation protocols to be employed in the event of a data breach or other event.


Feature Stories


View all Brochures

Get in Touch