Go to Top

Our Services

  • Computer Forensics

  • Mobile Forensics

  • Electronic Discovery

  • BSA Software Audits

  • Incident Response

  • Expert Services

  • Digital Investigations

  • Medical Malpractice

  • School District Computer Forensics

Computer Forensics

 

slider_binary_blockOur world is a digital world, and the critical evidence that lies at the heart of most business disputes is often found in Electronically Stored Information (ESI). Computer Forensics is the art and science of applying both highly advanced forensics software and hardware and years of experience to the process of locating, preserving, authenticating and producing electronic evidence.

 

Nearly every incident involving misconduct, diversion of intellectual assets, security breaches, or internal corporate compliance violations contains digital evidence that if uncovered, would prove invaluable in illuminating the event. Often times, the digital tracks unknowingly created by wrong-doers can only be found in electronic form. Even the most sophisticated criminals leave behind digital fingerprints that can unravel their schemes when scrutinized by a talented computer forensics expert. The integrity of your case and a just outcome requires consideration of the electronic evidence, and how this compelling data can bring clarity to even the most complex issues.

 

4Discovery Forensic Process

4Discovery Forensic Process

 

The Data Explosion is Here

 

It is estimated that the total amount of data stored on our planet doubles every 18 months, and boards of directors, attorneys, investigators and corporate security professionals can not afford to ignore this rich source of intelligence when conducting investigations. eMail, text messages, social media sites, smart phones, and Cloud Computing databases are but a few of the ubiquitous sources of potentially relevant evidence in any comprehensive investigation. Electronic evidence is often the best evidence available.

 

 Our Reach is Impressive

 

We maintain a small core group of key employees and an elaborate network of partners that enable us to deliver our services globally. We work in teams….we’re not just a “one man shop”. This provides you with the resources you need when your case expands beyond its initial scope. We are scalable, with a deep bench. Clients in every corner of America and 15 countries have benefitted from our expertise.

 

Speed is Critical

 

We know that your case can not wait. In many investigations, the discovery of electronic evidence is the driving factor in determining your initial case, in making critical decisions, or in persuading a judge to issue that emergency TRO. 4Discovery staff members understand that world, and we are extremely accustomed to mobilizing the resources you need – when and where you need them.

 

Computer Forensics Services

Download “Computer Forensics Services” as a PDF by clicking here.  

 

 

Mobile Forensics

 

Young woman textmessagingThey Are Ubiquitous.

Everywhere we look we see people pecking away at their smart phone keypads. It is becoming clear that ESI from these devices can be a goldmine for those attempting to discover relevant evidence.

 

 

 

Smart Phones can leave behind an indisputable digital trail. The experts at 4Discovery can help you recover this potentially valuable Electronically Stored Information (ESI), and use it to produce a compelling digital time-line of user behavior.

 

Consider this:

 

    • Apple sold over five million iPhone 5 devices since their roll-out in September
    • Analysts predict over 1.2 billion new smart phones will be sold in the next 5 years1
    • 67 million iPads have been sold since hitting the market just a few short years ago
    • Text messaging has over-taken email as the new communication method of choice

 

Mobile Device Forensics Capabilities

Download “Mobile Device Forensics Capabilities” as a PDF by clicking here.  

 

Can You Afford to Ignore This Relevant and Discoverable ESI?

Users are often very careless about the kinds of things they text about and the sites they visit on mobile devices.  Mobile devices contain lots of sensitive date.

    • 34% of users store sensitive data on their mobile devices
    • 55% of users admit sending work emails and company data to their personal email accounts using a mobile device
    • 89% have mobile devices connected to their company networks
    • Many smart phones are in use outside the control of corporate IT security controls

 

We Can Help You Recover this Valuable Data

4Discovery has a record of results in identifying, preserving, and producing ESI from mobile devices and smart phones.  Our services include:

    • The most modern hardware/software for extracting data from mobile devices
    • The ability to examine a wide-array of smart phones and other devices
    • Trained examiners with impressive industry pedigrees
    • Decades of forensics testimony experience to help you authenticate your ESI
    • Support for 8,900 different cell phones, tablets, and GPS devices
    • “BYOD” (Bring Your Own Device) issues consulting

 

 

Top 10 Types of Evidence Potentially Recoverable From Mobile Devices

Some of the ESI recoverable from mobile devices can include…

  1.  Corporate and Personal Email and Web-mail
  2. Text and MMS Messages
  3.  Geolocation data and GPS history
  4.  Documents and files copied from computers
  5.  Internet History and Social Media
  6.  Call Logs and Contacts
  7.  Data from 3rd Party Applications such as banking transactions
  8.  Calendar Entries
  9.  “To-Do” lists and other tasks
  10.  Photographs and Video (including time stamps and location data)

 

ESI stored on a smart phone can be unique, relevant to your case, and discoverable.

  1. “The Latest InfoGraphics, Mobile Business Statistics for 2012″.  Forbes.  Mark Fidelman, May 5, 2012 []

Electronic Discovery

 

Phone4Discovery’s Electronic Discovery strategy is very simple. We plan, we win. It’s as easy as that! We have all of the necessary means and a proven planning process that can help us to evaluate your case and get you the results that you desire. Our entire staff of experts is ready to help create a strategy that will meet the needs of our client no matter what your litigation budget may be.

We have taken the time to streamline what is quite often known as a time-consuming process. With our method of electronic discovery, we are able to provide you with the valuable information that you need in a timely manner. 4Discovery is a true team of professionals that are armed with the knowledge of how to locate and then consolidate the pertinent electronic evidence promptly in order to provide the information that is necessary to chalk up a win in the courtroom.

Electronic Discovery with 4Discovery includes, but is not limited to:

 

    • Data Processing
    • Data Conversion
    • De-Duplication

 

Do you need expert testimony? 4Discovery is prepared and qualified to provide you with expert testimony in the courtroom in terms of Computer Forensics and Electronic Discovery.

Our staff of trained professionals works diligently to expedite the Electronic Discovery process while at the same time aim to keep the costs at a minimum. Just a sampling of the Electronic Discovery services that we provide to all of our clients include:

 

    • Determination of which data is pertinent as well as what is also an appropriate target
    • Clear advice on the best way to minimize disruption of your business in terms of ongoing operations
    • Strategic planning and consulting that results in assisting our client with a comprehensive Electronic Discovery Strategy. The last thing that we want is for you to end up wasting any of your money and/or time on potential dead ends.
    • Looking through all of the evidence in order to find a truly cost effective manner identifying and then locating and retrieving evidence.
    • Identifying and then mapping of networks, email systems and computer utilization along with strict contingency plans that will help to ensure that no evidence is exploited in any way.
    • Professional evaluation and vetting of the opposition’s own Electronic Discovery experts, their technology and subsequent tactics.
    • The articulation of and responses and objections to the requests for production, deposition notices and interrogatories. Additionally, 4Discovery provides an expert witness who is guaranteed to posses quality court presentation skills.

 

 

What can 4Discovery’s proprietary technology provide for you?

 

    • Creation of detailed information maps that help to document the link between any files, metadata and anyone who may have been involved in the sending, receiving or even the modification of the file.
    • Timely search and organization of thousands upon thousands of computer files such as emails
    • Prevention of the chance of inappropriate release of any information that may be excluded or privileged.
    • Submission of graphics to show information-mapping that can clearly demonstrate to a courtroom or negotiating table the flow and relationships involved
    • Exportation to a variety of the popular litigation support databases.

 

 

What exactly happens if 4Discovery comes across damaged, deleted or even hidden data during Electronic Discovery?

 

    • 4Discovery works tirelessly to give our clients the highest level of Computer Forensics services possible. We pride ourselves on giving top notch care to the recovery and restoration of any deleted, otherwise hidden or encrypted emails and files.
    • We stand by our findings and will back our electronic evidence 100% that it will be able to hold up in court. Additionally, we work to make sure that there is a clear chain of custody for all electronic media along with a strict evidentiary path. For all of our clients, expert testimony will be provided.

Electronic Discovery Services

Download “Electronic Discovery Services” as a PDF by clicking here.  

 

 

Business Software Alliance (BSA) Audits

 

ebook_tHave you received a demand letter from the BSA? Need a Software audit?

 

We can help.  The Business Software Alliance (BSA) is established to protect software companies from software piracy. Many companies, however, do not understand the BSA process, and they make critical mistakes that can cost hundreds of thousands of dollars in fines, settlements, and privacy breaches. 4Discovery can help you navigate these complex and adversarial disputes.

We have decades of experience in working with the BSA and technology attorneys. Our Software Audit process documents your compliance and protects your interests and your Intellectual Property at the same time. Working with your attorneys, we can protect our findings as privileged information. Our technology can save you thousands of dollars.

4Discovery uses the most advanced software auditing technology available today, and our experts can deploy this technology with exceptional cost-savings whether you have 10 computers in one office or thousands of computers in multiple locations. Our process is proven and defensible.  We have delivered outstanding results for some of the finest law firms in America.  Ask about our references.

 

BSA Sofware Audits Capabilities

Download “BSA Sofware Audits Capabilities” as a PDF by clicking here.  

 

Our Methodology…

 

    • Protocol and strategy development:  Helping you design a process for performing your audit and preserving electronically stored information.
    • Project Management:  We can manage the process so you can focus on your business.  Our best practices are time-tested.
    • Software scanning:  Installing, administrating, running, and supervising an automated network inventory and software inventory tool.
    • Interpreting the results: and assisting your IT team with reconciling identified software with purchase records.
    • Documenting critical dates and verifying and authenticating your compliance.
    • Expert Reports, to assist you with documenting your good faith compliance initiative.  We can also serve as your audit experts with your attorneys at BSA meetings and conference calls.
    • Follow-up:  Providing consulting and technical expertise to you and your attorneys as you negotiate with the BSA.

 

Incident Response

iStock_000020042572LargeIn the unfortunate event that the security of any system could have been compromised in any way, it is necessary to implement an incident response. 4Discovery’s professional team of experts will work quickly to effectively identify the problem and then implement a proper strategy.

To better explain, an Incident Response is known as an expedited reaction to a specific issue or occurrence. Any time that your security has been attacked in any way, shape or form, this is the process of 4Discovery taking actions to identify and quickly resolve the issue. We work tirelessly to help minimize the possibility of damages and then go through the entire process of restoring resources and attempt to guarantee the integrity of the data in question.

What you can expect from 4Discovery in terms of an Incident Response:

 

    • Reaction, response and recovery
    • Assisting companies in responding to computer incidents (virus outbreak, hacker intrusions, etc.)
    • Assist in designing and implementing an incident response policy
    • Assist in analysis of a data breach
    • Remediation & Best Practices
    • Malware Analysis
    • Intrusion Detection Systems

 

The last thing that you would want is to have to shut down your business because of a security breach. 4Discovery will work with you to ensure that the necessary steps are taken to both protect your security and information but to also form a plan that will help to recover and restore anything that is potentially compromised should a breach take place.

Incident Response Capabilities

Download “Data Breach Investigations” as a PDF by clicking here.  

 

 

Expert Witness Reporting & Testimony

 

Binary handprint4Discovery can provide each and every one of our clients with expert services in a wide range of areas pertaining to Computer Forensics. Today, it is imperative that you have a professional, expert presentation in a courtroom in order to win. We provide nothing but the highest level of expert testimony along with the reports and findings to back it up.

Our track record really speaks for itself. We have a long list of clients who have benefited from our knowledge, expertise and professional testimony in a courtroom backed by our solid findings. Whether you need an expert in network forensics, electronic discovery, computer forensics, security industry practices or more, 4Discovery has the expert to pair with your needs, timeline and of course your budget.

What you can expect from the expert services provided by 4Discovery includes:

 

    • Consulting
    • Early Case Assessment
    • Expert Testimony
    • Daubert Proven
    • Expert Reports
    • Clear and Concise
    • Easy to Read – Non Technical
    • Produced Pursuant to FRCP 26.a.2
    • Affidavits and Declarations
    • Meet and Confer Assistance
    • 30.b.6 Deposition Preparation

 

Because the world of Computer Forensics is always changing and growing, we work to stay on top of the trends so that you do not have to. Knowledge is everything in this field. 4Discovery helps to uncover and work with all of the data and information necessary to help you get the win that you need and desire in a courtroom.

At the end of the day, you are not expected to fully understand all of the key terminology along with all of the electronic discovery phrases that are necessary to back a case in the courtroom. This is where 4Discovery comes in, by helping you to prepare and gather all of the important information. We will meet with you and go over anything that we deem to be pertinent to the situation. Additionally, we will even meet with and confer with the opposing side should the need arise.

4Discovery has gathered a team of experts who work in a professional manner to get you the results that you desire. We do the research, we work on the recovery of information and we stop at nothing to provide clear and concise reporting that will stand up in a courtroom each and every time.

Digital Investigations

InspectionNearly every incident involving misconduct, diversion of intellectual assets, security breaches, or internal corporate compliance violations contains digital evidence that if uncovered, would prove invaluable in illuminating the event. Often times, the digital tracks unknowingly created by wrong-doers can only be found in electronic form. Even the most sophisticated criminals leave behind digital fingerprints that can unravel their schemes when scrutinized by a talented computer forensics expert. The integrity of your case and a just outcome requires consideration of the electronic evidence, and how this compelling data can bring clarity to even the most complex issues.

 

The Data Explosion is Here

It is estimated that the total amount of data stored on our planet doubles every 18 months, and boards of directors, attorneys, investigators and corporate security professionals can not afford to ignore this rich source of intelligence when conducting investigations.  Email, text messages, social media sites, smart phones, and Cloud Computing databases are but a few of the ubiquitous sources of potentially relevant evidence in any comprehensive investigation.  Electronic evidence is often the best evidence available.

 

 Our Reach is Impressive

We maintain a small core group of key employees and an elaborate network of partners that enable us to deliver our services globally.  We work in teams….we’re not just a “one man shop.”  This provides you with the resources you need when your case expands beyond its initial scope.  We are scalable, with a deep bench. Clients in every corner of America and 15 countries have benefitted from our expertise.

 

Speed is Critical

We know that your case can not wait.  In many investigations, the discovery of electronic evidence is thedriving factor in determining your initial case, in making critical decisions, or in persuading a judge to issue that emergency TRO.  4Discovery professionals understand that world, and we are extremely accustomed to mobilizing the resources you need – when and where you need them.

 

 Our Technology Makes a Difference

4Discovery maintains a state of the art computer forensics lab in Chicago with a large collection of the most advanced hardware and software that enables us to handle virtually any type of digital media.  We can handle cases from one single PC to hundreds of computers and servers containing multiple Terabytes of data.  Experienced at managing a wide-array of devices including PCs, Macs, iPads, Servers, and other storage devices, we can handle disparate data types and devices. In addition, our director of cell phone technology is arguably one of the nation’s leading experts on conducting computer forensics on iPhones and other cell phone devices, and our cell phone forensics gear is unmatched. Our collection of computer forensics equipment includes high-speed remote imaging hardware and file server duplication technology that enables the imaging of servers without taking them “off-line,” resulting in no loss of work-flow.  We also utilize portable remote cloning technology for performing covert collections of electronic evidence in field locations, and we can image multiple computers simultaneously, saving time and money.  Our analytics software is some of the industry’s most modern, including tools for the analysis of “key words,” “fuzzy logic,” and relational / data mapping, using powerful technology to illuminate the facts of your case.

 

 Our Methodology is Effective…and Defensible

Typically, we act as members of your investigative or litigation team, collaborating with you, your lawyers, the board of directors, and other stakeholders.  We become your digital evidence “go-to” experts…your trusted advisors.  Above all, our goal is to apply a simple and practical solution to your incident, one that provides the results you need without breaking the bank.  We help you by… counseling you on the most likely sources of digital evidence

 

    • locating potential sources of digital evidence
    • helping you craft a strategy for preserving the evidence and avoiding spoliation
    • creating computer forensics “images” of the data in an evidentiary manner
    • a defensible chain of custody to protect the integrity of the evidence
    • analysis of the data to paint a picture of the computer user’s activity
    • producing relevant Electronically Stored Information (ESI) in a format that enables efficient review of the data, including on-line web-based review platforms.
    • authoring expert reports and testifying

 

 These Things are Delicate

Our computer forensics experts have provided valuable results in hundreds of investigations over the last two decades.  We have the poise and corporate demeanor to address these issues with a C-Suite perspective on the big picture, and an immense measure of delicacy.  4Discovery executives bring security insight, computer forensics talent, and business experience to the table, to maximize the value of your investigative investment, to determine the facts quickly, and to help you move toward resolution with minimal business impact. We constantly critique our approach and systems to ensure our methodology brings a measurable ROI to any investigative assignment.

 

 Regulations Demand You Get it Right

A relentless wave of corporate regulations and emerging legislation have raised the stakes for those tasked with engaging in corporate investigations.  While well intended, these regulations have placed a certain burden on companies and their attorneys to respond to incidents or accusations with urgency and a thorough focus on identifying and preserving critical evidence.  Much of this evidence is in digital form.  Consider these regulations and the impact they have on your legal requirement to seek out the facts, locate relevant evidence, and demonstrate a timely and appropriate response…

    • Sarbanes Oxley
    • FINRA
    • HIPAA
    • HITECH Act
    • Dodd-Frank
    • SEC Cyber-Disclosure
    • FCPA
    • Federal Rules for Electronic Discovery

 What Can Be Found?

A wide-array of extremely valuable electronic evidence can be harvested from computers, laptops, cell phones, iPhones, iPads and portable storage devices.  Some of that evidence can include…

    • Deleted eMails, documents and files
    • The electronic movement of Trade Secrets and other Intellectual Assets
    • A record of any “Hard Drive Wiping” software installed
    • The root cause of a Cyber Breach or hacking incident
    • Websites visited and files downloaded
    • Email and Instant Message Conversations
    • Listing of the recent documents opened
    • Installed Software (Yes…even if it was uninstalled)
    • Contents of documents recently printed
    • A registry of every time the computer was turned on or off
    • A listing of applications recently ran
    • When the computer was put into service
    • When CD’s or DVD’s were burned
    • A record of every device ever plugged into the computer (printers, scanners, USB drives
    • Photographs
    • Manipulation of accounting software
    • Metadata.  (eg., when documents were created, authored, last date accessed, etc.)

 Types of Cases

Almost every case can resolved with greater efficiency with a more comprehensive view when the power of digital forensics is brought to bear.  Advances in technology have created cost-savings break-throughs that permit the application of computer forensics to the smallest of investigative budgets. 

    • Economic Espionage
    • Trade Secret Misappropriation
    • Intellectual Property Disputes
    • Labor & Employment Matters
    • Fraud
    • Theft & Embezzlement
    • Harassment
    • Cyber Incidents & Hacking
    • Computer Fraud & Abuse Act
    • Cyber “Squatting” or brand “Hijacking”
    • Securities Violations
    • Insider Trading
    • Whistleblower Cases
    • Compliance Investigations
    • Foreign Corrupt Practices Act (FCPA) cases
    • Anti-Trust Actions
    • Board-level Internal Investigations
    • Internal Corporate Investigations
    • Litigation
    • Social Media Slander

 

Lawsuit form with a stethoscope

 

 

 

 

 

Medical Malpractice

Download “Medical Malpractice Capabilities” as a PDF by clicking here.  

Screen Shot 2015-11-06 at 2.56.38 PM

School District Computer Forensics

A specialized set of services to address the unique needs of school district administrators and boards. Schools manage and retain vast amounts of digital data… student medical records, confidential student information, and sensitive emails and text messages that in some cases, are required by law to retain. This highly sensitive information is increasingly at risk, and school districts and their attorneys have a board-level requirement to manage that data, protect it, and in some cases, preserve and produce it during internal investigations and litigation.

School District Computer Forensics

Download “School District Computer Forensics” as a PDF by clicking here.

Board Member Misconduct

A school district board member is accused of fraud and financial misconduct related to the misappropriation of school funds. 4Discovery is retained by attorneys representing the school district. Computer forensics analysis is performed on computers and smart phones used by the board member to help determine the facts of the case. The analysis confirms the board member’s wrongdoing and is instrumental in a resulting legal action.

School Official Accused of Harrassment

A high school teacher accuses her principal of engaging in inappropriate workplace conduct and unwelcome personal advances. Computer forensics analysis of the principal’s computers, including the recovery of deleted text messages from his smart phone provide proof of the harassment and are preserved and used in the resulting disciplinary action.

Hacking

A school IT staff member discovers unusual network activity on the school’s servers that could indicate a data breach of sensitive student records. Attorneys for the school retain 4Discovery to conduct a breach response analysis. The investigation concludes that one of the school’s curious and tech-savvy students had in fact broken into the school’s IT systems, access- ing student SAT score information and other sensitive and confidential student data. These findings are instrumental in demonstrating that the data loss was limited in nature and in addressing the disciplinary action with the student.

Social Media Threats

A number of anonymous social media postings are discovered by school officials with an unknown individual threatening to do harm to students and teachers. The social media content is preserved and analyzed. Using computer forensics and social engineering tactics, investigators are able to trace the social media posts to a particular student using a school library computer.

Pornography

While performing a routine software update on a teacher’s computer after school hours, an IT staff member discovers indications of pornography and inappropriate communications with students. The teacher is suspended pending an investiga- tion. 4Discovery is hired by attorneys for the school to preserve and analyze the discovered material as a part of the disciplinary and legal investigation of the teacher.

Cyber Bullying

A junior high school student commits suicide…the reported result of her despondency over being the victim of repeated bullying at school. The student’s parents asserted they had advised school officials of this bullying, but the administrators allegedly failed to take appropriate action. The resulting investigation included the collection, preservation, and analysis of various computers and mobile devices in order to assist with the investigation. A special focus was placed on text messages, social media postings, and email communication between school officials mentioning the student’s name.

4Discovery has significant experience in helping school administrators and their attorneys investigate digital incidents.

These and other incidents pose significant liabilities and risks to school districts, their boards, and employees. Failure to consider and preserve the digital evidence related to these types of events only increase the risks.