Attorney Services

Our staff can assist with any litigation or case where a computer was used to store any type of electronic documents. This includes documents, spreadsheets, databases, internet history, photos and any other type of computerized information.

Often files are deleted when a lawsuit is on the horizon. Those deleted files can be restored as long as they have not been overwritten. We can assist you in documenting all relevant files on the computer and present the information in a variety of formats. All files can be saved and stored off to a CD or DVD depending on the size of the files. If the files exceed the size of a DVD we can also put the files on a hard drive at your request.

We employ proven techniques for recovering passwords. If a password is lost or forgotten we can help.

Let us help to ensure that you get all the information from the computer during discovery. Often information is intentionally deleted or hidden to conceal assets. Our staff can forensically examine the computer to verify you get the most for your client.

The possibilities are not limited to your clients. Our trained staff can also assist with internal investigations.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions.


MCLE Training - California MCLE
Minimum Continuing Legal Education

Equip your firm to save clients thousands of dollars by learning:

 •What is Computer Forensics and How Can It Help my Case?

   -Avoid costly discovery motion practices.

   -Gather and preserve the right data at the right time using early discover planning tools.

   -Avoid the traps of improperly identifying, preserving, or mishandling computer data.

 •The Steps of a Forensic Exam.

   -Know how information is gathered and chains of custody are preserved.

   -Observe a live exam demonstration.

 •How to Write Depositions and Declarations that Target Computer Functionality.


Participants can see what an evidentiary image looks like and will understand unallocated space, slack space, and where deleted data resides. Additionally, participants will learn tips on how to formulate reasonable discovery requests and how to successfully challenge unreasonable ones.

This training focuses on a variety of practical material including:

  •  Understanding technology and the terminology of e-discovery
  •   Learn how forensics experts find hidden data.
  •   Ensure that collected data is admissible.
  •   Avoid collecting too much or too little data.
  •   How to protect clients from sanctions for inadequate preservation efforts.
  •   How to identify data needed to support the case.
  •   How to manage e-data once gathered.
  •   Find deleted images and emails

* Learn what computer evidence may be used for:

 a. Child Pornography

 b. Adult Pornography

 c. Financial Fraud

 d. Illegal Software

 e. Illegally Downloaded Movies or Music

 f. File date and time stamps.

 g. Meta Data

     i. What is meta data?

     ii. Where can meta data be found? (Word, Excel)

     iii. What does it contain?

 h. Computer Network Intrusions

 i. Internal Network Intrusions


Prosecutors & Law Enforcement

With our many years of law enforcement and computer experience our staff can assist you in acquiring data from all forms of electronic media. We can assist in all cases where a computer, cell phone or PDA was used. Our staff is experienced in preparing packages for court that provide a complete picture of the crime.

We have investigated many high profile crimes including crimes against children. Our experience ensures that you will you get a clear, concise report of the evidence found in a format ready to add to your case.

Frequently evidence is challenged because the chain of custody is broken. Our professional, law enforcement background makes us experts in this area. We will verify the chain of custody remains intact and not allow the evidence to become tainted. We use proven forensic techniques to make sure your evidence is credible.

Now more than ever cell phones and PDAs are in use by an ever growing number of people. These devices can contain valuable information that can lead to a successful prosecution.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions.


Private Investigators

Email, Instant Messaging, and web site history can all provide valuable information to help you solve your case more quickly. We can assist in the examination of any computer media to uncover additional evidence.

One such example is examining the computer where infidelity is an issue. We can search the computer for any indication of an affair. Often times email is used to keep things quiet.

Additionally, we can assist parents or spouses in examining home computers where suspicion of illicit activities exists.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions


Corporations

Frequently files are accidentally or intentionally deleted by employees. When this occurs, we can assist in recovering files, provided the files have not been overwritten.

Passwords are frequently lost, misplaced or are no longer accessible. We can assist you by determining what password was used in order to allow access to the data.

Our staff can assist with matters involving crime or corporate espionage. Examination of computer evidence can reveal numerous inappropriate activities. We can help identify these activities.

When it comes time to change out your computer equipment we can sanitize your computers to prevent your data from being recovered. Our sanitizing technique meets Department of Defense (DoD 5220.22-M) standard for approval.

Please contact us for further information or if you have any questions.