Case Work Examples

Below are examples of the types of cases and matters that we are most often asked to work on.  There are many more examples and if you have any matter involving computers, networks, data, software, cloud storage, video, email, or anything else digital – please keep us in mind and contact us.

Data and Email Authentication

Data and email authentication are important concepts in cybersecurity and digital forensics. They both involve verifying the integrity and authenticity of digital data and communications. Here’s a brief overview of each concept:

Data authentication:

Data authentication refers to the process of verifying that digital data has not been altered or tampered with. This is typically achieved through the use of cryptographic hash functions, which generate a unique “fingerprint” of the data. By comparing the hash value of the original data with the hash value of the received data, it is possible to determine whether the data has been modified in transit. Data authentication is important in ensuring the integrity and reliability of digital data, particularly in situations where data must be transmitted over insecure networks.

Email authentication:

Email authentication refers to the process of verifying the identity of the sender of an email message. This is typically achieved through the use of digital signatures and encryption. Digital signatures use cryptographic algorithms to create a unique identifier that is attached to the email message, verifying that the message has not been altered in transit. Encryption, on the other hand, uses a secret key to scramble the content of the message, ensuring that only the intended recipient can read it. Email authentication is important in preventing email spoofing and other forms of email-based attacks.

In summary, data and email authentication are critical components of modern cybersecurity and digital forensics. By ensuring the integrity and authenticity of digital data and communications, these techniques help to prevent data breaches, fraud, and other forms of cybercrime.

Employee Theft of Digital Information

Employee theft of digital information can be a serious problem for organizations, particularly those that deal with sensitive or confidential data. If an employee steals digital information, it may be difficult to detect and recover the stolen data. Here are some steps organizations can take to recover from employee theft of digital information:

  1. Identify the stolen data: The first step in recovering from employee theft of digital information is to identify the stolen data. This may involve reviewing access logs and other digital records to determine what data was accessed and by whom.
  2. Secure the remaining data: Once the stolen data has been identified, it is important to take steps to secure the remaining data. This may involve changing access controls, implementing additional security measures, and monitoring for further unauthorized access.
  3. Notify law enforcement: If the theft is significant, it may be necessary to notify law enforcement. They can investigate the theft and help recover the stolen data.
  4. Consider legal action: Depending on the circumstances, it may be appropriate to pursue legal action against the employee. This can help to recover any damages caused by the theft and deter future thefts.
  5. Implement policies and training: To prevent future thefts, it is important to implement policies and training programs that educate employees on the risks of digital theft and the consequences of violating data security policies.
  6. Conduct a post-incident review: After the theft has been addressed, it is important to conduct a post-incident review to identify areas for improvement in data security policies and procedures.

Recovering from employee theft of digital information can be challenging, but by taking swift action and implementing effective security measures, organizations can minimize the damage caused by the theft and prevent future incidents.

Detection and Prevention of Employee Digital Theft

Employee theft of digital information can be detected and traced through various means, including:

  1. Monitoring employee activity: Employers can use monitoring tools to track employee activity on company computers and networks, including emails sent and received, websites visited, and files accessed.
  2. Audit trails: Audit trails can be used to track who accessed what information and when, making it easier to identify suspicious activity.
  3. Access controls: Access controls can be put in place to limit access to sensitive information and ensure that only authorized employees can access it.
  4. Forensic analysis: Forensic analysis can be used to recover deleted files and other digital evidence that may have been erased by the employee.
  5. Interviews and investigations: Interviews and investigations can be conducted to gather evidence and identify potential suspects.

Once a theft has been detected and traced, appropriate legal action can be taken to hold the employee accountable and recover any stolen information. This may include civil lawsuits, criminal charges, or employment termination. It is important for employers to have strong policies and procedures in place to prevent employee theft of digital information and to take swift action when it does occur.

Early Preservation of Digital Evidence

Early preservation of computer data is critical in legal matters as it helps to ensure that important electronic evidence is not lost or destroyed. In today’s digital age, data is increasingly stored on computers, servers, mobile devices, and in the cloud. If a legal case arises, the data on these devices may be critical to the outcome of the case.

By preserving data early, legal teams can ensure that important electronic evidence is not lost or destroyed. This allows them to examine the data and gather insights that can help build a strong legal case. Additionally, early preservation of data can help to prevent spoliation, which occurs when data is intentionally or unintentionally destroyed or altered.

When data is preserved early, it can also help to reduce the risk of costly legal disputes. With electronic evidence preserved, legal teams can quickly review the data and gain insights that can help to settle disputes and avoid lengthy legal battles.

The early preservation of computer data is a critical step in any legal matter that involves electronic evidence. It ensures that important information is not lost, helps to prevent spoliation, and can provide valuable insights that can be used to build a strong legal case or settle disputes more quickly.

Vehicle Accident Analysis

Computer and cell phone forensics can be valuable in investigating vehicle accidents, especially in cases where distracted driving may have played a role. Here are some ways in which computer and cell phone forensics can be used in vehicle accident investigations:

  1. Cell phone records: By analyzing cell phone records, investigators can determine whether a driver was using their phone at the time of the accident. This can help establish whether distracted driving played a role in the accident.
  2. Vehicle black boxes: Many newer vehicles are equipped with event data recorders (EDRs), also known as vehicle black boxes. These devices capture data such as vehicle speed, braking, and acceleration, which can help investigators reconstruct the events leading up to an accident.
  3. GPS data: GPS data from cell phones or vehicle navigation systems can provide information on the location and speed of the driver at the time of the accident. This data can be used to determine whether the driver was speeding or violating traffic laws.
  4. Computer analysis: If a driver’s computer or other electronic devices are seized as part of an investigation, forensic analysis can reveal information about the driver’s activities leading up to the accident. For example, if the driver was browsing social media or sending emails while driving, this can be determined through computer analysis.
  5. Witness testimony: In some cases, witnesses may have captured video or photos of the accident using their cell phones. These images can be used as evidence in a legal proceeding.

Overall, computer and cell phone forensics can play an important role in investigating vehicle accidents and determining the causes of these incidents. By analyzing digital data and other evidence, investigators can gain a better understanding of what happened and hold responsible parties accountable for their actions.

Success Stories

Computer forensics has played a critical role in many legal cases by uncovering valuable evidence that has helped to win the case. Here are a few examples:

  1. Intellectual property theft: In a case involving intellectual property theft, a computer forensics expert was able to recover deleted files from the defendant’s computer that showed they had stolen confidential information from the plaintiff’s company. The evidence presented by the computer forensics expert was key to proving the plaintiff’s case and resulted in a favorable outcome.
  2. Fraudulent activity: In a case involving financial fraud, computer forensics was used to analyze the defendant’s computer and financial records to identify patterns of fraudulent activity. The evidence presented by the computer forensics expert was instrumental in proving the defendant’s guilt and resulted in a successful prosecution.
  3. Employee misconduct: In a case involving employee misconduct, computer forensics was used to analyze emails and other electronic data to prove that the defendant had engaged in inappropriate behavior. The evidence presented by the computer forensics expert was key to convincing the jury of the defendant’s guilt and resulted in a successful verdict for the plaintiff.

Overall, computer forensics has been a critical tool in many legal cases by uncovering valuable evidence that may have otherwise been lost or overlooked. By using sophisticated techniques to analyze electronic data, computer forensics experts can help attorneys build a strong case and ultimately win the case for their clients.



Digital Evidence Collection & Preservation

Computer data changes quickly and can be easily lost.  It is crucial that potentially relevant digital information be properly preserved for you to be successful in litigation or any legal proceeding.  We use sophisticated hardware and software tools to collect and preserve information from any platform; computer/laptop, servers, cellular phones and devices, DVR systems, cloud-based accounts, and many more devices and sources.  While your case may not require expert services at its inception, we urge you to consider having us proactively preserve relevant digital data in a defensible format.  This is a cost-effective form of insurance and will help you avoid claims of spoliation down the road.

Data Authentication

Computer data can be altered in attempts to make it appear other than what is represented.  We can detect and report modifications to photographs and data files.  In addition, we can prove the authenticity, or lack thereof, of date-based information when documents are attempted to be back-dated.

Employment Investigations

When employees, especially top-level personnel, depart, we assist in preserving their computer activities to identify files that they may have viewed, copied, transferred, or deleted during the time leading to their exit.  To avoid losing important clues, it is critical that you and your client act swiftly to have this analysis performed prior to the computer being used by others and especially before having it handled by internal IT staff.  If company proprietary information has been copied or otherwise transferred, we give you the information to pursue remedies swiftly to mitigate use of company-owned information inappropriately.  We identify use of removable storage devices, internet history, cloud and email transfers as well as many other indicia of data transfer and use.

Cellular Device Usage Tracking

We identify cellular device geolocation and usage timing.  This is often used in connection with vehicle accident investigation or to prove location and timing of other activities.  We corelate information from cellular providers with information tracked on individual devices to establish the series of events surrounding the event in question, and we are qualified to present the information in a forensically sound manner in court proceedings.

Expert Witness Testimony

We have years of experience and have been qualified in numerous venues to present digital evidence in court and other legal proceedings.  Digital evidence is complex and requires specific protocols in order to be admissible.  We are also available in a consulting role to help you interpret and navigate the complicated arena of electronic evidence.

Electronic Discovery Consulting  

Vendor based e-Discovery is not e-Nough.  We help with complex searches and protocol negotiation with all forms of ESI.  We are also very experienced with project management, cost containment, data processing to format ESI for processing, management of document reviews including statistics, completion estimates, and staffing, Assist attorney with hosted systems through local, live, and on-site service.

And Much, Much More….

We are confident that our services will be helpful in any situation you have involving digital evidence.  We have worked with both Plaintiff and Defendant counsel, in both civil and criminal matters.  We offer many more services including Cyber Security, Internal IT personnel training in litigation protocols.  In summary – if your case involves anything computer-related, we can help.


Experienced.  Cost-Effective.  Expert.  Insightful.