Computer Forensics

UNVEILING THE HIDDEN PIECES

Utilizing advanced, innovative techniques and our in-depth experience, we recover and reconstruct digital Information that someone might be trying to hide. We find out exactly how a computer was used, and we clearly report the facts. All of our materials are presented on a secure online site, allowing you to easily and safely review your data.

We know that litigation is a huge challenge even before you get anywhere near the courtroom. Today, evidence is everywhere—from computers and servers, to cell phones and tablets, the amount of data available is nearly endless. Wading through oceans of data can be overwhelming and time consuming, but this is where Computing Source offers an edge.

Our dedicated specialists are extensively trained and experienced in the art of investigation and computer forensics, ensuring we cut through the clutter and hone in on the most important facts for your case.

Our experienced forensic consultants know how to follow the data and see where it goes.  While a bring-your-own-device policy generally represents a security vulnerability, the silver lining is that users will frequently back up their mobile devices to their computer—sometimes unknowingly.  As a result, there is often a wealth of information there that can be accessed.  Employees will sometimes go to great lengths to try and cover their tracks, and establishing a likely timeline for altering, erasing or removing files is key.

Our forensic professionals dig deep into the digital depths of the machine, going beyond basics like internet history and email records to find hidden traces of suspicious behavior and using advanced techniques to recover deleted files.  They can use hash values as a digital fingerprint (a hash value is a unique value for every file or document) to identify your proprietary files.  If one of those proprietary files shows up on a former employee’s home computer or a new company’s system, they need to explain why and how it got there.  Sometimes the removal of intellectual property genuinely is inadvertent. A former employee may not have realized that their old thumb drive had proprietary data on it, for example. But in other cases, the theft is much more significant—and the intent is clear.

If a theft is confirmed, you need to be prepared to take action. If the user was accessing Dropbox to execute the removal of files, for example, it may be necessary to go after that Dropbox account. If any USB devices were being attached to the computer, they will also need to be accounted for.  Once you start going after personal computers or another business’s computers things can get messy.  You may need to seek injunctive relief from the courts, and the resolution may include everything from outlining deletion protocols for sensitive data that has been removed, to perhaps even stopping the former employer from working.  In contentious cases, a legal settlement is not uncommon.  To get to that point, however, you need to be smart in the wake of a termination or high-level departure—and you need to preserve evidence and protect your ability to identify and prove when intellectual property theft has taken place.

Computing Source is equipped to help you with all of this and has a track record of provable results!

 

 

  • I work for an all-in-one litigation support firm that handles complex issues ranging from forensic collection, hosted environments (with an agnostic approach that fits our client’s needs), electronic discovery, scanning, and copies/blow back, to our trial director team sitting in the hot seat, or creating demonstratives for our clients. I recognize right now isn't the ideal place to meet, but I'm often in your building multiple times a day working with your firm & would love the opportunity to formally meet with you to further introduce my company and to potentially see if there might be an opportunity for us to work together.  I promise to leave the boring sales pitch at the office and I won't take up more than 5 minutes of your time!

    Chad Heilig, Senior Account Executive (Chicago)
  • We are an all in one litigation support company that handles all aspects of a lawsuit.  We usually begin with forensic collections and will provide support throughout the discovery process and also support any trial presentation or court reporting needs.

    Dave McIsaac, Senior Account Executive (Chicago)
  • I’ve been in the legal industry for over 30 years.  As a former litigation paralegal, I know what it is like to work on a case for years and get caught up in the complexity of working up a case for trial.  As a former owner of Evidence Express, a leading demonstrative evidence firm, I have helped hundreds of lawyers tell their story using compelling, persuasive graphics.   Making the complex simple takes time, creativity and hard work.  We  help the attorney explore and decide what facts fit and which story lines are most persuasive.  Our creative team helps develop visual aides to emphasize the key evidence but more importantly, provide simple and persuasive themes.  In simplicity, there is power.

    Theresa (Tess) Brady, Director, Demonstrative Evidence Group of Computing Source