Computer Forensics

UNVEILING THE HIDDEN PIECES

Utilizing advanced, innovative techniques and our in-depth experience, we recover and reconstruct digital Information that someone might be trying to hide. We find out exactly how a computer was used, and we clearly report the facts. All of our materials are presented on a secure online site, allowing you to easily and safely review your data.

We know that litigation is a huge challenge even before you get anywhere near the courtroom. Today, evidence is everywhere—from computers and servers, to cell phones and tablets, the amount of data available is nearly endless. Wading through oceans of data can be overwhelming and time consuming, but this is where Computing Source offers an edge.

Our dedicated specialists are extensively trained and experienced in the art of investigation and computer forensics, ensuring we cut through the clutter and hone in on the most important facts for your case.

Our experienced forensic consultants know how to follow the data and see where it goes.  While a bring-your-own-device policy generally represents a security vulnerability, the silver lining is that users will frequently back up their mobile devices to their computer—sometimes unknowingly.  As a result, there is often a wealth of information there that can be accessed.  Employees will sometimes go to great lengths to try and cover their tracks, and establishing a likely timeline for altering, erasing or removing files is key.

Our forensic professionals dig deep into the digital depths of the machine, going beyond basics like internet history and email records to find hidden traces of suspicious behavior and using advanced techniques to recover deleted files.  They can use hash values as a digital fingerprint (a hash value is a unique value for every file or document) to identify your proprietary files.  If one of those proprietary files shows up on a former employee’s home computer or a new company’s system, they need to explain why and how it got there.  Sometimes the removal of intellectual property genuinely is inadvertent. A former employee may not have realized that their old thumb drive had proprietary data on it, for example. But in other cases, the theft is much more significant—and the intent is clear.

If a theft is confirmed, you need to be prepared to take action. If the user was accessing Dropbox to execute the removal of files, for example, it may be necessary to go after that Dropbox account. If any USB devices were being attached to the computer, they will also need to be accounted for.  Once you start going after personal computers or another business’s computers things can get messy.  You may need to seek injunctive relief from the courts, and the resolution may include everything from outlining deletion protocols for sensitive data that has been removed, to perhaps even stopping the former employer from working.  In contentious cases, a legal settlement is not uncommon.  To get to that point, however, you need to be smart in the wake of a termination or high-level departure—and you need to preserve evidence and protect your ability to identify and prove when intellectual property theft has taken place.

Computing Source is equipped to help you with all of this and has a track record of provable results!

 

 

  • I’ve been in the legal industry for over 30 years.  As a former litigation paralegal, I know what it is like to work on a case for years and get caught up in the complexity of working up a case for trial.  As a former owner of Evidence Express, a leading demonstrative evidence firm, I have helped hundreds of lawyers tell their story using compelling, persuasive graphics.   Making the complex simple takes time, creativity and hard work.  We  help the attorney explore and decide what facts fit and which story lines are most persuasive.  Our creative team helps develop visual aides to emphasize the key evidence but more importantly, provide simple and persuasive themes.  In simplicity, there is power.

    Theresa (Tess) Brady, Director, Demonstrative Evidence Group of Computing Source
  • We are an all in one document support company that assists you from the beginning to the end of your trial preparation.  Anything from copying, scanning, trial boards, data processing – we do it all plus some!

    Alex Gomez, Account Executive (Chicago)
  • We are a full service litigation support service for law firms and corporations throughout the Midwest ... which includes everything from forensic collection, data hosting, electronic discovery, paper productions and various trial prep services; including demonstratives, video deposition to expert witness testimony.

    Rik Neace, Account Executive (Chicago)