Computer Forensics


Utilizing advanced, innovative techniques and our in-depth experience, we recover and reconstruct digital Information that someone might be trying to hide. We find out exactly how a computer was used, and we clearly report the facts. All of our materials are presented on a secure online site, allowing you to easily and safely review your data.

We know that litigation is a huge challenge even before you get anywhere near the courtroom. Today, evidence is everywhere—from computers and servers, to cell phones and tablets, the amount of data available is nearly endless. Wading through oceans of data can be overwhelming and time consuming, but this is where Computing Source offers an edge.

Our dedicated specialists are extensively trained and experienced in the art of investigation and computer forensics, ensuring we cut through the clutter and hone in on the most important facts for your case.

Our experienced forensic consultants know how to follow the data and see where it goes.  While a bring-your-own-device policy generally represents a security vulnerability, the silver lining is that users will frequently back up their mobile devices to their computer—sometimes unknowingly.  As a result, there is often a wealth of information there that can be accessed.  Employees will sometimes go to great lengths to try and cover their tracks, and establishing a likely timeline for altering, erasing or removing files is key.

Our forensic professionals dig deep into the digital depths of the machine, going beyond basics like internet history and email records to find hidden traces of suspicious behavior and using advanced techniques to recover deleted files.  They can use hash values as a digital fingerprint (a hash value is a unique value for every file or document) to identify your proprietary files.  If one of those proprietary files shows up on a former employee’s home computer or a new company’s system, they need to explain why and how it got there.  Sometimes the removal of intellectual property genuinely is inadvertent. A former employee may not have realized that their old thumb drive had proprietary data on it, for example. But in other cases, the theft is much more significant—and the intent is clear.

If a theft is confirmed, you need to be prepared to take action. If the user was accessing Dropbox to execute the removal of files, for example, it may be necessary to go after that Dropbox account. If any USB devices were being attached to the computer, they will also need to be accounted for.  Once you start going after personal computers or another business’s computers things can get messy.  You may need to seek injunctive relief from the courts, and the resolution may include everything from outlining deletion protocols for sensitive data that has been removed, to perhaps even stopping the former employer from working.  In contentious cases, a legal settlement is not uncommon.  To get to that point, however, you need to be smart in the wake of a termination or high-level departure—and you need to preserve evidence and protect your ability to identify and prove when intellectual property theft has taken place.

Computing Source is equipped to help you with all of this and has a track record of provable results!



  • We are a full service litigation support service for law firms and corporations throughout the Midwest ... which includes everything from forensic collection, data hosting, electronic discovery, paper productions and various trial prep services; including demonstratives, video deposition to expert witness testimony.

    Rik Neace, Account Executive (Chicago)
  • Computing Source works with law firms and corporations, helping them succeed at every stage of their case.  From forensic collections all the way to trial presentation Computing Source has hired leading professionals in each department to provide attorneys the Power To Win.

    Bill Schiestel, Western Regional Director
  • I work for an all-in-one litigation support firm that handles complex issues ranging from forensic collection, hosted environments (with an agnostic approach that fits our client’s needs), electronic discovery, scanning, and copies/blow back, to our trial director team sitting in the hot seat, or creating demonstratives for our clients. I recognize right now isn't the ideal place to meet, but I'm often in your building multiple times a day working with your firm & would love the opportunity to formally meet with you to further introduce my company and to potentially see if there might be an opportunity for us to work together.  I promise to leave the boring sales pitch at the office and I won't take up more than 5 minutes of your time!

    Chad Heilig, Senior Account Executive (Chicago)