Digital forensics is the rapid systematic and thorough approach used to find evidence and gather material for the support of criminal and civil actions. DigitalDefence is prepared to guide your organization through all stages of a case involving electronic data, from responding to the initial incident to your eventual success in arbitration or court.
In general, this service involves:
- Immediate support to incident response process
- Data discovery relevant to the case; this may include live system forensics, solid media (hard drives and other storage recovered from data systems), network records including logs, and other event and activity records
- Imaging (making a forensically sound copy of electronic data) to collect and preserve the data while maintaining a defensible chain-of-custody to support litigation
- Analysis of the data in the context of the event
- Presentation of findings in a court or to a corporate internal review group
Typically, DigitalDefence conducts data forensics in support of criminal investigations, civil litigation (including serving Anton Piller orders), and corporate internal investigations.
To support your forensic investigations, DigitalDefence can perform the following as part of the Forensics service.
DigitalDefence will initially conduct a forensic readiness assessment to identify your ability to meet the stringent requirements for collecting and analyzing electronic data. This assessment will provide a comprehensive analysis of your current practices as they related to data forensics and incident response. Any gaps between current practices and known most effective practices will be identified and a mediation plan will be submitted.
DigitalDefence’s certified technicians are expertly trained in all forms of forensic data collection according to industry standards; this allows us to provide the strongest defensible position when preparing data for your case.
DigitalDefence has recovered data and conducted forensic analyses on the following:
- Computer hard drives (servers, workstations, laptops, mobile devices) and data storage devices (USB-attached drives, SD cards, etc); forensics has been conducted on all major operating systems (MS Windows, Apple, Linux, BSD)
- Mobile devices (iOS, Android, Mobile Windows)
- Email and social media
- Mobile devices (smartphones, cell phones, tablets)
- Digital devices (car computer systems, GPS units, game consoles, cameras, music devices)
- Applications and databases
- Network traffic
Our investigators have an average of 15 years or more in real-life data forensics experience and are prepared to support litigation or defend our client’s interests in court as expert witnesses. Typical cases that we have provided findings in support of in the past have included:
- Anti-money laundering
- Bank, securities, and insurance fraud
- Breach of company procedures and violations of signed policies
- Child exploitation and luring
- Conflict of interest
- Copyright and trademark infringement
- Corporate espionage
- Corruption, bribery and extortion
- Cybercrime, including hacking
- Data breach
- Divorce, child custody, and other family law matters
- Embezzlement and misappropriation
- Forensic accounting support
- Fraud and misconduct
- Homicide, murder
- Image tampering analysis
- Intellectual property matters
- Internal corporate investigations
- Misuse of corporate resources
- Patent and trademark disputes
- Ponzi and other investment schemes
- Pre-termination investigations
- Recovery of data
- Video surveillance forensics
- Workplace harassment
When acting as expert witnesses in court, our forensic experts have the ability and experience to make complex technical issues (e.g.: encryption, hacking methodologies), clear and easily understood by lay persons in the courtroom, in camera, and at deposition.
Our success is based on a variety of factors, including:
Experience of our investigators – Each forensic specialist has 15 years or more of real-life experience gained in enterprise, military or law enforcement
Legal experience – Our investigators have presented in court and at arbitration hearings; they understand the legal process, and how their findings play a part in the outcome
Strong practices – Digital Defence employs a stringent methodology that was developed in consultation with law enforcement and the legal community. We approach every case as if it will be going to court, and will be subject to intense scrutiny. Our practices support this perspective, ensuring that we are fully prepared to represent and defend our findings
Industry recognition—Our forensic specialists are active members of organizations such as the High Technology Crime Investigation Association (HTCIA). They also possess industry-recognized certifications such as the Certified Information Systems Security Professional (CISSP), the Certified Computer Examiner (CCE), and vendor-specific designations.
Thought leadership—Digital Defence forensic specialists are frequently lecturers, present at major security conferences, and teach practical workshops