- Computer Forensics
Computer or Digital Forensics is the science of locating evidence from within digital media. While such practices are often used to support legal proceedings, they can prove to be invaluable to clients ranging from internal corporate investigations, such as employee misconduct or theft of intellectual property, to domestic investigations, such as divorce and marital issues.
Our digital forensic examiners can assist with the following services:
- Matrimonial Disputes- A computer contains a wealth of information which can prove vital during a divorce proceeding.PCI can uncover: websites visited, chats, emails, and financial information that may have been hidden.
- Data Recovery- Recovering deleted data from all types of media such as hard drives, floppies, CD's, DVD's, Flash Cards, and USB drives requires the use of special tools; let the experts at PCI help
- Password Recovery- PCI has the ability to recover passwords as long as legal consent is given to view the data.
- Employment disputes- Proving computer misdeeds of employees in any manner of proceeding including legal actions can be tricky, PCI has the expertise to assist in the matter.
- Email Misuse- Misusing an email account can be a serious crime. If an employee is suspected of misusing company email, PCI is capable of getting to the bottom of the issue.
- Internet Misuse- In today’s technology driven world, the internet can be a great utility when used properly. Determining if employees are spending more time on the internet than actually doing work can be accomplished with the expert knowledge of the PCI staff.
- Fraud- There are many types of fraud that can be committed on a computer. PCI has the knowledge and tools to examine a suspect computer if it has been used to perpetuate one of the many types of fraud.
- Sexual harassment/discrimination- Harassment and discrimination is a very serious and highly sensitive matter. If a party is being accused of such, PCI can recover active and deleted emails, showing the harassment/discrimination against a specific gender or race.
- Theft of intellectual property- Intellectual Property (IP) is tough to detect with the implementation of electronic storage. Determining if employees are stealing company secrets through personal email or by copying the files to an external media (hard drive, CD, DVD etc.) is a process best left to the experts at PCI.
- Unauthorized access to a computer system- Accessing a computer and/or system without proper authorization (otherwise known as hacking) is illegal and a serious crime. Through proper analysis of suspected machines, PCI can determine if someone has illegally gained accessed.
- Destruction or alteration of data- Suspect that data has been destroyed? Who could the culprit be? PCI has the expertise and knowledge to answers these types of questions.
- Mobile Forensics
In today’s world a mobile device has almost replaced the computer. Today, more than 3 billion mobile devices are in use worldwide. The growth for cell phones and the growing number of PC-like features being incorporated into their design are fueling the theory that the cell phone is becoming the new laptop. PCI utilizes its state of the art tools to forensically analyze mobile devices.
PCI has the capability of recovering the following:
- Phone book
- Text messages
- Call history (received/dialed/missed, call durations)
- Pictures and images
- Phone details (phone number, MEI, ESN, PIN, serial number etc.)
- SIM card data
- Forensic Imaging
Forensic imaging preserves digital evidence on a computer, laptop, or server’s hard drive(s) with an exact copy of the original hard drive. The image file contains an algorithm that can prove the original and the copy are an exact, bit by bit, match. This is a smart and cost effective way of capturing evidence for use with a legal case or investigation that may arise immediately or at a later date. Imaging is the industry accepted standard for the preservation of computer based evidence. It is much different than a simple copy or a backup of your data as imaging is a non-invasive method of producing a complete sector by sector copy of an electronic storage device. The imaging process captures all data, including deleted information and data found in unallocated space.
PCI utilizes both hardware and software based solutions to create a sound forensic image. PCI can perform forensic imaging (also known as a forensic acquisition) and store the media in a secured location.
Electronic Discovery, or E-Discovery, refers to discovery in civil litigation which deals with information in electronic format also referred to as Electronically Stored Information (ESI). Examples of the types of data included in e-discovery are e-mail, documents, accounting databases, CAD/CAM files, web sites, and any other electronically stored information which could be relevant evidence in a law suit. The exponential growth in e-discovery has commanded that law firms create an alliance with a reliable electronic discovery service provider to ensure their clients receive the expertise they demand. Precision Computer Investigations has a team of qualified personnel that is dedicated to assisting counsel in addressing electronic discovery prior to the onset of a lawsuit, as well as in the response to current litigation.
With the 2006 changes in the Federal Rules regulating how ESI is handled, along with the majority of business information now being stored electronically and in various operating systems and file formats, having an experienced electronic discovery vendor is more important than ever. The collection, filtering, processing, reviewing and production of ESI can pose increasing challenges each day. Electronic discovery can be costly and resource-intensive if not managed correctly. Perhaps even more challenging is ensuring an organization's processes for collection are fully defensible in court. Done properly, evidence collection can serve as the foundation for ensuring fast, accurate and cost-effective response to e-discovery requests.
PCI is experienced at identifying and collecting ESI for legal proceedings, focusing on active, forensic and archival forms of media. In addition to our thorough understanding of the law, our experts possess the business and technical acumen to help you develop the best course of action for each matter. PCI knows how to maintain and document a complete chain of custody for collected data and ensure accurate and authenticated information. We can help you understand the universe of data and determine exactly what needs to be collected, along with the most cost-effective approach.
The IT staff at any organization may have the technical skills required to collect data, but do they possess the resources, tools and procedures to manage evidence collection in a manner that is defensible in court? PCI works with its clients and IT staffs to develop collaborative collection plans that cover a wide range of disparate sources. PCI helps its clients understand the types of data that should be collected for particular matters, as well as the size, location and accessibility of the potentially responsive ESI. This results in the legal team making informed decisions when preparing for litigation. We also ensure that all collection methods incorporate requirements for downstream evidence processing and review.
Our E-Discovery Specialists can assist you with:
- Records Management
- Preservation & Collection
- Review, Analysis & Production
- Automate the search using any combination of selected criteria
- Cull data at the point of collection, reducing storage costs
- Preserve file metadata
- Create load files and upload to review platform
- Comply with the Federal Rules of Civil Procedure
Clients rely on us to help them mitigate e-discovery costs, risks, and respond to discovery and investigations in an efficient and cost effective manner
- Employee Departure Program
Precision Computer Investigations is pleased to offer the Employee Departure Program, a proactive solution to safeguard against potential litigation and liability. Through its forensics capabilities, this program allows corporations to create a legally defensible copy of the devices used by the departing employee as part of the exit process. PCI uses court approved methods to capture, preserve and analyze electronically stored information (ESI) contained on laptops, computer hard drives and portable digital devices of departing employees. This forensic processes can sustain legal challenges and meet all evidentiary standards.
Every organization faces the prospect of losing several employees every year. When an employee leaves a company, whether to join another company, because of termination or a reduction in force, there is a potential exposure and liability for actions undertaken during their employment. To address this, organizations must properly manage the data that was created or controlled by the departing employee.
What are the key benefits of the Employee Departure Program?
· The ability to drastically reduce costs and legal fees for future lawsuits involving theft of intellectual property, corporate espionage, embezzlement, and fraud. In a 2004 FBI survey, 269 companies reported out of pocket expenses totaling over 141 million dollars from theft of intellectual property, employee sabotage and financial fraud.
· Protection from lawsuits brought against the company by former employees. Some cases include:
Discrimination (gender, race, age and/or religion)
· The Employee Departure Program will also allow human resource departments to defend against a lawsuit by providing an analysis of relevant documents and files and identifying any improper activity by departed employees as well as revealing supporting documentation that can demonstrate the organization's continued compliance or absence of liability.
· Assistance in the discovery process during litigation. An advantage of the Employee Departure Program is that we preserve and maintain the employee data and can produce data in a timely fashion.
· Retrieval of relevant files kept by a specific employee. In some cases, an employee may have important corporate files stored on their computer that no one else had access to. Sometimes, a month or a year later that data becomes relevant and needs to be produced. The Employee Departure Program allows us to easily retrieve that data from the hard drive.
· The capability to retrieve deleted data from an exiting employee. When an employee leaves a company, more often than not, they have a tendency to delete most of their data from the hard drive. This data may contain vital company documents or important company related emails. As an additional service to the Employee Departure Program, Precision Computer Investigations can conduct a forensic examination which may be used to recover deleted files.
- Internet Infidelity
These days, a cheating spouse is not uncommon. With modern technology in today’s world, a person looking for an affair doesn’t even have to leave the convenience of their own home. The ease of internet chat rooms, instant messaging, online dating sites and secret email accounts has caused a rapid increase in extramarital affairs.
Some of the signs of a cheating spouse:
· The cheating spouse is spending an unusual amount of time on the computer.
· Internet web browser history list (record of web sites visited) contains unusual sites.
· The cheating spouse begins to use new or free e-mail account.
· The cheating spouse is suddenly deleting e-mail messages.
· The cheating spouse is involved in chat sessions or instant messaging.
PRECISION COMPUTER INVESTIGATIONS CAN HELP!
We can uncover relevant information from your computer such as: deleted files, internet history, emails, images viewed, and chat history. We have the knowledge and advanced tools to find and uncover the information you need.
- Hard Drive Destruction
Personal computer hard drives can contain personal information such as bank account numbers, medical records, social security numbers, credit card numbers, family names, personal and professional contact information, as well as other personal information.
Business and/or corporate hard drives can contain proprietary, patient, customer, credit information as well as intellectual property. If put in the wrong hands, companies are held liable if the data is used for fraudulent or illegal activities.
Simply formatting a hard drive cannot remove the data contained on it. When a hard drive is formatted or a file is deleted, it is still possible to recover information. With most operating systems, files that are deleted are not really “deleted”. In most cases, the only thing “deleted” is the index tab pointing to the file, enabling the discovery of confidential data. When getting rid of an old computer making sure all the data is gone forever can be tricky, as not all methods of hard drive destruction are effective. PCI has the computer forensic expertise to know what methods work for permanently erasing data. We provide a quick and affordable service to our clients; sanitizing, or cleaning, old hard drives in preparation for donation, sale, recycling, or being put in the trash. This permanently erases sensitive data on a hard drive, using special hardware. This is accomplished by overwriting all of the data on the hard drive. Utilizing this method results in the data being un-recoverable, leaving a confident feeling that sensitive information is completely destroyed. We verify that all data is erased and issue a Certificate of Destruction for all sanitized hard drives.
We meet the U.S. Department of Defense standards (DOD 5220.22-M) of sanitizing hard drives.
PCI offers the convenience of completing the work on-site at your home or business.
Note: Precision Computer Investigations, LLC can backup data for an additional fee.
- Computer and Internet Monitoring
Precision Computer Investigations, LLC offers a Computer and Internet monitoring service to home users and businesses, using industry leading software.
Using this software, parents can view their child’s chats, instant messages, emails, web sites visited, searches, MySpace activity, pictures posted and viewed, keystrokes typed, and the programs run. This information could then be sent in e-mail format to parent's in an attempt to keep the monitoring discreet.
Companies can use this service to monitor employee productivity, the leaking of company confidential information, employees involved in illegal or unethical activities, and other security issues.
Precision Computer Investigations, LLC will install the software on our client’s machines, customize it to their preferences, and provide personal training on the use of the software.
- Virus/Spyware/Malware Removal
In 2009, the number of known malicious programs according to Kaspersky Lab (world’s largest privately held anti-malware company) reached 33.9 million. While some cause minimal damage, there are many that can cause harm and destroy data in seconds.
Viruses and Spyware are becoming more destructive and harder to protect against. The new breed of viruses, trojans and worms are very difficult to remove once your system is infected.
One of the most common ways to get a computer virus is to receive an infected file (such as an EXE or COM file, or a Microsoft Word document or Excel spreadsheet) through file sharing, by downloading it off the Internet, or as an attachment in an email message. Another way is by connecting an external media source (USB thumb drive, microSD card, external hard drive etc.) to your computer. No matter the source, Precision Computer Investigations will help you with computer virus recovery.
If you do contract a virus - do NOT panic! Resist the urge to reformat or erase everything in sight.
We can restore your computer to like-new performance by removing Spyware / Malware / Adware, Hijackers and Viruses from your system using our extensive array of removal tools and programs