Digital forensics expert

Digital forensics expert
Digital forensics expert

When you look for a digital forensics expert, here’s what to look for. You trust a professional mechanic with your car, a professional plumber with your pipes, and a professional healthcare provider with your health. Shouldn’t you trust a professional with your digital forensics? There is hardly any crime committed in today’s environment where a digital device is not somehow involved; a cell phone used for texting, a tablet to record images, a computer to capture documents.

If you need to extract, analyze and preserve data from a computer, cell phone, or tablet you need a forensic specialist who has the expertise to handle fragile data and current knowledge of all applicable laws. Electronic forensics is not the place for the “do-it-yourselfer” or even for the office IT ‘expert’.

Digital forensics is a discipline of collecting and analyzing data from computer systems, networks, wireless communications and storage devices in a way that is admissible as evidence in a court of law. [Source: http://www.us-cert.gov/reading_room/forensics.pdf]

UCMJ Investigations has a Certified Computer Forensic Examiner and Certified Hacking/Forensic Examiner available to provide expanded computer and cell forensic service with the convenience of one-stop shopping. We present our findings in professional reports that reflect our adherence to all relevant laws and procedures and meet courtroom standards of admissible evidence.

If you are not sure you need a forensic examiner, consider these four case studies:

Digital Forensics Case Study #1

Unable to determine why the business was declining, a business owner uncovered information that suggested that one of his senior employees was approaching long-term clients with lower pricing and expanded services. The client had talked to the local police and surrendered his computer. The local police were not able to sufficiently examine the computer to determine if data had been accessed or removed, so they forwarded the computer to us.

Result: We conducted a forensic examination and reported back to the client that one of his managers had indeed accessed the customer database and deleted specific customer information. By tracking the computer logs and auditing edits of the software, we were able to establish when the data was accessed and who the person was that obtained the data.

Update: We are awaiting further instructions from the client and his attorney in their civil case against the manager.

Digital Forensics Case Study #2:

Business owners became concerned when two employees failed to show for work. Upon checking the offices, they found that the desks had obviously been cleaned out and personal effects removed. They checked the office computers and found that the accounting and invoicing system had been altered and many documents were missing. Our forensic examination of the computer systems established the date the files were accessed and deleted, which coincided with the last night the employees ‘worked late’. Faced with a civil suit, the former employees admitted to stealing invoices, client lists, order history and other proprietary data with the intent of opening their own business and approaching the existing clients.

Result: disaster avoided and reputation saved

Digital Forensics Case Study #3:

A local business had reason to suspect that a long-term, trusted employee was downloading confidential information from company computer systems and providing that information to outsiders. Some of the information could cause severe damage to the business reputation and confidence of their customers. The business owner, our client, requested that we review their computer systems and identify any possible compromises of proprietary information and identify if any employee had disclosed confidential information.

Result: Our analysis supported their concerns, and the company elected to terminate the accused offenders. Additional safeguards were placed on the system and criminal/civil actions were initiated against the alleged perpetrators.

Digital Forensics Case Study #4:

A defense attorney became aware that his client might be accused of a crime and wanted to proactively verify his story. At the same time, the attorney wanted to preempt any allegations of much more serious wrongdoing. UCMJ Investigations obtained the cell phone of the client and imaged the contents to be used later in the event that additional accusations were made.

Result: This gave the attorney an exact image of the phone as it was when the issue first surfaced, and gave him a solid start to appropriately and proactively defend his client.

How can UCMJ Investigations help you protect your business? We have taught and developed computer forensic courses for several companies and law enforcement agencies, and we can work with you to improve your knowledge of pertinent issues. We are certified on the use of the most current forensic software, and we use it to:

  • Determine the origin and destination of text and email messages, even those that have been “deleted”.
  • Uncover pornography, hidden messages or manipulation on company computers
  • Analyze various forms of storage data (CD/DVD, tapes, hard drives) to identify evidence

Don’t risk destroying sensitive evidence. Digital forensics expert examinations can be vital tools for your business… if you understand what they are and how to use them.

The professionals at UCMJ Investigations are skilled at identifying evidence that a fraudster tried to hide or destroy, even if those files were “deleted” months ago. Our forensic investigators use special techniques to extract, analyze, and preserve evidence to make sure it is admissible in court. We present our findings in an easy-to-read, professional investigative report, and we are available to you for follow up and ongoing support.

It is even riskier for untrained people to attempt their vision of a forensic examination. We have actually discovered “forensic examiners” for police departments that are not formally trained and had no certifications. Each mobile device and cellular service provider has unique protocols, which confounds forensic investigation. Also, cell phone media is fragile. Cell phones have a short retention history, which means that information can quickly be overwritten and lost forever. However, in the hands of a trained forensic specialist, a cell phone can yield information you can use to identify and prevent fraud and unethical practices in your business.

Contact the professionals at UCMJ Investigations at 501-515-2868 for a free consultation, and find out what we can do for you!

** If you have a case and are not sure if an investigator can help or contribute to your case, contact us for a free review. **

Scroll to Top