Digital Forensic Services

Hot on the digital trail

DIGITAL FORENSIC SERVICES

 
Kelly Office Solutions provides digital forensic services that can help reveal the exact actions taken by an end user. From documents that were accessed, deleted or transferred to remote locations, or understanding a computer user’s internet surfing activities, computer forensics can be very revealing. Because of the insight provided by computer forensics, civil litigation often requires the use of a qualified and experienced computer forensics expert witness to assist with understanding the facts related to a computer’s usage and activities by the purported computer user.

Digital forensics is often necessary to understand what events recently transpired on a computer or Portable electronic devices such as a cell phone, tablet, or even gaming console. Sometimes users will attempt to hide or conceal illicit use of their devices while working on company time or try to hide information from their spouse — the usage of obfuscation technologies including encryption and privacy software that is often used by rogue employees as an effort to obscure their inappropriate activities.

Most employees leaving their company for a competitor can’t resist the urge to take client data, vendor supplier information, past quotations, employee information and more. This information is often used by the recently departed employee to steal clients, vendors, data models and employees away from their former employer. The intellectual property today often exists in digital form, and as such, tons of banker boxes worth of data can be copied in under an hour to a portable USB storage device that can be purchased for under thirty dollars.

  Other questions that are often pursued during a computer forensics examination may include:

  • What specific actions took place on a key date and time by the user?
  • Did the user run or install programs that are designed to obfuscate or cover their tracks?
  • What files were deleted by the user?
  • Did the employee engage in bad faith and provide information to outside parties?
  • Did the employee break the company policy regarding standards of acceptable computer usage?
  • Is the document produced really as it appears or is it a forged electronic document?
  • Did anyone else access the computer who may be trying to frame the suspect or perpetrator?

Our services include:

Breach response analysis – Identifying indicators of compromise, incident timeline, network connection and user account information, malware, and vulnerability information.

Cellular and mobile device investigations – Capturing system images of mobile devices for forensic analysis, keyword and pattern searches, personally identifiable information (PII), or credit card data.  

Spousal Infidelity locating conversations on electronic devices containing conversations that indicate infidelity.

Employee misuse and misconduct investigations – Focusing on reviews of system users who have been accused of violating an organization’s policies and acceptable use procedures.

Indicator of compromise (IOC) check – Evaluating your system for IOCs, including malware on disk or in memory.

RapidCheck – Checking for compromise and credit card exposure on point-of-sale (POS) terminals.

Why Kelly Office Solutions?

IT forensic investigation is a core service that requires unique skills. With years of experience in digital forensics, we supplement your existing resources and help you collect, examine, maintain, and interpret evidence effectively and efficiently.

  • Digital forensics hands-on experience: Our team comprises current and former law enforcement officers specializing in cyber operations. These analysts have numerous forensic certifications and have been recognized as computer forensics experts in state and federal courts.
  • Advanced data recovery collection and analysis tools and capabilities: Our specialists have the know-how to recover voice, video, image, and other metadata from mobile devices, even if deleted by the user. We can also conduct social media research and archiving to assist with civil prosecution and legal cases.

 

PRACTICE AREAS

LITIGATION

Recovering information and finding the key evidence is only the beginning. The case must be prepared, depositions taken, and expert witness testimony provided.

INFORMATION SECURITY

Computer Forensics experts enhance the current security data generated by an organization and remotely watch for security anomalies that could require investigation.

DIVORCE/SEPARATION

Recovering information and finding the key evidence is only the beginning. The case must be prepared, depositions taken, and expert witness testimony provided.

LAW ENFORCEMENT SUPPORT

We are committed to assisting law enforcement agencies with electronic evidence processing and examination.  Our Computer Forensics Examiners are all Former Law Enforcement Officers with training at the highest levels.

DISCOVERY
A growing trend in investigation and litigation support is “electronic discovery.” More information is retained on a computer than most people realize.

LAW ENFORCEMENT SUPPORT

We are committed to assisting law enforcement agencies with electronic evidence processing and examination.  Our Computer Forensics Examiners are all Former Law Enforcement Officers with training at the highest levels.

DISCOVERY

A growing trend in investigation and litigation support is “electronic discovery.” More information is retained on a computer than most people realize.