Computer Forensics Investigation Services
Computer Forensics is the collection, preservation, discovery, analysis, and presentation of evidence found on digital devices. Computer Forensic investigation experts draw on a variety of methods for discovering, analyzing, and scientifically verifying information that resides on computer systems (Desktop, Laptop, MacBook), smart phones and cell phones (iPhone, Android, Windows Mobile, Blackberry), GPS (Garmin, TomTom, Magellan), Cloud Computing environments, other digital devices (iPod, iPad, NetBook, Tablet, MP3), and more.
Computer Forensic Investigations differs greatly from both Data Recovery and e-Discovery. Unlike ordinary data recovery efforts, Computer Forensic examinations use strict controls and procedures to ensure that all existing data is found, that the original data is preserved and unchanged, and that any recovered data is admissible in court or other legal proceedings. Computer Forensic examinations are an investigative process and require an in-depth understanding of Operating Systems, Databases, Networks, the Internet, Applications, and how and when data is written to storage devices. Most data recovery efforts require very little knowledge of computers or the data contained within.
Utilizing state-of-the-art Computer Forensic investigation tools, years of investigative and technological experience, and precise methodologies and procedures, PROTEGGA will accurately pull all the pieces together and break the technology code.
e-Discovery is a process by which parties involved in litigation respond to requests to produce ESI, "electronically stored information". There are definite benefits to having the production of ESI, or e-Discovery, provided by a Computer Forensic Expert as a true expert would have a more comprehensive understanding of where all the data can reside in a Corporate environment. Additionally, Computer Forensic Experts can ensure all the information provided throughout the e-Discovery process is accurate and complete or perform a Computer Forensic investigation when e-Discovery falls short of reasonable expectations.
Texas Licensing Requirements for Computer Forensics Investigations
In 1969, the Texas Legislature passed a law requiring any individual, or business, providing investigative services to be licensed by the State. This law, the Private Security Act found in Chapter 1702 of the Occupation Code, is currently administered by the Texas Department of Public Safety through the Private Security Board, whose members are appointed by the Governor of the State of Texas.
Computer Forensics investigations fall well within the State of Texas's definition of an investigative service. As stated in the Private Security Act, a person acts as an investigator, if they engage in the business of obtaining or furnishing information related to the identity, habits, business, occupation, knowledge, efficiency, loyalty, movement, location, affiliations, associations, transactions, acts, reputation, or character of a person or engage in the business of securing evidence for use before a court, board, officer, or investigating committee.
CHANGE EFFECTIVE September 1, 2007 - While Texas already required Computer Forensic Investigators to obtain a license, Chapter 1702 of the Occupations has been clarified. The following text has been added, "obtaining or furnishing information includes information obtained or furnished through the review and analysis of, and the investigation into the content of, computer-based data not available to the public."
As mobile computers (Laptop, MacBook), smart phones (iPhone, Android, Windows Mobile, Blackberry), Cloud Computing, and other digital devices (iPod, iPad, NetBook, Tablet, MP3) continue to permeate our daily activities, our dependency on them increases. Through the increasing speed and bandwidth of wireless internet, technology and application software have become mobile to the point of being entrenched in our each and every move. Evidence from these digital devices is therefore critical to any type of legal dispute and/or process.
PROTEGGA has been aiding attorneys, individuals, and corporations involved in Civil Litigation, Family Law, Corporate Bankruptcy, Employment Law, Mergers & Acquisitions, and more since 2003. PROTEGGA proudly serves Texas and the United States from our North Texas office in Plano (a suburb of Dallas). In addition to the courts listed below, PROTEGGA has served as Computer Experts in State and Federal courts in Texas, Utah, Washington, California, New York, Florida, Oklahoma, and others.
Where Have PROTEGGA Experts Worked?
- Dallas County: Dallas, Texas
- Harris County: Houston, Texas
- Tarrant County: Fort Worth, Texas
- Collin County: McKinney, Texas
- Galveston County: Galveston, Texas
- El Paso County: El Paso, Texas
- Rockwall County: Rockwall, Texas
- Denton County: Denton, Texas
- Bexar County: San Antonio, Texas
- Travis County: Austin, Texas
- United States District Court - Northern District of Texas
- United States District Court - Eastern District of Texas
- New York
- New Jersey
- North Carolina
- New Hampshire
Precise Methodical Impartial
PROTEGGA is committed to providing the best, most cost-effective solutions for the identification, collection, preservation, analysis, and recovery of evidence through our Computer Forensics, e-Discovery, Data Collection, and Litigation Support services. PROTEGGA works closely with its clients to define a list of digital devices required based on the specific needs of the case. Sometimes, it is necessary to obtain copies of numerous devices with the intent of initially searching only a few key sources. PROTEGGA stresses forensic consultation as early as possible in the process to minimize any spoliation, intentional or not, of evidence and to ensure a productive execution of the Rules of Civil Procedure.
PROTEGGA utilizes industry standard forensic tools to collect digital evidence from a variety of sources. For certain devices, PROTEGGA will capture an image of the entire device, whereas on large, multi-user systems, PROTEGGA may only obtain specific folders known as a Targeted Collection, such as a user's home directory. Both forms of evidence collection are admissible in court as long as the process is well documented and proper collection methods are utilized.
PROTEGGA always follows court accepted chain of custody procedures to ensure the integrity of the digital evidence. Beyond the basic chain of custody documentation, PROTEGGA ensures access to all evidence is secured and restricted. PROTEGGA utilizes an alarm system with cellular-based monitoring (motion, door, smoke, and glass break sensors), audited biometric access controls, video surveillance, and digitally coded safes to keep your critical evidence secured.
PROTEGGA Employs True Computer Forensic Experts!
True Computer Forensic Experts know where to find the evidence. PROTEGGA will create an initial set of search criteria based upon our understanding of the specific dynamics of your case.
PROTEGGA can restore, index, search, filter, consolidate, and interpret all forms of digital evidence from virtually any type of media, including, but not limited to:
- Apple Computers (Mac OS)
- Windows Mobile
- Windows Computers
- Linux Computers
- Corporate Servers (Web, eMail, File, Database, etc.)
- USB Hard Drives
- Thumb Drives
- External Storage (SAN, iSCSI, NAS, SCSI, eSATA, etc.)
- Tape Devices
- Specialty Devices (JAZ, ZIP, REV, LS120, etc.)
PROTEGGA Computer Forensic Examiners can restore, index, search, filter, consolidate, and interpret all forms of digital evidence from virtually any type of media.
When necessary, PROTEGGA will provide its findings in a concise yet detailed report. Additionally, all recovered evidence is provided, subject to any confidentiality, privilege agreements, or protection orders. Conclusions are provided to the extent they are substantiated by the recovered digital evidence and scientific verification. After PROTEGGA has presented its findings, opposing counsel will almost always call the validity of the digital evidence into question. PROTEGGA provides testimony to present the facts, procedures, methods, and support all conclusions.
Contact Us Today to Talk to a Trial Tested Computer Forensic Expert!