Computer Forensics Investigation Services
Computer Forensics is the collection, preservation, discovery, analysis, and presentation of evidence found on digital devices. Computer Forensic investigation experts draw upon a variety of methods for discovering, analyzing, and scientifically verifying information that resides on computer systems (desktop, laptop, MacBook), smartphones and cell phones (iPhone, Android, Windows Mobile, Blackberry), GPS (Garmin, TomTom, Magellan), cloud computing environments, other digital devices (iPod, iPad, NetBook, Tablet, MP3), and more.
Protegga's Computer Forensic Examiners have achieved the International Society of Forensic Computer Examiner's (ISFCE) CCE Certification (Certified Computer Examiner). The ISFCE maintains a uncompromised process for certifying the competency of forensic computer examiners and sets high standards for forensic computer examiners. Certified Computer Examiners: R. Lance Fogarty, Grace Rubio, Travis Dirr
Computer Forensic investigations differ greatly from both Data Recovery and ediscovery. Unlike ordinary data recovery efforts, Computer Forensic examinations use strict controls and procedures to ensure that all existing data is found, that the original data is preserved and unchanged, and that any recovered data is admissible in court or in other legal proceedings. Computer Forensic examinations are an investigative process and require an in-depth understanding of operating systems, databases, networks, the Internet, applications, and how and when data is written to storage devices. Most data recovery efforts require very little knowledge of computers or the data contained within.
Utilizing state-of-the-art Computer Forensic investigation tools, years of investigative and technological experience, and precise methodologies and procedures, Protegga will accurately pull all the pieces together and break the technology code.
E-Discovery is a process by which parties involved in litigation respond to requests to produce ESI, “electronically stored information.” There are definite benefits to having the production of ESI, or ediscovery, provided by a Computer Forensic expert, as a true expert would have a more comprehensive understanding of where all the data can reside in a corporate environment. Additionally, Computer Forensic experts can ensure all the information provided throughout the e-discovery process is accurate and complete or perform a Computer Forensic investigation when ediscovery falls short of reasonable expectations.
Texas Licensing Requirements for Computer Forensics Investigations
In 1969, the Texas Legislature passed a law requiring any individual or business providing investigative services to be licensed by the State. This law, the Private Security Act found in Chapter 1702 of the Occupation Code, is currently administered by the Texas Department of Public Safety through the Private Security Board, whose members are appointed by the Governor of the State of Texas.
Computer Forensics investigations fall well within the State of Texas’s definition of an investigative service. As stated in the Private Security Act, a person acts as an investigator if he or she engages in the business of obtaining or furnishing information related to the identity, habits, business, occupation, knowledge, efficiency, loyalty, movement, location, affiliations, associations, transactions, acts, reputation, or character of a person or engages in the business of securing evidence for use before a court, board, officer, or investigating committee.
CHANGE EFFECTIVE September 1, 2007 – While Texas already required Computer Forensic investigators to obtain a license, Chapter 1702 of the Occupation Code has been clarified. The following text has been added: “Obtaining or furnishing information includes information obtained or furnished through the review and analysis of, and the investigation into, the content of computer-based data not available to the public.”
As mobile computers (laptop, MacBook), smartphones (iPhone, Android, Windows Mobile, Blackberry), cloud computing, and other digital devices (iPod, iPad, NetBook, Tablet, MP3) continue to permeate our daily activities, our dependency upon them increases. Through the increasing speed and bandwidth of wireless Internet, technology and application software have become mobile to the point of being entrenched in our each and every move. Evidence from these digital devices is therefore critical to any type of legal dispute and/or process.
Protegga has been aiding attorneys, individuals, and corporations involved in civil litigation, family law, corporate bankruptcy, employment law, mergers and acquisitions, and more since 2003. Protegga proudly serves Texas and the United States from our North Texas office in Plano (North Dallas). In addition to the courts listed below, Protegga has served as Computer Experts in State and Federal courts in Texas, California, Florida, New York, Oklahoma, Utah, and others.
Where Have Protegga Experts Worked?
Texas cities and counties:
- Austin, Texas: Travis County
- Dallas, Texas: Dallas County
- Denton, Texas: Denton County
- El Paso, Texas: El Paso County
- Fort Worth, Texas: Tarrant County
- Galveston, Texas: Galveston County
- Houston, Texas: Harris County
- McKinney, Texas: Collin County
- Rockwall, Texas: Rockwall County
- San Antonio, Texas: Bexar County
- United States District Court – Eastern District of Texas
- United States District Court – Northern District of Texas
- New Hampshire
- New Jersey
- New York
- North Carolina
Precise • Methodical • Impartial
Protegga is committed to providing the best, most cost-effective solutions for the identification, collection, preservation, analysis, and recovery of evidence through our Computer Forensics, e-Discovery, Data Collection, and Litigation Support services. Protegga works closely with its client to define a list of digital devices required based upon the specific needs of the case. Sometimes, it is necessary to obtain copies of numerous devices with the intent of initially searching only a few key sources. Protegga stresses forensic consultation as early as possible in the process to minimize any spoliation, intentional or not, of evidence and to ensure a productive execution of the Rules of Civil Procedure.
Protegga utilizes industry standard forensic tools to collect digital evidence from a variety of sources. For certain devices, Protegga will capture an image of the entire device, whereas on large, multi-user systems, Protegga may only obtain specific folders, known as a Targeted Collection, such as a user’s home directory. Both forms of evidence collection are admissible in court as long as the process is well documented and proper collection methods are utilized.
Protegga always follows court accepted chain of custody procedures to ensure the integrity of the digital evidence. Beyond the basic chain of custody documentation, Protegga ensures that access to all evidence is secured and restricted. Protegga utilizes an alarm system with cellular-based monitoring (motion, door, smoke, and glass break sensors), audited biometric access controls, video surveillance, and digitally coded safes to keep your critical evidence secured.
Protegga Employs True Computer Forensic Experts!
True Computer Forensic experts know where to find the evidence. Protegga will create an initial set of search criteria based upon our understanding of the specific dynamics of your case.
Protegga can restore, index, search, filter, consolidate, and interpret all forms of digital evidence from virtually any type of media including, but not limited to:
- Apple Computers (Mac OS)
- Corporate Servers (Web, eMail, File, Database, etc.)
- External Storage (SAN, iSCSI, NAS, SCSI, eSATA, etc.)
- Linux Computers
- Specialty Devices (JAZ, ZIP, REV, LS120, etc.)
- Tape Devices
- Thumb Drives
- USB Hard Drives
- Windows Computers
- Windows Mobile
Protegga Computer Forensic Examiners can restore, index, search, filter, consolidate, and interpret all forms of digital evidence from virtually any type of media.
When necessary, Protegga will provide its findings in a concise yet detailed report. Additionally, all recovered evidence is provided, subject to any confidentiality, privilege agreements, or protection orders. Conclusions are provided to the extent they are substantiated by the recovered digital evidence and scientific verification. After Protegga has presented its findings, opposing counsel will almost always call the validity of the digital evidence into question. Protegga provides testimony to present the facts, procedures, methods, and support all conclusions.
Contact us today to talk with a trial-tested Computer Forensic expert!