Forensic Recovery, LLC is a boutique consulting firm providing clients with services and expert witness testimony related to computer forensics, electronic discovery and information security. As the use of technology increasingly integrates into our daily lives, the resulting digital footprint continues to expand. Our analysts and experts are experienced in identifying and interpreting electronic data for use in corporate litigation, criminal investigations, and civil matters. Introducing potential sources of digital evidence to a client is one of our most appreciated strengths.
Our Incident Response engagements typically begin because a client believes their computer network has been compromised by data thieves or social engineers. We have the ability to determine if an actual incident took place, identify its cause and scope, and assist with the remediation of the attack. The offering of preemptive and post-incident security hardening services is a natural progression as a result of handling these types of incidents.
Forensic Recovery understands the challenges of being a business owner, so we make recommendations to improve the security of client data and reduce risk exposure while considering budgets and company goals.
Visit our services page for more information about services we offer, and contact us to confidentially discuss how we may help you.
- Corporate Property TheftA Miami-based multinational corporation contacted Forensic Recovery, LLC to determine if a recently terminated executive had transmitted proprietary information to a competitor, who was suspected of currently using protected content within a uniquely formatted database.
- Destruction of Electronic Data
A corporation had determined through electronic discovery that an IT employee who had been recently terminated had allegedly created a catastrophic loss of an insurance database. A previous examination of the evidence revealed compelling evidence that the suspected IT Administrator had remotely accessed the network, deleting all use names and passwords, as well as medical records and other medical-related data.
- Child Exploitation Investigation
(Peer-to Peer Networks)
The government continues to adapt to the changing environment related to Internet crimes against children. Chat rooms interactions, traveler investigations, and possession and distribution have long been the focus of such investigations.
- Child Exploitation Investigation
(Knowledge and Control))
A key element of possession of child pornography involves knowledge and control by the alleged offender. There are numerous areas of electronic evidence that provides explicit evidence as to knowledge and control.
- Counter Terrorism Investigation
In 2007, Forensic Recovery, LLC was hired by the Federal Public Defenders Office to conduct a review of evidence in a highly publicized terrorism case. Over a period of almost one year, the government continued to examine evidence and provide such findings as discovery.
- Date and Time Stamps of Computer Files
In 2009, an individual was arrested for violating his terms of supervised release for possessing child pornography. It should be noted the original charge and subsequent incarceration was also for possession of child pornography.
- Divorce Inquiries
In 2009, a West Palm Beach client requested a complete examination of his computer’s hard drive. This request came after a filing for divorce and an allegation by the client’s wife that child pornography had been seen on the client’s hard drive.