Forensic Recovery provides the corporate community the opportunity to obtain a non-intrusive, non-destructive computer forensic examination of computer systems and related media identified as the result of an internal, administrative corporate investigation.
- Professional Computer Forensic Capabilities
- Identification of Internal Security Issues
- Expert Criminal and Civil Testimony
With twenty-three years of investigative experience and seventeen years dedicated specifically to the computer forensic process, FORENSIC RECOVERY offers the corporate community assistance with all aspects of investigative and computer forensic needs.
Our Corporate Associates have the opportunity to receive an unbiased, third-party review and analysis of corporate investigations, leading to the identification of potential problem areas specific to online security issues, including administrative, civil and criminal litigation.
The computer forensic process is the collection, preservation, analysis, and court presentation of electronic evidence. The proper collection and analysis of computer evidence is critical in all criminal, civil and corporate administrative investigations. As each forensic examination is unique, a time projection to complete the analysis is difficult to establish. The particular amount of time it takes to conduct the forensic examination will vary from case to case.
Therefore, the cost incurred by the Client will be based on a Per-Hour Fee of $250.00 US for computer forensic processes, court-related matters and other administrative requests.
There are situations where a Fixed-Fee contract is appropriate. Please contact us to discuss what arrangements best meet your needs.
- Corporate Property TheftA Miami-based multinational corporation contacted Forensic Recovery, LLC to determine if a recently terminated executive had transmitted proprietary information to a competitor, who was suspected of currently using protected content within a uniquely formatted database.
- Destruction of Electronic Data
A corporation had determined through electronic discovery that an IT employee who had been recently terminated had allegedly created a catastrophic loss of an insurance database. A previous examination of the evidence revealed compelling evidence that the suspected IT Administrator had remotely accessed the network, deleting all use names and passwords, as well as medical records and other medical-related data.
- Child Exploitation Investigation
(Peer-to Peer Networks)
The government continues to adapt to the changing environment related to Internet crimes against children. Chat rooms interactions, traveler investigations, and possession and distribution have long been the focus of such investigations.
- Child Exploitation Investigation
(Knowledge and Control))
A key element of possession of child pornography involves knowledge and control by the alleged offender. There are numerous areas of electronic evidence that provides explicit evidence as to knowledge and control.
- Counter Terrorism Investigation
In 2007, Forensic Recovery, LLC was hired by the Federal Public Defenders Office to conduct a review of evidence in a highly publicized terrorism case. Over a period of almost one year, the government continued to examine evidence and provide such findings as discovery.
- Date and Time Stamps of Computer Files
In 2009, an individual was arrested for violating his terms of supervised release for possessing child pornography. It should be noted the original charge and subsequent incarceration was also for possession of child pornography.
- Divorce Inquiries
In 2009, a West Palm Beach client requested a complete examination of his computerís hard drive. This request came after a filing for divorce and an allegation by the clientís wife that child pornography had been seen on the clientís hard drive.