Digital Forensic Investigations

Computer Forensics

Veracity Forensics stands ready to meet any computer forensic need. Our experts’ experience is broad and deep, covering every imaginable form of intellectual property theft and infringement. From fraud, embezzlement, tax violations, bankruptcy, and probate, to international antitrust matters, we have run the gauntlet of legal matters and we are here for you.

One of the primary vectors of data exfiltration is removable media like flash drives and other external devices. Artifact and file system analysis can determine details of what removable media was connected to the custodian’s computer, when it was connected, how frequently, and which files or folders were potentially copied out of the authorized environment. Combining this analysis with a broad timeline view of how the computer was used during critical time frames can further answer your questions about what happened. If specific files are especially significant, deeper file system analysis may determine if the files are deleted and if they are recoverable.

Whether the computer in question is running Windows, Mac, or Linux, our analysts will identify and report accurate findings. Expert report writing and testimony illuminate the details of what occurred, when, and how, leaving no digital stone unturned. To ensure our work is defensible and repeatable, Veracity uses industry-standard tools, constantly tests and improves methodologies, and works hard to not only stay abreast of the latest technology and practices in the field but to also lead in development and execution.

Mobile Device Forensics

As smartphones and tablets become increasingly capable and prolific, the necessity grows to incorporate these devices into any ESI preservation and/or digital forensic investigation. Veracity Forensics works constantly to stay on the cutting edge of this sector, and the result is an array of solutions that stands alone in flexibility and speed. From same-day remote collection and availability to the client of text messages, call logs, and contacts, to exhaustive forensic examination of mobile devices, the Veracity Forensics lab stands ready to meet client needs.

In addition to providing solutions for the collection and preservation of mobile devices, Veracity Forensics leverages ESI Analyst to provide a review solution for the desperate mobile data types. The ability to view and understand various behavior or activities within a succinct chronology provides unprecedented clarity to our examiners and clients. Further, our ability to identify and remove duplicate text messages across various custodians’ devices makes for a more efficient and effective review for legal team, and helps reduce client spend.

Cloud Forensics

The growing adoption of cloud services for file and document storage within businesses has opened a new potential path for data exfiltration or intellectual property theft. By utilizing vendor-specific tools and data logs—e.g., Microsoft’s Unified Audit Logs or various other “unique version” file histories—Veracity Forensics can build a timeline of what document access occurred and by which user. These log files can detail file access, as well as upload and editing histories, which can assist in building a timeline of what occurred within a cloud space such as Sharepoint, OneDrive, or Google Drive.

In addition to the file history in the cloud, the accessibility and syncing of documents to local devices should also be considered when a case involves the cloud. Analysis of common file syncing directories and file metadata can help determine if a user synced or downloaded files that might have then been transferred to removable media.

Contact

Dallas 214-495-1305
Houston 713-568-0248
Toll-Free 877-499-6878

info@veracity-forensics.com