Computer Forensics
Electronic Data Discovery (EDD)
Complete Forensic Investigation Service
Incident Responses & Forensics
Forensic Processing of Computer Evidence
Regulatory Support
We have extensive experience with firewalls, routers and global TCP/IP, based networks. We are experts in all versions of Windows, including, Windows NT, Windows 2000 Professional and Server, XP, etc., along with Unix,
Linux and Solaris.
We also have extensive experience working with corporate attorneys, outside counsel, internal investigative staff, federal, state and local law enforcement.
Unlike some of our competitors, our computer forensics consultants are employees. We DO NOT outsource to consultants to process computer evidence. Also, our experts are leaders in the field of computer forensic science.
Electronic Data Discovery (EDD)
Recent surveys confirm that more than 90 percent of all documents produced since 1999 were created in digital form.
Document & File Discovery
Bluegrss Private Investigations offers the ability to locate and recover previously inaccessible documents and files through computer forensic processes. We assist your pre-trial disclosure of pertinent facts or documents by one or both parties to a civil action or proceedings.
Preservation of Evidence
You can entrust us with your electronic media safe in the knowledge that we will use the highest standards and methodologies to protect and preserve the original media.
We follow a strict carefully developed set of procedures that address security, authenticity and chain-of-custody of the original media. We teach Law Enforcement how to preserve digital data, and our information on this was said to be one of the books strengths (by several reviewers) so our methodology is sound.
Data Recovery & Analysis
We have conducted forensics around the globe and our data recovery services have been used to help some of the world's largest companies. Our computer forensic experts work side by side with your staff and may access data storage devices using recovery and analysis tools and techniques in an attempt to recover active and deleted data from inaccessible media and deleted files, including email. Our computer forensic experts retrieve data from virtually all storage media and operating systems, including Windows 2000/XP, UNIX, Linux and Solaris.
Analysis of User Activity
We will provide reports on all user activity including, but not limited to, electronic mail, Internet and Intranet files accessed, files created and deleted, and user access times. We can also provide analysis of corporate server and gateway logs.
Password Protected Files
We use several state of the art tools and techniques to access password protected files and hard drives. We do not rely on just one tool, we use many! This is one of our strengths and we would be happy to discuss this more, just give us a call.
Expert Reporting
Our reports provide a detailed depiction of the breadth and scope of our analysis that can be customized to meet your needs. Once our data analysis is complete, our computer forensic experts will furnish detailed reports about the data collected and produced to support the case. Computer Forensic Services finishes the project by producing the data collected in a readable format. Typically, the data can be provided in a format that you select (electronic, printed or a combination of both). We can also provide the reports so that you can view them with Web browser.
We also will print data to hard copy or import it to an existing litigation support database upon request.
Complete Forensic Investigation Service
If your company requires an investigation staff, but your budget can not afford all the related expenses for salaries, benefits, equipment, training, etc. we can help. Our contracted costs are lower than the cost of an in-house staff.
Our principles have over decades of experience in cyber investigations and forensics in both law enforcement and fortune 50 companies.
Services include, but are not limited to:
- Two-day planning session
- Personalized customer guide
- 24-hour emergency response
- On-site support
- Weekly proactive investigative service included, AT NO EXTRA COST, in yearly contract
- Cyber forensic investigative services
- Hostile workplace allegations
- Theft of trade secrets/intellectual property
- Employee Fraud
- Post mortem, with recommendations
Incident Responses & Forensics
CLIENTS ONLY access to 24x7 phone support and response. Contact us today before an incident happens.
Incident response service includes developing and refining clients' internal crisis management processes, providing emergency response support, distributing threat and vulnerability advisories, and assistance in cyber crime prevention and/or litigation. In addition, Computer Forensic Services provides consulting services during an incident. Clients receive:
Forensic Processing of Computer Evidence
Law Firms
Specializing in:
- Document and FileDis Recovery
- Cyber forensic investigative services
- Copyright Infringement
- Theft of trade secrets/intellectual property
- Employee Fraud
Corporations
Services include, but are not limited to:
- Two-day planning session
- Personalized customer guide
- 24-hour emergency response
- On-site support.
- Cyber forensic investigative services
- Hostile workplace allegations
- Theft of trade secrets/intellectual property
- Employee Fraud
- Post mortem, with recommendations
Training
- Expert training on multiple platforms (UNIX, Windows OS).
- Demonstration of current methods and tools
- Hands-on and Onsite training available
- Visit the Training page for more information
Regulatory Support
We have supported many investigations that are regulatory in nature either proactively or reactively. We work quickly and confidentially to support corporate counsel, outside counsel and audit committees respond to employee complaints.
Proactive
We are used by our customers to image computers of high ranking company officials when they exit the business.
Reactively
When companies want to investigate allegations of regulatory improprieties we have assisted on several occasions in imaging, analysis and production of material.
Audit Committees
We can obviously help in imaging drives (locally or remotely) and searching electronic data at the request of the Audit Committees.
Destruction of Audit Records
Our imaging and storage services can assist in the proactive retention of electronic records. Our complete forensic processing has assisted in SEC investigations.
Rules Regarding Attorneys
We support attorneys in finding the facts and support them with searching for hard evidence if they have to report something to the company officers or the board.
We can also proactively protect the company by imaging computers and storage of the images for the 5 year retention period. If someone exits the company calls us to image the computer in case it is required at a later date.