Problems We Solve

I don’t know the first thing about computers

You’re good at what at what you do – explaining the computer stuff to you so you understand it is part of what we do.


I think my ex-employee has stolen our data.

Identifying whether your intellectual property has walked away or been sent to others is a big part of what we do.


Someone is using a faked document or email against me.

We can analyze document headers and file metadata to get to the truth.


I need someone experienced to testify in court.

We do that, have been for decades, all over the United States. We can also testify via video or audio hookup.


I need someone to testify where I am and don’t want to fly you out here.

No problem. We can testify via audio or video from our offices, or from nearby court reporter offices.


I’m pretty sure that someone deleted the data that I need, or that shows their malfeasance.

We’ve been doing data recovery for more than 30 years. If it hasn’t been overwritten, we can probably find and recover it.


Below are some other things we can do for you.
  • Recovery accidentally or intentionally deleted emails
  • Decrypt some encrypted files with the key thrown away or lost
  • Find the real metadata associated with files with falsified dates
  • Files unintentionally damaged or overwritten by other consultants or technicians
  • Find and recover databases on computers that have been completely erased, reformatted and reinstalled
  • Find evidence of sabotage even when advanced data destruction programs have been used
  • Recover files from badly damaged computers
  • Data acquisition: Making forensic images of digital and online media.
  • Recover data from media where there have been attempts to sabotage, hide, delete, overwrite, or steal data
  • Recover Internet History – active and deleted
  • Recover deleted email
  • Extract and recover metadata
  • Extract and recover GPS data from images
  • Detect hacking
  • Find and recover all images and video
  • Authenticate documents
  • Authenticate email
  • Identify USB devices that have been connected to a computer
  • Analysis of URL and web addresses
  • Analyze and locate IP addresses
  • Provide a timeline of events and files
  • Recover deleted text
  • Recover deleted messages
  • Recover deleted Skype sessions
  • Identify spyware, malware, unauthorized access and remote control
  • Produce declarations, affidavits, and opinions for use in court