top of page
AdobeStock_265773843 - computer Forensics sm.jpg

Digital Forensics

Forensics.png
In an increasingly digital and connected world, digital forensics becomes an essential aspect of litigation. Digital forensics is the investigation and recovery of information from computers, phones, and other storage server media.

Digital Forensics Experts

Legal Eagle employee Heather Cortez is a Cellebrite Certified Operator. Heather has been trained by Cellebrite to extract data in a forensically sound manner. Heather and our other Legal Eagle digital forensics experts, are able to extract information in a legally defensible manner from most: 
 
  • computers
  • cellphones
  • servers
  • hard drives
  • emails
  • tablets 

The information  extracted may then be sent directly to the legal team or uploaded to an eDiscovery review platform.

Additionally, Legal Eagle offers a third party digital forensic examiner. This forensics expert may find crucial hidden information on disc drives, mobile phones, and hosted servers, as well as on email servers, cloud servers, ram memory chips, voicemail, text messaging, and even on camera memory cards.

The evidence found utilizing digital forensics could make or break a court case, and its usefulness should never be overlooked both in criminal actions or civil actions. Evidence found using computer forensics is typically discoverable and authenticated for presentation to the jury in South Carolina and North Carolina state and federal courts.
CCO_shield.png

Digital Forensics Techniques

To assist attorneys and law firms, Legal Eagle offers to collect information within the framework of court rules in order to identify, recover, and preserve extracted data for use by an attorney in complex litigation. Techniques utilized by the computer forensic examiner include:

  • Cross-drive Analysis: Correlates data on multiple drives.

  • Deleted Data: Recover existing fragmented or partial deleted files.

  • File Carving: Analyze drive for file header to reconstruct data.

  • Live Analysis: Extracts evidence from computer operating system (OS).

  • Volatile Data: Recover and analyze Random Access Memory Chips (RAM).

bottom of page