Digital Forensics

Adjuvant Consulting Inc. personnel providing professional consulting services in digital forensics utilize the most technologically advanced software, tools, and expertise to respond, collect, preserve and analyze Electronically Stored Information (ESI) to determine the root cause of a cyber incident. Threat Actors use sophisticated multi vector attack methods to breach networks and systems using anti-forensic techniques to conceal their digital tracks. Our forensic investigators have the expertise, to identify and uncover hidden evidence. Adjuvant Consulting applies its expertise in computer digital forensics analysis as an essential and critical component of a Cybersecurity strategy, planning, design and implementation. Our analysts have extensive knowledge and experience providing the following services:

• Cybersecurity Architecture (Assessments, Strategy, Planning, Design and Implementation)
• Information Systems Security Assessments\Gap Analysis
• Employee Security Awareness Training
• Implementation and Compliance Audits & Assessments for NIST (800-37, 800-53, 800-171), HIPAA, NERC-CIP, SOX, GDPR, GLBA, and FFIEC
• Intrusion Monitoring, Prevention and Detection (configuration management and review of system logs to include firewalls, router, switches, server, clients, etc.)
• Incident Response Plan, Mitigation, Remediation, Reporting and Analytics
• Computer Forensic Incident Response Business Interruption, Network and/or Computer Breach, Intentional and Accidental Data Loss, Acceptable Use Policy Violations, Intellectual Property Theft, etc.
• Cell Phone Forensics – SMS/MMS Messaging, Call Logs, Contact Lists and Phone IMEI/ESN Information, Web Browsing History, Geotags/Geolocation History, E-mail Records, Social Networking Service Activity, etc.
• Evidence Collection and Litigation Support (Focus on authentication and chain of custody preservation through forensic investigative analysis)

Incident Determination – Source of breach and data loss, list accounts and data compromised, exfiltration location of confidential information, intellectual property/trade secrets or customer information, review system and application logs, image breached systems

Since its inception, the practice of digital forensics evidence collection and the value of this technology was limited to federal agencies and to a select few in the private sector. As the technology evolved and matured, a vast array of tools and methodologies altered the landscape in such a manner, Private Investigators now have access to these services, which adds value to their cases and obtain the evidence their clients need to prove or disprove a claim.

Adjuvant’s forensic evidence services include:

• Mobile Data Extraction & Analysis from smart phones, tablets & cell phones
• Retrieval of artifacts such as messaging/chats, internet history & email from mobile devices or computers
• Recovery of deleted items, both on mobile & desktop computer platforms
• Documentation of pictures, video, etc. stored on computers & mobile device
Fraud & Financial Investigations
• Insider Threat
• Disgruntled Employee
• OPP & AU
• Marital/Relationship Infidelity
• Child Custody Disputes
• Texting-while-Driving Investigations
• Personal Injury case
• Stalking, including cyber-stalking
• Defamation of character claims

Corporations of all types and size have a unique need for digital forensic expertise.  In the age of Bring Your Own Device (BYOD), acceptable use policies and valuable proprietary intellectual property, the value of a trained, competent digital forensic examiner goes far beyond that of most IT staff.  Specific areas where a digital forensic consultant would provide critical support include:

• Employee violations of acceptable use of company computers, networks & mobile devices
• Disgruntled current or former employee investigations
• Theft, insider threat or exfiltration of intellectual property, including trade secrets
• Suspected fraud, embezzlement or inappropriate use of company resources

If your organization suspects an incident has occurred, you should secure the device(s) immediately upon discovery of the incident, maintain proper chain-of-custody, notify corporate management, general counsel, and law enforcement when appropriate.

Forensic Services offered by Adjuvant

Adjuvant offers the following services:
Computer Forensic Incident Response Business Interruption, Network and/or Computer Breach, Intentional and Accidental Data Loss, Acceptable Use Policy Violations, Intellectual Property Theft, etc.

Cell Phone Forensics – SMS/MMS Messaging, Call Logs, Contact Lists and Phone IMEI/ESN Information, Web Browsing History, Geotags/Geolocation History, E-mail Records, Social Networking Service Activity, etc.

Evidence Collection and Litigation Support (Focus on authentication and chain of custody preservation through forensic investigative analysis)

Incident Determination – Source of breach and data loss, list accounts and data compromised, exfiltration location of confidential information, intellectual property/trade secrets or customer information, review system and application logs, image breached systems, etc.

Adjuvant Consulting investigators have experience as a trusted provider of forensic and cybersecurity services and post-disaster recovery technology solutions for business organizations, local and federal law enforcement, SEC, litigation support for civil and criminal cases. Government agencies, organizations and litigation attorneys rely on the integrity of our experts to investigate cybercrimes and company policy violations.

Adjuvant’s analyst provided forensic investigative services for the following types of cases:

• Insurance Claims
• Financial Fraud
• Investor Fraud for the SEC
• Criminal and Civil for Federal Agencies
• HIPAA Compliance Cases
• Construction & Engineering Litigation
• Breach and Ransomware Investigations
• Insider Threat
• Employee OPP & Computer AUP Violations

Switch to our mobile site