Digital Forensic Services

Digital Forensic Services

Computer forensics is a scientific process that captures and analyzes information stored in any electronic format for the purposes of investigating allegations and finding the truth.

Computer Forensics

Chorus Consulting has been a trusted provider of computer forensic analysis and litigation support for over two decades. We offer a wide range of forensic services covering all digital devices. We have state-of-the-art labs, as well as a global network of responders, allowing us to perform forensic analysis for virtually any matter, in any environment. Chorus Consulting qualified experts have appeared in court or testified via affidavit in support of civil litigation.

  • Civil litigation theft of intellectual property
  • HR investigations of sexual harassment
  • Disaster recovery of critical information from digital storage devices

Computer Disk Drive Forensic Services

Chorus Consulting computer forensics experts can determine if an employee connected a device such as a removable USB storage device or if a CD was created which contained confidential data. A true expert can even identify the make, model and serial number of the removable storage device, when it was first connected and the last time it was used. They can also identify which data was deleted and often times can even recover the information. Printing a document also leaves a trail which can be uncovered and can provide key information about the theft itself. Frequently, websites visited by an employee will bring context to the theft or even constitute direct evidence.

  • Documents that were accessed, deleted or transferred to remote locations
  • The computer user’s internet surfing activities
  • External drives (USB storage devices) that were attached to their computer
  • Software that was run to obfuscate their actions

Smartphone Forensic Services

Surprisingly, most companies do not address the danger of stealing electronic information through smartphones. These devices often have enormous storage capacity (the most recent iPhone is capable of storing 32GB of data) and are easily connected to the corporate email system. They can also access WiFi wireless networks for high transfer speeds and even have the ability to connect to a company’s private network. The combination of storage, data access and ubiquity make a mobile communication device an ideal method of stealing data.

  • Active files
  • Deleted text messages
  • Call logs
  • Mobile browser history