Computer Forensics

Beyond the Traditional

Our computer forensics capabilities are a step beyond the traditional electronic discovery process. Digital Mountain’s certified experts use industry leading and court accepted tools to capture a complete forensic image of the device under examination, including all deleted files, file fragments and temporary data. We’re confident that we have the right people and tools, so you can be confident in us. We evaluate critical evidence which may be contained in less obvious computer system storage locations, such as deleted files, slack space, swap files, unallocated space, and Internet artifacts. Our experts make sure that forensic capture, analysis, and reporting are thorough and complete because we know you don’t want miss or lose critical evidence.

Cloud Accounts

For cloud accounts, we have specialized application experts to perform preservations and analysis depending on each unique circumstance. This may also include analysis of logs available within cloud-based applications. We know email metadata can be critical from an evidentiary standpoint. Forensic analysis of the header information can be extremely helpful in establishing a crucial audit trail from the sender to the recipient’s mail server. Our experts are able to obtain full forensic captures of email located on-premise (e.g. Exchange) or from cloud-based sources (e.g. O365, Gmail, Yahoo!, etc.).

Smartphone Forensic Analysis

Forensic analysis of today’s modern smartphones can be complex and challenging. The storage capacity and the computing power of these phones far surpass that of large, desktop computers of just a few years ago. The data stored on most phones includes photos, chat information, specific application databases, call histories and logs, contact information, and a myriad of other data types. All of this information can be accessed and preserved by our certified examiners.

Cryptocurrency Analysis

As cryptocurrency has become more mainstream for commercial transactions and nefarious purposes. As hacking cases involving financial loss of Bitcoin, Bitcoin Cash, Ethereum, Litecoin and other crypto currencies have increased, our specialized experts assist in tracing and recovering funds due to bad actors. Other areas of service offerings include digital wallet and crypto recovery following a hard drive malfunction, and cryptocurrency asset recovery assistance for families and estate trustees as part of conservatorship and estate proceedings.

Specialists in Every System

Digital Mountain has experts that specialize on particular operating systems (e.g. Windows, Linux, Solaris, HP-UX, iOS, Android, etc.) as well as enterprise applications. We match these experts to your specific project for optimal results. Additionally, with our experts located in over 30 states across the USA and over 20 other countries, we are typically able to provide you with a professional located in the geographical area you desire.

The Following Computer Services are Provided by Digital Mountain: