Forensic Technology Services - Sacramento CA
Our cutting edge computer forensics lab in Sacramento, California is home to a team of certified digital forensics and cybercrime investigators as well as our e-discovery processing and review platform. We host powerful database servers for complex data analytics as well as develop custom innovative software solutions for our clients’ specialized needs. Our cases range in size from small computer forensics matters that might encompass looking at one individual computer to massive e-discovery projects that involve looking at the content of hundreds of computers requiring years of work.
Members of our computer forensic and e-discovery practices have worked on hundreds of matters dealing with operating systems dating back to DOS, SCOUnix and Linux, Macintosh both pre- and post-OSX as well as Windows from 3.1 to 8.2. We have performed cell phone forensics and investigated the contents of various cell phone types including Android, iOS, Blackberry and Palm operating systems. We have performed network forensics in support of numerous cybercrime investigations looking at deadbox, memory and network devices such as switches, routers and firewalls. Our team for client matters has also performed data recovery from media such as reel-to-reel storage, backup tapes, video game devices, tablets and flash media.
REPRESENTATIVE TYPES OF CASES
Unauthorized Access – accessing computer systems without permission or exceeding the access level granted by the corporation. Examples include:
- Hacking by outsiders
- Reading other employees’ email
- Unauthorized monitoring of computers
Sabotage – removing data from or preventing the use of a computer system without permission. Common forms are:
- Malicious programs such as viruses, logic bombs, worms, etc.
- Actions by employees, contractors, etc.
Theft of Information – includes the theft of sensitive information, proprietary information, or intellectual property stored on a computer system such as:
- Personal information
- Passwords and user information
- Corporate documents
Theft of Services – using services with the attempt to avoid payment. In the corporate crime arena this is most commonly seen in the following:
- Unauthorized Web, FTP or Chat sites
- Running side businesses uses corporate assets
Computer Crimes - Instrumentality
“Using computers as a tool to commit traditional types of crime.”
Embezzlement – using computers to aid or affect the transfer of funds.
- Online banking
- VPN or EDI to banks
- Manipulating accounting transactions
- Computer-stored traditional documents
Bribery & Corruption
- Foreign Corrupt Practices Act violations
- Vendor kickbacks and favors
- Bid rigging
- College grade fixing
- Automated false use of capacity
- Over-billing by consultants
Financial Statement Misrepresentation
- Over-reporting of assets
- Improper revenue recognition
- Capitalization of expenses
- Misrepresentation for securing loans
- Pyramid schemes
- Insider trading
- Misappropriation of investments
At EisnerAmper, we are not a computer forensics company that utilizes one or two products to fit a case. We select specific tools that allow us to effectively optimize as well as focus our analyses. We are constantly testing our tools against each other to ensure we are receiving uniformity of results and when discrepancies occur, we investigate as to why they occurred and how they could affect future cases.
When performing computer forensic examinations, we use meticulous documentation to capture information about items we receive, as well as maintaining their chain of custody. Since we are dealing with mechanical items which can be subject to breakage or data that could become deleted, corrupted or changed, by policy backup copies are created for all data to be analyzed.
As many states have different statutes and codes of conduct on how to deal with personal data, we aim to ensure the highest quality of confidentiality of the data received by EisnerAmper. All of our data is stored and analyzed in our secure computer forensic lab with limited access to only those personnel allowed entry, unless it is necessary to do otherwise. To further prevent any unauthorized access to our data, there is no network connection to the Internet or other networks except those contained within our lab.