DIGITAL FORENSICS

Litigation Support

Providing digital forensic expertise across the investigative, discovery, and litigation lifecycle.

------ SERVICE OVERVIEW

The preservation, collection, minimization, production, and analysis of electronically stored information (ESI) has become increasingly important to the litigation process. Supporting a wide variety of case types, Breadcrumb provides the digital forensic expertise that law firms require.

Utilizing advanced forensic techniques, Breadcrumb is able to reconstruct complex timelines, locate deleted file content, examine systems for the presence of tampering, and more.

 

"67% of organizations reported increases in impersonation fraud." - Mimecast

How it Works

1. Evidence Preparation
Our consultants work with legal counsel in non-technical areas such as preservation order development, discovery request generation, and deposition support.
2. Analysis
We can perform challenging computer forensics as needed, depending on the nature of the evidence and the objectives of counsel. We can conduct a variety of technical activities associated with the examination and processing of ESI.
3.Testimony
When matters go to court, Breadcrumb can provide testimony in formal proceedings. We have provided testimony or reporting in cases for both prosecution and defense counsel.
1. Evidence Preparation
Our consultants work with legal counsel in non-technical areas such as preservation order development, discovery request generation, and deposition support.
2. Analysis

We can perform challenging computer forensics on a wide variety of evidence sources, depending on the nature of the evidence and the objectives of counsel.

3.Testimony

When matters go to court, Breadcrumb can provide testimony in formal proceedings. We have provided testimony and expert reporting in cases for both prosecution and defense counsel.

The Forensic Process

Evidence Scoping

We play a role in helping an organization understand the overall electronic evidence discovery process, the types of information that may be available for analysis, and what approaches are most efficient.

Evidence Collection

We acquire electronic media so that it can be effectively analyzed. Services range from the forensic duplication of a single piece of media to extensive data collection across multiple physical locations. Our consultants can even collect evidence from systems that cannot be taken offline during the evidence collection process.

Analysis

Throughout the litigation support process, we often need to perform challenging digital forensics, which is our greatest strength. The goal of electronic evidence discovery is to identify information that will corroborate or discredit a claim. Sometimes it requires creativity and advanced technical knowledge to identify such evidence.

Examination & Data Minimization

We help reduce the time and cost of the production and review process by performing a thorough review of collected media to understand where relevant email, attachments, documents, or evidence sources may reside. This includes identifying and producing file stores such as compressed files, encrypted partitions, and virtual systems.

Production

We generate evidence for review by identifying attorney/client privileged information and redacting it based on jointly agreed-upon criteria. Our consultants have generated files for review from deleted, slack, or unallocated space, and performed analysis of proprietary application files that require interpretation.

Acquiring Evidence from Smartphones, Computers, and the Cloud

  • Mobile
  • Apple
  • Android
  • Pictures, videos, chat histories, location data, and Internet evidence
  • Password Bypass
  • Computer
  • Evidence acquisition from Windows, Mac, and Linux-based products
  • Supporting hundreds of artifacts including browser history, deleted files, and more
  • Mac-specific support for APFS and HFS+, FileVault 2 decryption, and recovery of macOS artifacts
  • Expedited memory analysis
  • Cloud
  • Supporting data from 50+ of the most popular cloud services such as WhatsApp, Facebook, Instagram, Twitter, iCloud, Google and more
  • Warrant return processing
  • Recover evidence and audit logs from corporate services like Office 365, G Suite, Box and more
  • Log-in token and keychain analysis
"The team at Breadcrumb provided professional and expeditious service, easing our worries during a very stressful situation. I would highly recommend them to any organization."
— Jenn Pike-Owens, COO | TETER