Services

[divider height="20"

 

Check what we can do for You


At Digital Works, we provide comprehensive computer forensic accounting solutions tailored to meet the needs of legal and business professionals. Our skilled team offers specialized expertise in the areas of consulting, data acquisition, and forensic investigation. We also offer expert testimony, ensuring that every phase of our work is backed by a meticulous, legally-sound process. Below is an overview of the services we provide:

Consulting and Case Review


Our consulting services start with a thorough review of your case's parameters to ensure a strategic approach to gathering and analyzing data. We work closely with you to define key aspects of the case, such as:

  • Case Parameters: Identifying the scope and objectives of the investigation.
  • Timeline: Establishing time frames to pinpoint relevant activities.
  • Relevant Data Types: Determining the types of data most critical to the investigation, including emails, documents, logs, and more.
  • Key Custodians: Identifying individuals with access to important data, ensuring comprehensive coverage in the data collection process.
  • Devices and Storage Locations: Evaluating the devices (computers, servers, smartphones, tape backups, etc.) where data may be stored. We identify and prioritize these to ensure all necessary devices are captured for analysis.

 

Data Acquisition, Collection, and Preservation  

Once the scope is defined, we perform detailed data acquisition, collection, and preservation methods to ensure integrity and accuracy. Our services include:

 Forensic Collection of Identified Media: This includes data from PC systems, servers, USB devices, and other storage media.

  • Targeted Collection of User-Created and Shared Content: We focus on live data, including files and content that are actively in use, ensuring important information is not overlooked.
  • Tape/Backup Restoration and Processing: We handle complex tape backup restorations and process the data for use in your investigation.
  • Cloud Storage and Web-Based Content: Our team collects data from cloud storage systems (e.g., Google Drive, OneDrive) and other online platforms.
  • Email Content Extraction: We collect and convert email data from both local clients (Outlook, Thunderbird, etc.) and web-based services (Gmail, Yahoo, etc.), ensuring complete coverage.
  • Creating Working Copies: All original data is preserved in pristine form, with copies created for analysis to maintain evidence integrity.
  • User File Processing & Extraction: User files are processed while maintaining file metadata, folder structures, and operating system context.
  • Mobile Device Collection: We extract data from smartphones, iPhones, PDAs, tablets, and other mobile devices, including SIM cards and external storage.
  • Assisted Remote Collection: We assist clients with remote data collection, ensuring data is gathered efficiently, even when devices are off-site.

 

Forensic Investigation & Analysis


Our forensic investigation services ensure that no stone is left unturned in uncovering critical evidence. We perform detailed analysis of various data sources, including:

 

  • Log File Analysis: Reviewing system logs to identify patterns, user activity, and critical actions.
  • Unallocated Space & File Recovery: Searching for deleted files, unallocated space, and performing file carving to recover overwritten or missing files.
  • Hibernation & Volatile Memory Analysis: Examining memory dumps and hibernation files to capture running processes, network connections, and active malware.
  • Link File Analysis: Identifying file/document access by user.
  • Registry Analysis: Analyzing system registry data to uncover USB history, user activity, system processes, and other hidden information.
  • Timeline Analysis: Using system and file activities, which may include prefetch analysis, to create a detailed sequence of events.
  • Anti-Forensics Detection: Identifying and analyzing attempts to wipe data or tamper with metadata, timestamps, or other information.
  • Email Analysis: Investigating email timeframes, key recipients, and terms used, across both local and web-based systems.
  • Internet History: Reviewing user web searches, visited sites, and browsing patterns to identify patterns of use/abuse.
  • Document Analysis:  Reviewing document revisions, ownership changes, timestamps, and file transfers to identify unauthorized access or alterations.
  • Restore Point Analysis: Investigating system restore points to uncover activity and any potential anti-forensic measures.
  • System Profiling: Profiling systems to define user behaviors, recent files, applications in use, and activity patterns.  (Very high level.)
  • Cell Phone Data Extraction: Extracting data from mobile phones, including SMS, contacts, call history, and emails, to assess communications and behavior. (Results not standardized.)

 

Deliverables

Upon completion of the forensic accounting investigation, we provide the following:

  • Data Exports: Comprehensive user files, search hits, and other relevant file exports.
  • Reports: We provide authored, generated, and exported reports summarizing our findings, methods, and results.
  • File Lists & Data Maps: Clear, organized lists and maps detailing collected data and the relationships between key files.
  • Expert Testimony: Our forensic experts are available to provide testimony in legal proceedings, offering authoritative insight into the data and findings.