Forensic Recovery

Forensic Recovery, LLC is a Florida-based consulting firm providing law firm and corporate clients with analysis and expert witness services related to digital forensics, electronic discovery and data breach incident response. As the use of technology increasingly integrates into our daily lives, the resulting digital footprint continues to expand. Our analysts and experts are experienced in identifying and interpreting electronically stored information used in corporate litigation, criminal investigations, and civil matters.

Our Incident Response engagements typically begin because a client believes their network or email platform has been compromised by an attacker. We have the ability to determine if an actual incident took place, identify its root cause and scope, and work with counsel to produce reports for law enforcement, regulatory agencies, or shareholders.

Visit our services page for more information about services we offer, and contact us to confidentially discuss how we may help you.


Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    Internet Crimes Against Children (ICAC) task forces around the country identify and arrest potential traders of child pornography on a regular basis. We can review the Government's findings and conduct an independent examination of the digital evidence in order to determine the circumstances surrounding the charged files.
  • Divorce
    Forensic Recovery can assist counsel in helping to identify, preserve and analyze digital evidence in family litigation. Often, our work is related to location data, communications, and hidden asset leads. Working through counsel on these matters is the preferred mechanism.