Affiliate Services

With decades of experience in information technology and digital forensics, we have identified and built relationships with service providers having varying expertise. We welcome you to contact us for a referral in any of the areas listed below. We will listen to your situation, and we will provide you with our best recommendation for a company we think can help.

  • Managed IT Support - Computer and Network Support
  • Private Investigations

Managed IT Support / Computer and Network Support

Calling on third-party hourly computer support personnel is no longer the norm in small to medium-sized businesses. The more effective and more frequently-used method to engage a computer support company is through “managed service.” Managed service functions through an agreed monthly price between the support provider and the client, for a particular service level (i.e. unlimited remote support, automatic data backup, and one monthly on-site visit).

In addition to as-needed support, the managed service provider will typically perform maintenance tasks such as updating applications, ensuring anti-virus is operating, and monitoring a data backup process. This helps to keep the environment running better, more securely, and with less downtime when a problem does occur.

Consider the managed service you perform on your vehicle. You may change its oil, filters, or tires on a regular basis rather than waiting for the tires to explode or engine to lock up. Changing the oil incurs a regular cost, but it helps prevent unexpected, expensive repairs, and it improves the chances your vehicle will perform when you need it.

When handling incidents or performing security assessments, we have had the opportunity to work directly with quality third-party managed service providers. You may contact us for a recommendation.

Private Investigation Services

There are times when hiring a private investigator is necessary to move an investigation forward or give you peace of mind. We have worked hand-in-hand with private investigators on cases we have been involved in. Our private investigator associates can provide services related to:

  • Corporate Investigations
  • Fraud
  • Surveillance
  • Background Checks
  • Child Custody
  • Missing Persons
  • Witness Interviews
  • Witness Locates
  • Polygraph Testing
  • Cold Case Investigations
  • Latent Fingerprint Services


For any of the above services, we would recommend engaging a licensed private investigator.

Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    The government continues to adapt to the changing environment related to Internet Crimes Against Children (ICAC). Chat room interactions, traveler investigations, and possession and distribution have long been the focus of such investigations. Defendants are often charged with possession or distribution of child pornography and need support to analyze the reports and electronic evidence the prosecution presents through discovery. When necessary, we will arrange for our independent review of electroic evidence, following the Adam Walsh Act and State Laws, providing the attorney with an unbiased interpretation of the Government''s case and what the electronic evidence tells us.
  • Child Exploitation Investigation
    (Knowledge and Control))

    A key element of possession of child pornography involves knowledge and control by the alleged offender. There are numerous areas of electronic evidence that provides explicit evidence as to knowledge and control.
  • Counter Terrorism Investigation
    In 2007, Forensic Recovery, LLC was hired by the Federal Public Defenders Office to conduct a review of evidence in a highly publicized terrorism case. Over a period of almost one year, the government continued to examine evidence and provide such findings as discovery.
  • Date and Time Stamps of Computer Files

    In 2009, an individual was arrested for violating his terms of supervised release for possessing child pornography. It should be noted the original charge and subsequent incarceration was also for possession of child pornography.
  • Divorce Inquiries
    In 2009, a West Palm Beach client requested a complete examination of his computer's hard drive. This request came after a filing for divorce and an allegation by the client's wife that child pornography had been seen on the client's hard drive.