Digital Forensics

Forensic Recovery provides the legal community the opportunity to receive a non-intrusive, non-destructive computer forensic examination of computer systems and related media seized as the result of a criminal or civil investigation.

  • Professional Computer Forensic Capabilities
  • Case Review and Analysis
  • Expert Criminal and Civil Testimony

FORENSIC RECOVERY is recognized by the Federal Courts as an expert in the field of computer forensic processes and electronic data recovery. Backed by twenty-three years of investigative experience and seventeen years dedicated specifically to the computer forensic process, FORENSIC RECOVERY offers the legal community assistance with all aspects of investigative and computer forensic needs.

Our Legal Associates have the opportunity to receive an unbiased, third-party review and analysis of cases, leading to the identification of potential areas that might be addressed from both a prosecutorial and defense position.

The computer forensic process is the collection, preservation, analysis, and court presentation of electronic evidence. The proper collection and analysis of computer evidence is critical in all criminal investigations and civil litigations. As each forensic examination is unique, a time projection to complete the analysis is difficult to establish. The particular amount of time it takes to conduct the forensic examination will vary from case to case.

Therefore, the cost incurred by the Client will be based on a Per-Hour Fee of $275.00 US for computer forensic processes, court-related matters and other administrative requests.

There are situations where a Fixed-Fee contract is appropriate. Please contact us to discuss what arrangements best meet your needs.

Common Case Scenarios

  • Intellectual Property Theft
    An employee or executive leaves an employer to start a new company or work for a competitor. The previous employer ends up in a legal dispute because the employee took with him client contacts, confidential trade secrets and intellectual property, or left a backdoor for remote access to the network at a later time. We can help determine how the employee acted prior to leaving the company or at the onset of litigation.
  • Child Pornography Charges (Peer-to-Peer))
    The government continues to adapt to the changing environment related to Internet Crimes Against Children (ICAC). Chat room interactions, traveler investigations, and possession and distribution have long been the focus of such investigations. Defendants are often charged with possession or distribution of child pornography and need support to analyze the reports and electronic evidence the prosecution presents through discovery. When necessary, we will arrange for our independent review of electroic evidence, following the Adam Walsh Act and State Laws, providing the attorney with an unbiased interpretation of the Government''s case and what the electronic evidence tells us.
  • Child Exploitation Investigation
    (Knowledge and Control))

    A key element of possession of child pornography involves knowledge and control by the alleged offender. There are numerous areas of electronic evidence that provides explicit evidence as to knowledge and control.
  • Counter Terrorism Investigation
    In 2007, Forensic Recovery, LLC was hired by the Federal Public Defenders Office to conduct a review of evidence in a highly publicized terrorism case. Over a period of almost one year, the government continued to examine evidence and provide such findings as discovery.
  • Date and Time Stamps of Computer Files

    In 2009, an individual was arrested for violating his terms of supervised release for possessing child pornography. It should be noted the original charge and subsequent incarceration was also for possession of child pornography.
  • Divorce Inquiries
    In 2009, a West Palm Beach client requested a complete examination of his computer's hard drive. This request came after a filing for divorce and an allegation by the client's wife that child pornography had been seen on the client's hard drive.