Computer Forensics - Computer Forensics Services & Electronic Discovery by ACE Data Group

Computer Forensic Services

ACE Data Group computer forensics experts are the ultimate digital archeologists - uncovering hidden data artifacts often comprised of tiny fragments of files. They are linguists who interpret the meaning of the data, and they are trial certified experts who authenticate and explain the digital evidence to a judge and jury.

Our computer forensics investigators render a wide range of diverse and vital services that fall within the general categories of data collection, preservation and investigation. At ACE Data Group, our assignments include determining:

  • The authenticity of an electronic file or e-mail
  • Whether data has been migrated to portable media, alternative servers or transmitted over the Internet
  • Whether an electronic document's metadata contains evidence that will tend to support or refute a claim
  • Whether evidence is "buried" within temporary files, replicant files, swap files, other systemically-created files or within the computer's unallocated space
  • Whether storage media contains previously deleted or erased documents, parts of documents or drafts of documents
  • The extent and nature of purposeful or negligent deletions, electronic "shredding", use of defragmentation programs, the installation of software or other activities to destroy, alter or corrupt electronic data
  • Whether electronic evidence has been password protected or encrypted and how to access the information contained within

Client assignments involve ACE Data Group in high-profile and complex matters, such as restrictive covenant and trade secret theft litigation, investigations of frauds and international corporate espionage, cases of evidence destruction, subsequent cover-ups, false claims based on "doctored" evidence, asset diversions, Internet-based criminal activity, actionable spoliation matters and a broad assortment of data authentication issues.

ACE Data Group is also expert in establishing, auditing and validating evidence preservation protocols for data relevant to litigation and regulatory compliance matters. We exceed required evidentiary standards and chain-of-custody protocols. All forensics data is kept in a fire-proof safe in our facilities, under separate lock and key.