Digital Forensics

Digital Incident Response
Uncovering The Truth!

Recovery and investigation of material found in digital devices.

GIAC Certified
Computer Forensics Examiner

  • Computer Forensics
  • Mobile Device Forensics
  • Forensically Sound Data Acquisition
  • Digital Security Consulting
  • Evidence Examination and Analysis
  • Recovery Of Deleted Data
  • Corporate Investigations
  • Details below

What we do

COMPUTER FORENSICS
Genusys can collect, analyze and report on digital  data in a way that is forensically sound and  reproducible. The data and reports can then be used  in the detection and prevention of crime or in any  dispute where evidence is stored digitally.

MOBILE DEVICE FORENSICS
Genusys can collect, analyze and report on digital  data from a mobile device under forensically sound  conditions. Mobile devices that Genusys can  perform forensics on include mobile phones, PDA  devices, GPS devices and tablet computers.

FORENSICALLY SOUND DATA ACQUISITION
Genusys can make a forensic image from computer  media such as hard drives, USB drives, removable  hard drives, servers and other media that store  electronic data including mobile devices, gaming  consoles and other devices.

DIGITAL SECURITY CONSULTING

  • Departing employee advice
  • Security advice
  • Data acquisition
  • Examination of other’s evidence

EVIDENCE EXAMINATION AND ANALYSIS
Genusys uses current state of the market  commercial tools and an assortment of the most  current manual techniques to analyze and report on  digital evidence whether collected by Genusys or  from other sources.


Who we are

Genusys has been providing technology and security support to companies large and small since 1998. Our technical expertise and business experience uniquely position us to handle all your digital forensics’ issues with professionalism and in confidence.

Genusys Digital Forensics was founded by Richard McElroy, a GIAC Certified Computer Forensics Examiner. He was trained at the SANS Institute, the world’s premier security training organization. Mr. McElroy brings his extensive technical experience and knowledge of today’s current digital forensics tools and techniques to your specific situation.


What if

  • An employee has used a computer or mobile  device belonging to your company for an illicit  purpose.
  • You need to recover digital evidence  discreetly with minimal disruption to your  business.
  • An employee is suspected of stealing  confidential information.
  • You need to recover data or emails that were  maliciously deleted.
  • You need a digital forensics expert to  examine digital evidence.
  • You suspect malware or spyware on a device.
  • You need to recover evidence of hidden  assets

Reasons for using a digital forensics expert

DEPARTING EMPLOYEE TRIAGE

  • Collect a forensically sound image of the computer or  device beginning the chain of custody process before  any possible disputes arise.
  • Assess if the employee deleted any data.
  • Uncover if data was copied to an eternal destination.
  • Discover if competitive data was taken before the exit.
  • Uncover any suspicious communications whether  email or chat.

INTERNAL CORPORATE INVESTIGATIONS

  • Put a wall between your company and the  investigation to avoid future biased investigation  accusations.
  • Discover if a key employee is preparing to leave your  employ.
  • Confirm if an employee stole important data.
  • Uncover if an employee is working a side job on  company time.
  • Expose if an employee violated company internet  policies.
  • Uncover if an employee is accessing data they are  not entitled to access.
  • Confirm if an employee is harassing another  employee.

INTELLECTUAL PROPERTY THEFT

  • Uncover if sensitive data has been accessed.
  • Track down if malware/spyware is stealing secrets.
  • Discover if an employee is stealing critical data.

DIVORCE AND FAMILY LAW

  • Work in conjunction with legal advisor.
  • Uncover evidence of hidden assets.
  • Uncover evidence of remote monitoring and spyware.
  • Determine patterns of computer usage.
  • Consultations on individual digital protection  strategies.

RECOVERY OF DELETED DATA

  • Recover deleted files, pictures and application data.
  • Recover email, file and chat fragments.
  • Recover deleted internet history.

Examples of evidence that can be recovered

COMPUTERS

  • Emails
  • USB activity
  • Wireless connections
  • Internet history
  • Recent file activity
  • Thumb caches
  • Hidden/encrypted files
  • Evidence of forensics evasion
  • Patterns of activity
  • Chat sessions

CELL PHONES

  • SMS and MMS messaging
  • Call logs
  • Contact lists
  • Phone IMEI/ESN information.
  • Web browsing
  • Wireless network settings
  • Geolocation information (including geotags  contained within image metadata)
  • E-mail

Connect with The Genusys Group

Join our mailing list or ask a question.